aydinnyunus / CVE-2025-29927Links
CVE-2025-29927 Proof of Concept
☆93Updated 9 months ago
Alternatives and similar repositories for CVE-2025-29927
Users that are interested in CVE-2025-29927 are comparing it to the libraries listed below
Sorting:
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆165Updated last year
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆180Updated 9 months ago
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆164Updated 7 months ago
- Helios: Automated XSS Testing☆159Updated last year
- Search for all leaked keys/secrets using one regex! bugbounty☆166Updated 8 months ago
- GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & m…☆190Updated 2 weeks ago
- React Shell & Next.js RSC Exploit Tool (CVE-2025-55182)☆164Updated 2 weeks ago
- Noxer is a powerful Python script designed for automating Android penetration testing tasks within the Nox Player emulator.☆282Updated last year
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆142Updated 3 weeks ago
- ☆81Updated 6 months ago
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆117Updated last year
- Exploiting the xmlrpc.php☆65Updated 2 years ago
- ☆204Updated 10 months ago
- ☆95Updated 8 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆211Updated 3 months ago
- ☆124Updated 4 months ago
- ☆163Updated 2 weeks ago
- ☆78Updated 6 months ago
- Local File Inclusion discovery and exploitation tool☆329Updated 11 months ago
- A fast WordPress plugin enumeration tool☆745Updated last month
- AI-powered ffuf wrapper☆613Updated 3 weeks ago
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway a…☆265Updated last year
- Automation tool to testing and confirm the xss vulnerability.☆301Updated 5 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- A list of all Active Directory machines from HackTheBox☆189Updated last month
- Everything from my OSEP study.☆179Updated 11 months ago
- Subdomain Enumerator and Simple Crawler☆274Updated this week
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆156Updated 4 months ago
- A WordPress plugin that provides reverse shell functionality with a graphical user interface (GUI) for configuration. This plugin allows …☆41Updated last month
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆51Updated last year