gotr00t0day / CVE-2024-4577Links
Argument injection vulnerability in PHP
☆12Updated last year
Alternatives and similar repositories for CVE-2024-4577
Users that are interested in CVE-2024-4577 are comparing it to the libraries listed below
Sorting:
- POC exploit for CVE-2015-10141☆30Updated 5 months ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆18Updated last year
- CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)☆29Updated 2 years ago
- Subtron is a professional grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆24Updated 2 months ago
- Automated enumeration for red teamers☆10Updated 3 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆21Updated 2 years ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Updated last year
- A small and efficient tool to find open redirect vulnerabilities.☆17Updated 4 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated last year
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆21Updated last year
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆34Updated 2 years ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated 6 months ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆56Updated last year
- crawl a website for links and expose all the vulnerable parameters.☆14Updated 3 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- Passive Web Vulnerability Detection Tool☆37Updated 8 months ago
- CrlfiX☆20Updated 11 months ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Updated 2 years ago
- my own 2fa bypass methodolgy☆27Updated 2 years ago
- A command-line utility designed to discover subdomains for a given domain in a simple, efficient way. It works by gathering information f…☆115Updated last month
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆46Updated last year
- ☆19Updated last month
- This script is used to search for cloud certificate entities such as Amazon, Azure, and others that have been extracted by the kaeferjaeg…☆54Updated last month
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆33Updated last year
- XSSMaze is a web service designed to test and improve the performance of security testing tools by providing various cases of XSS vulnera…☆30Updated last week
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year
- Small python script to look for common vulnerabilities on SMTP server.☆49Updated 2 years ago
- ☆13Updated 2 years ago