aydinnyunus / CVE-2025-29927
CVE-2025-29927 Proof of Concept
☆73Updated last month
Alternatives and similar repositories for CVE-2025-29927
Users that are interested in CVE-2025-29927 are comparing it to the libraries listed below
Sorting:
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆140Updated 7 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆77Updated 7 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆62Updated 7 months ago
- ☆119Updated last year
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆116Updated 2 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆118Updated last month
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆92Updated 7 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆150Updated 5 months ago
- A passive way to find backups/ sensitive information.☆79Updated 2 weeks ago
- Helios: Automated XSS Testing☆149Updated 9 months ago
- Automation tool to testing and confirm the xss vulnerability.☆246Updated last month
- A collection of config files for linux focusing on hackthebox theme☆44Updated 4 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆112Updated 7 months ago
- JSNinja is a powerful tool designed for security researchers and developers looking to extract sensitive information and Urls from JavaSc…☆122Updated 5 months ago
- A list of all Active Directory machines from HackTheBox☆58Updated 3 weeks ago
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆57Updated 10 months ago
- ☆60Updated 2 months ago
- ☆162Updated 6 months ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆90Updated 9 months ago
- ☆84Updated 2 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆85Updated last week
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆148Updated last year
- A fast WordPress plugin enumeration tool☆364Updated 2 months ago
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆96Updated 8 months ago
- Search for all leaked keys/secrets using one regex! bugbounty☆126Updated last month
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆39Updated 8 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆153Updated last year
- ☆199Updated 3 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆114Updated 5 months ago