aydinnyunus / CVE-2025-29927Links
CVE-2025-29927 Proof of Concept
☆91Updated 8 months ago
Alternatives and similar repositories for CVE-2025-29927
Users that are interested in CVE-2025-29927 are comparing it to the libraries listed below
Sorting:
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆178Updated 8 months ago
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆161Updated last year
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆164Updated 6 months ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆353Updated last year
- A fast WordPress plugin enumeration tool☆731Updated last month
- Helios: Automated XSS Testing☆156Updated last year
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆139Updated this week
- Search for all leaked keys/secrets using one regex! bugbounty☆144Updated 8 months ago
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆111Updated last year
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆210Updated 2 months ago
- Exploiting the xmlrpc.php☆67Updated 2 years ago
- GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & m…☆186Updated this week
- Everything from my OSEP study.☆180Updated 10 months ago
- Local File Inclusion discovery and exploitation tool☆330Updated 11 months ago
- Unauthenticated Remote Code Execution – Bricks <= 1.9.6☆177Updated last year
- AI-powered ffuf wrapper☆556Updated this week
- ☆205Updated 10 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆385Updated 3 weeks ago
- Automation tool to testing and confirm the xss vulnerability.☆301Updated 4 months ago
- ☆80Updated 5 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway a…☆265Updated last year
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆313Updated last month
- Header Exploitation HTTP☆684Updated last week
- ☆124Updated 3 months ago
- ☆95Updated 8 months ago
- Nuclei-AI-Prompts☆346Updated 5 months ago
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆155Updated 3 months ago
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆51Updated last year
- The Most Advanced Client-Side Prototype Pollution Scanner☆241Updated this week