gh-ost00 / CVE-2024-28987-POCLinks
Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)
☆12Updated last year
Alternatives and similar repositories for CVE-2024-28987-POC
Users that are interested in CVE-2024-28987-POC are comparing it to the libraries listed below
Sorting:
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited☆20Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated 2 years ago
- Tool for bypassing logins vulnerable against SQL injection☆45Updated last year
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆24Updated last year
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆51Updated last year
- Mass bruteforce authentication of common services with common credentials.☆49Updated last year
- Social Engineering Browser Update Attack.☆55Updated last year
- This GitHub Pages site serves as a creative demonstration of website defacement, featuring an engaging interface and audio elements. IT i…☆13Updated last year
- Hacking with PasteJacking technique☆22Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆53Updated 4 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 10 months ago
- PolyCaptcha is a Flask‑based web application that mimics Google’s image‑based reCAPTCHA flow to demonstrate how attackers can use visual …☆10Updated 2 months ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆12Updated 10 months ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆46Updated 3 months ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆61Updated last year
- 「🧱」Test a list of payloads and see if you can bypass it☆61Updated 3 years ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆33Updated last year
- ☆24Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- Kali Packerge Manager☆65Updated last year
- Interactive shell to execute commands anonymously using Proxychains and Tor☆43Updated 2 years ago
- ShoDam is a simple and effective bookmarklet designed to extract IP addresses from Shodan search results with a single click.☆17Updated 10 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆135Updated last year
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆42Updated last year
- Enumeration & fingerprint tool☆24Updated last year