gh-ost00 / CVE-2024-28987-POCLinks
Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)
☆12Updated last year
Alternatives and similar repositories for CVE-2024-28987-POC
Users that are interested in CVE-2024-28987-POC are comparing it to the libraries listed below
Sorting:
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
 - PHP CGI Argument Injection (CVE-2024-4577) RCE☆24Updated last year
 - Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited☆22Updated last year
 - A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
 - A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago
 - PassBreaker☆63Updated last year
 - Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
 - subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated last year
 - This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
 - PolyCaptcha is a Flask‑based web application that mimics Google’s image‑based reCAPTCHA flow to demonstrate how attackers can use visual …☆10Updated 3 months ago
 - Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆47Updated 4 months ago
 - The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆51Updated last year
 - WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Updated 2 years ago
 - Enumeration & fingerprint tool☆24Updated last year
 - G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆62Updated last year
 - it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated 2 years ago
 - This GitHub Pages site serves as a creative demonstration of website defacement, featuring an engaging interface and audio elements. IT i…☆12Updated last year
 - Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated last year
 - Mass bruteforce authentication of common services with common credentials.☆49Updated last year
 - This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated 2 years ago
 - WooCommerce Payments: Unauthorized Admin Access Exploit☆42Updated 2 years ago
 - Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
 - XML-RPC Vulnerability Checker and Directory Fuzzer☆22Updated 2 years ago
 - F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆21Updated 2 years ago
 - Subtron is a professional grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆24Updated this week
 - CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆27Updated last year
 - ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆15Updated 9 months ago
 - Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
 - This repository contains the best fuzzing wordlist files☆34Updated 11 months ago
 - Hacking with PasteJacking technique☆22Updated last year