aydinnyunus / CVE-2025-29927Links
CVE-2025-29927 Proof of Concept
☆86Updated 6 months ago
Alternatives and similar repositories for CVE-2025-29927
Users that are interested in CVE-2025-29927 are comparing it to the libraries listed below
Sorting:
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆166Updated 7 months ago
- Helios: Automated XSS Testing☆154Updated last year
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆153Updated 4 months ago
- ☆203Updated 8 months ago
- Local File Inclusion discovery and exploitation tool☆329Updated 9 months ago
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆150Updated last year
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆105Updated last year
- Automation tool to testing and confirm the xss vulnerability.☆292Updated 2 months ago
- ☆124Updated last month
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆149Updated last month
- Search for all leaked keys/secrets using one regex! bugbounty☆140Updated 6 months ago
- Exploiting the xmlrpc.php☆62Updated last year
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated 11 months ago
- ☆75Updated 3 months ago
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆126Updated last week
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆181Updated 2 weeks ago
- JSNinja is a powerful tool designed for security researchers and developers looking to extract sensitive information and Urls from JavaSc…☆161Updated last week
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆98Updated last year
- Unauthenticated Remote Code Execution – Bricks <= 1.9.6☆173Updated last year
- Header Exploitation HTTP☆656Updated this week
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway a…☆263Updated last year
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆350Updated last year
- AI-powered ffuf wrapper☆542Updated 10 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆372Updated last month
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆58Updated 3 months ago
- A fast, minimalistic scanner for time-based SQL injection (SQLi) detection – built in Go.☆132Updated 5 months ago
- Interact with Hackthebox using your terminal - Be faster and more competitive !☆134Updated 3 weeks ago
- A fast WordPress plugin enumeration tool☆694Updated 2 months ago
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆47Updated last year
- Nuclei-AI-Prompts☆335Updated 3 months ago