aydinnyunus / CVE-2025-29927Links
CVE-2025-29927 Proof of Concept
☆83Updated 5 months ago
Alternatives and similar repositories for CVE-2025-29927
Users that are interested in CVE-2025-29927 are comparing it to the libraries listed below
Sorting:
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆160Updated 6 months ago
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆151Updated 4 months ago
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆139Updated last year
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆104Updated 11 months ago
- Exploiting the xmlrpc.php☆59Updated last year
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆84Updated 11 months ago
- Automation tool to testing and confirm the xss vulnerability.☆289Updated 2 months ago
- Latest CVEs with their Proof of Concept exploits.☆131Updated last week
- Helios: Automated XSS Testing☆154Updated last year
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆173Updated 3 weeks ago
- ☆124Updated 3 weeks ago
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆56Updated last year
- The Most Advanced Client-Side Prototype Pollution Scanner☆237Updated 3 weeks ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated 11 months ago
- JSNinja is a powerful tool designed for security researchers and developers looking to extract sensitive information and Urls from JavaSc…☆162Updated 2 weeks ago
- ☆74Updated 3 months ago
- ☆203Updated 7 months ago
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆122Updated 2 weeks ago
- Search for all leaked keys/secrets using one regex! bugbounty☆137Updated 5 months ago
- Super Weird XSS Payloads☆117Updated 2 weeks ago
- Noxer is a powerful Python script designed for automating Android penetration testing tasks within the Nox Player emulator.☆238Updated last year
- ☆144Updated 6 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆123Updated 9 months ago
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆146Updated 3 weeks ago
- A fast WordPress plugin enumeration tool☆687Updated last month
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆350Updated 3 weeks ago
- SubOwner - A Simple tool check for subdomain takeovers.☆114Updated 11 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆138Updated 8 months ago
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆367Updated last year
- Local File Inclusion discovery and exploitation tool☆324Updated 8 months ago