gh-ost00 / CVE-2024-1071-SQL-Injection
Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited
☆14Updated 7 months ago
Alternatives and similar repositories for CVE-2024-1071-SQL-Injection:
Users that are interested in CVE-2024-1071-SQL-Injection are comparing it to the libraries listed below
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆11Updated 6 months ago
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆20Updated 7 months ago
- The powerfull Extract and Scanner Javascript urls (Upgrade Deeper search)☆16Updated 4 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆55Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆47Updated 10 months ago
- Chrome extension tool for OSINT & Recon☆53Updated last year
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆43Updated last year
- A bash and powershell script to download the latest version of Burp-Suite Professional and use it for free.☆17Updated last year
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.☆66Updated 6 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 6 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- A tool for automatically change the Tor IP address over time. Maximize anonymity!☆72Updated 2 weeks ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆38Updated 6 months ago
- Tool for bypassing logins vulnerable against SQL injection☆45Updated last year
- A Python tool to resolve domains to IPs, fetch related CVEs, and display open ports☆14Updated 3 months ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆63Updated 10 months ago
- Bug Bounty ultimate tool☆19Updated 4 months ago
- Tool for automate bug hunting process 🔍 --> 🍭☆38Updated 7 months ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆132Updated 5 months ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆31Updated 10 months ago
- Mass bruteforce authentication of common services with common credentials.☆47Updated last year
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆21Updated 2 years ago
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search …☆33Updated 3 months ago
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leve…☆31Updated 2 months ago
- Automatic tool to find Google Dorks☆33Updated 5 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆58Updated 4 months ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated 9 months ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆34Updated last year
- CrlfiX☆19Updated 2 months ago
- ☆32Updated last week