gotr00t0day / CVE-2024-4577
Argument injection vulnerability in PHP
☆11Updated 8 months ago
Alternatives and similar repositories for CVE-2024-4577:
Users that are interested in CVE-2024-4577 are comparing it to the libraries listed below
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆10Updated 9 months ago
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆17Updated 8 months ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated 9 months ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Updated 2 years ago
- CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account Takeover☆27Updated 6 months ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- Global Protec Palo Alto File Write Exploit☆10Updated 10 months ago
- CVE-2023-1671-POC, based on dnslog platform☆17Updated last year
- Automate Blind SQL Injection with Python.☆20Updated 2 years ago
- Atlassian Confluence - Remote Code Execution☆10Updated last year
- Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....☆31Updated this week
- Mass Exploit - CVE-2023-1698 < Unauthenticated Remote Command Execution☆12Updated last year
- Just another script for automatize boolean-based blind SQL injections. (Demo)☆53Updated 2 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Updated 6 months ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆14Updated 9 months ago
- Blind SQL Injection (BSQLI) Data Exploration Tool☆18Updated 8 years ago
- ☆24Updated last year
- Exploit for the unauthenticated file upload vulnerability in WordPress's Royal Elementor Addons and Templates plugin (< 1.3.79). CVE-ID: …☆10Updated last year
- This script performs vulnerability scanning for CVE-2024-21762, a Fortinet SSL VPN remote code execution vulnerability. It checks whether…☆12Updated 10 months ago
- Recon(Amass, Naabu, Nuclei) workflow with Github Actions☆16Updated 3 months ago
- CVE-2024-27956 WordPress Automatic < 3.92.1 - Unauthenticated SQL Injection☆18Updated 9 months ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆17Updated 9 months ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆18Updated last year
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆35Updated last year
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 2 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆16Updated 3 years ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆8Updated last year
- ☆11Updated 7 months ago