gotr00t0day / CVE-2024-4577Links
Argument injection vulnerability in PHP
☆12Updated last year
Alternatives and similar repositories for CVE-2024-4577
Users that are interested in CVE-2024-4577 are comparing it to the libraries listed below
Sorting:
- Automated enumeration for red teamers☆10Updated 2 years ago
- CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)☆28Updated last year
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Updated 2 years ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆17Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆47Updated 3 months ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Updated 2 years ago
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization☆43Updated last year
- ☆19Updated 2 years ago
- XSSMaze is a web service designed to test and improve the performance of security testing tools by providing various cases of XSS vulnera…☆29Updated 2 weeks ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆21Updated 2 years ago
- Subtron is a professional-grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆23Updated last month
- Mass Reverse IP Lookup is a multithreaded tool to reverse ip lookup a list of ip addresses using yougetsignal.com .☆20Updated 5 years ago
- my own 2fa bypass methodolgy☆25Updated 2 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆11Updated 2 years ago
- POC exploit for CVE-2015-10141☆30Updated 2 months ago
- A small and efficient tool to find open redirect vulnerabilities.☆17Updated 4 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆34Updated last year
- Find subdomains by searching public certificate records☆16Updated last year
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆45Updated last year
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆16Updated 2 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆20Updated last year
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆35Updated 2 years ago
- A BurpSuite extension for vulnerability Scanning☆27Updated last year
- This script is used to search for cloud certificate entities such as Amazon, Azure, and others that have been extracted by the kaeferjaeg…☆49Updated 10 months ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆33Updated last year