aydinnyunus / CVE-2025-29927Links
CVE-2025-29927 Proof of Concept
☆93Updated 9 months ago
Alternatives and similar repositories for CVE-2025-29927
Users that are interested in CVE-2025-29927 are comparing it to the libraries listed below
Sorting:
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆165Updated last year
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆164Updated 7 months ago
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆180Updated 9 months ago
- React Shell & Next.js RSC Exploit Tool (CVE-2025-55182)☆173Updated 2 weeks ago
- Exploiting the xmlrpc.php☆65Updated 2 years ago
- Automation tool to testing and confirm the xss vulnerability.☆301Updated 5 months ago
- Helios: Automated XSS Testing☆159Updated last year
- Search for all leaked keys/secrets using one regex! bugbounty☆166Updated 9 months ago
- Noxer is a powerful Python script designed for automating Android penetration testing tasks within the Nox Player emulator.☆284Updated last year
- A fast WordPress plugin enumeration tool☆748Updated this week
- ☆163Updated 2 weeks ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆213Updated 3 months ago
- ☆204Updated 10 months ago
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆142Updated 3 weeks ago
- Local File Inclusion discovery and exploitation tool☆330Updated last year
- GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & m…☆190Updated 2 weeks ago
- Subdomain Enumerator and Simple Crawler☆296Updated last week
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆354Updated 2 years ago
- ☆81Updated 6 months ago
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway a…☆265Updated last year
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆118Updated last year
- Everything from my OSEP study.☆180Updated 11 months ago
- A WordPress plugin that provides reverse shell functionality with a graphical user interface (GUI) for configuration. This plugin allows …☆41Updated last month
- AI-powered ffuf wrapper☆616Updated 3 weeks ago
- ☆95Updated 8 months ago
- ☆124Updated 4 months ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆300Updated last year
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆318Updated 2 months ago
- Nuclei-AI-Prompts☆347Updated 6 months ago
- A list of all Active Directory machines from HackTheBox☆196Updated last month