gotr00t0day / CVE-2024-4577Links
Argument injection vulnerability in PHP
☆12Updated last year
Alternatives and similar repositories for CVE-2024-4577
Users that are interested in CVE-2024-4577 are comparing it to the libraries listed below
Sorting:
- A small and efficient tool to find open redirect vulnerabilities.☆17Updated 4 years ago
- Subtron is a professional-grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆23Updated last month
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆34Updated last year
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- my own 2fa bypass methodolgy☆24Updated 2 years ago
- CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)☆28Updated last year
- Automated enumeration for red teamers☆10Updated 2 years ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆17Updated last year
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆21Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Updated 2 years ago
- POC exploit for CVE-2015-10141☆30Updated last month
- This repository contains random Nuclei templates I've created. Most of them based on recent security issues and exploits.☆15Updated last year
- A small and fast bash script to automate LFI vulnerability.☆11Updated 2 years ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆16Updated 2 years ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆44Updated last year
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆42Updated last year
- Fetch & Filter Known URLs☆15Updated 3 years ago
- This script is used to search for cloud certificate entities such as Amazon, Azure, and others that have been extracted by the kaeferjaeg…☆48Updated 9 months ago
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Updated 2 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆12Updated 4 months ago
- A BurpSuite extension for vulnerability Scanning☆27Updated last year
- A command-line utility designed to discover subdomains for a given domain in a simple, efficient way. It works by gathering information f…☆117Updated 3 weeks ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆35Updated 2 years ago
- Repository of useful payloads and tips for pentesting/bug bounty.☆27Updated 10 months ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆11Updated 2 years ago
- CrlfiX☆20Updated 8 months ago
- Python based Discord bot Which allows you to run tools like nmap and amass from discord☆26Updated 2 years ago