gh-ost00 / CVE-2024-4577-RCELinks
PHP CGI Argument Injection (CVE-2024-4577) RCE
☆21Updated 11 months ago
Alternatives and similar repositories for CVE-2024-4577-RCE
Users that are interested in CVE-2024-4577-RCE are comparing it to the libraries listed below
Sorting:
- an exploit of Server-side request forgery (SSRF)☆50Updated 11 months ago
- ☆28Updated 3 months ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated 2 weeks ago
- A fast subdomain takeover tool☆81Updated last year
- ☆48Updated last year
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆37Updated 2 years ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆40Updated 10 months ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆48Updated 8 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 7 months ago
- 「💉」XSS Payload List☆37Updated 2 years ago
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆41Updated 3 months ago
- Rezon - Automated Bug Hunting Recon Tool☆19Updated last week
- Unofficial Acunetix CLI tool for automated pentesting and bug hunting across large scopes.☆82Updated last year
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆11Updated 10 months ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Updated last year
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆81Updated 2 years ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆65Updated last year
- 「🧱」Test a list of payloads and see if you can bypass it☆59Updated 3 years ago
- FireHawk: The Elite Firebase Security Testing Utility☆21Updated last year
- ☆38Updated 3 months ago
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization☆42Updated last year
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆72Updated 5 months ago
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- simple recon tool to help you for searching vulnerability on web server☆74Updated 4 months ago
- ProxyChecker Made in NodeJS☆37Updated 3 years ago
- This repository contains the best fuzzing wordlist files☆34Updated 7 months ago
- This script is used to search for cloud certificate entities such as Amazon, Azure, and others that have been extracted by the kaeferjaeg…☆45Updated 7 months ago
- PassBreaker☆63Updated last year
- A utility for detecting webpage inputs and conducting XSS scans.☆148Updated last year
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆39Updated 8 months ago