gh-ost00 / CVE-2024-4577-RCELinks
PHP CGI Argument Injection (CVE-2024-4577) RCE
☆24Updated last year
Alternatives and similar repositories for CVE-2024-4577-RCE
Users that are interested in CVE-2024-4577-RCE are comparing it to the libraries listed below
Sorting:
- ☆47Updated last year
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆77Updated last year
- 「🧱」Test a list of payloads and see if you can bypass it☆61Updated 3 years ago
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆83Updated 9 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated last year
- simple recon tool to help you for searching vulnerability on web server☆75Updated last week
- Passive Web Vulnerability Detection Tool☆37Updated 8 months ago
- POC exploit for CVE-2015-10141☆30Updated 5 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated last year
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated 6 months ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆56Updated last year
- an exploit of Server-side request forgery (SSRF)☆50Updated last year
- ☆21Updated 9 months ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆21Updated last year
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆36Updated 2 years ago
- The powerfull Extract and Scanner Javascript urls (Upgrade Deeper search)☆21Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆41Updated last year
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆45Updated last year
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Updated 2 years ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆67Updated last year
- Unofficial Acunetix CLI tool for automated pentesting and bug hunting across large scopes.☆84Updated 2 years ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆33Updated last year
- CVE-2024-28955 Exploitation PoC☆34Updated last year
- Grep subdomains from web pages.☆45Updated 11 months ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆42Updated 2 years ago
- 「💉」XSS Payload List☆42Updated 2 years ago
- Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers P…☆31Updated 5 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Updated this week
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface☆76Updated this week