gotr00t0day / CVE-2024-4577Links
Argument injection vulnerability in PHP
☆11Updated last year
Alternatives and similar repositories for CVE-2024-4577
Users that are interested in CVE-2024-4577 are comparing it to the libraries listed below
Sorting:
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆8Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆18Updated 2 years ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆12Updated 6 months ago
- CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)☆29Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Updated last year
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆8Updated last year
- ☆14Updated 3 months ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆17Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆23Updated last year
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated last year
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆18Updated last year
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆17Updated last year
- Automate Blind SQL Injection with Python.☆23Updated 2 years ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆31Updated 11 months ago
- VLAN attacks toolkit☆14Updated 2 years ago
- Find subdomains by searching public certificate records☆16Updated last year
- crawl a website for links and expose all the vulnerable parameters.☆13Updated 2 years ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆16Updated 3 years ago
- XML-RPC Vulnerability Checker and Directory Fuzzer☆24Updated last year
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Updated last year
- ☆18Updated last year
- xdebug 2.5.5 RCE exploit☆31Updated 5 months ago
- A small and fast bash script to automate LFI vulnerability.☆11Updated 2 years ago
- Rockyou for web fuzzing☆14Updated 3 years ago