fearsoff-org / CVE-2025-49113View external linksLinks
☆97Jun 6, 2025Updated 8 months ago
Alternatives and similar repositories for CVE-2025-49113
Users that are interested in CVE-2025-49113 are comparing it to the libraries listed below
Sorting:
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆34Jan 18, 2026Updated 3 weeks ago
- CVE-2025-27591 is a privilege escalation vulnerability that affected the Below service before version 0.9.0☆31Jul 16, 2025Updated 6 months ago
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server☆10Jul 6, 2024Updated last year
- ☆11Dec 22, 2023Updated 2 years ago
- WordPress File Upload RCE Exploit☆17Sep 1, 2025Updated 5 months ago
- Massive scanner to detect exposed .env files across multiple targets.☆13Jan 10, 2026Updated last month
- Import jar as Eclipse project by decompiling☆13Oct 6, 2024Updated last year
- 个人喜好 的渗透工具☆16May 22, 2024Updated last year
- ☆18Aug 8, 2024Updated last year
- Dump Linux keyrings☆23Jul 15, 2024Updated last year
- "闪紫"(英文名shiningZ)社工字典生成工具,支持ABC自定义排列组合、ABC列字典AI扩展、AI提示词联想字典、自定义AI提示、字典去重、结果导出等☆31Oct 27, 2025Updated 3 months ago
- Automation tool designed to simplify the analysis of PCAP (Packet Capture) files☆18Mar 15, 2024Updated last year
- Proxifier批量添加代理服务器☆18Jun 8, 2023Updated 2 years ago
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆25Dec 11, 2024Updated last year
- Proof of Concept for CVE-2025-31161 / CVE-2025-2825☆49Apr 8, 2025Updated 10 months ago
- 编码解码工具☆21Jan 7, 2025Updated last year
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆20Jun 17, 2024Updated last year
- CheckCdn 完善的CDN信息分析工具 基于EDNS、ASN、CNAME、IPlocate等多个维度筛选☆39Updated this week
- CVE-2025-30208-EXP☆199Apr 1, 2025Updated 10 months ago
- Dump processes over WMI with MSFT_MTProcess☆81Updated this week
- Exploit for CyberPanel Pre-Auth RCE via Command Injection☆22Nov 1, 2024Updated last year
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆166Jul 31, 2025Updated 6 months ago
- ☆33Jan 23, 2025Updated last year
- ☆38Sep 21, 2025Updated 4 months ago
- 最近很火的SSLvpn的安全设备通杀☆27Dec 15, 2023Updated 2 years ago
- Stack integrity verification to Detect SleepMask or CallStack Spoofer☆53Jul 13, 2025Updated 7 months ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Jul 14, 2024Updated last year
- D-Link NAS CVE-2024-3273 Exploit Tool☆99Apr 7, 2024Updated last year
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Aug 28, 2024Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆30Oct 9, 2024Updated last year
- CVE-2023-34992: Fortinet FortiSIEM Command Injection Proof of Concept Exploit☆27May 21, 2024Updated last year
- Kali Packerge Manager☆63Nov 1, 2023Updated 2 years ago
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Nov 22, 2024Updated last year
- self-hosted Azure OSINT tool☆32Jun 24, 2025Updated 7 months ago
- ☆156Oct 28, 2025Updated 3 months ago
- Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease appli…☆32Dec 7, 2023Updated 2 years ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆98Jan 25, 2026Updated 3 weeks ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 7 months ago