Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited
☆23Aug 30, 2024Updated last year
Alternatives and similar repositories for CVE-2024-1071-SQL-Injection
Users that are interested in CVE-2024-1071-SQL-Injection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Sep 5, 2024Updated last year
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆25Aug 20, 2024Updated last year
- Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin <= 5.7.14 - Unauthenticated SQL Injection☆21Sep 15, 2024Updated last year
- The powerfull Extract and Scanner Javascript urls (Upgrade Deeper search)☆21Nov 7, 2024Updated last year
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Dec 13, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Blank methodology sheet for the OSWE exam☆13Dec 17, 2021Updated 4 years ago
- Ethical hacking practices used to explore vulnerabilities in smart contracts, in order to enhance security measures against potential thr…☆26Jan 8, 2024Updated 2 years ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- This tool allows you to find ssti vulnerability with ease!☆22Sep 3, 2022Updated 3 years ago
- BaseQuery is an OSINT tool used import email and password data files from security breaches, storing them in a way that is extremely quic…☆17Feb 9, 2019Updated 7 years ago
- Find data about you or an individual from various online public records☆31May 26, 2017Updated 8 years ago
- Nuclei Tamplates for APK☆21Jan 13, 2023Updated 3 years ago
- Mine URLs from Browser's Heap Snapshot for fun and profit☆65Aug 9, 2023Updated 2 years ago
- Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for …☆15Mar 4, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 3 months ago
- A collection of scripts to explore domains and pick up information.☆13Sep 17, 2018Updated 7 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated 2 months ago
- A simple place to learn XSS☆31Mar 20, 2021Updated 5 years ago
- FiveM☆10Jan 18, 2022Updated 4 years ago
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- Generator for fake ID barcodes. (Currently SC only, looking to expand).☆33Jan 5, 2015Updated 11 years ago
- A Chrome extension for sending push notifications to gotify/server☆12Apr 16, 2019Updated 7 years ago
- "Collection of IoT vulnerability research and exploits, focusing on unauthorized access, CVEs, and popular devices like TP-LINK, Tenda, D…☆23Jan 20, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Wappalyzer CLI tool to find Web Technologies☆60Oct 6, 2023Updated 2 years ago
- ☆19Mar 29, 2018Updated 8 years ago
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆46Mar 9, 2020Updated 6 years ago
- 免杀木马样本☆106Oct 11, 2025Updated 7 months ago
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆74Sep 11, 2021Updated 4 years ago
- It's easy as cake to dump your secrets☆49Jul 27, 2023Updated 2 years ago
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities 🕵️♂️ using Metasploit 🚀. Learn how to id…☆13May 25, 2025Updated 11 months ago
- A minimalist microblogging platform 🐦🔇☆10May 14, 2026Updated last week
- Curve Fuckin Styler☆11May 22, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆49Dec 18, 2024Updated last year
- Cross-Site Scripting (XSS) is a common vulnerability that allows attackers to inject malicious scripts into web pages viewed by users. In…☆11Sep 10, 2024Updated last year
- BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits☆14Jul 19, 2025Updated 10 months ago
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆13Jun 27, 2023Updated 2 years ago
- ☆23Sep 19, 2024Updated last year
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 5 months ago
- CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache/2.4.49-2.4.50)☆10Apr 8, 2022Updated 4 years ago