Yet another Werkzeug Console Pin Exploit Explanation
☆23Jul 30, 2021Updated 4 years ago
Alternatives and similar repositories for werkzeug-pin
Users that are interested in werkzeug-pin are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Precompiled executable☆67Feb 21, 2025Updated last year
- Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell☆24Jan 13, 2022Updated 4 years ago
- Proof-of-Concept for Server Side Request Forgery (SSRF) in request-baskets (<= v.1.2.1)☆30Aug 9, 2023Updated 2 years ago
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆20Mar 12, 2023Updated 3 years ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Journey so Far☆32Feb 15, 2022Updated 4 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass☆12Dec 31, 2023Updated 2 years ago
- CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to uploa…☆13Jan 7, 2025Updated last year
- Dompdf RCE PoC Exploit - CVE-2022-28368☆16Jan 19, 2024Updated 2 years ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆64Nov 16, 2022Updated 3 years ago
- CBC Bit-Flipping Attack Example with Python☆13Jun 14, 2023Updated 2 years ago
- A GitHub Actions Supply Chain CTF / Goat☆27Updated this week
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- MITRE ATT&CK visualizations☆12Jan 28, 2022Updated 4 years ago
- Google Workspace password sprayer with anti-captcha☆14Mar 11, 2026Updated last month
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- A Collection of templates that can be used for abusing window's AlwaysInstallElevated policy☆39Jan 4, 2023Updated 3 years ago
- Python script for exploiting Werkzeug Debug RCE useful for CTF☆39Feb 18, 2020Updated 6 years ago
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆13Mar 15, 2023Updated 3 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52May 16, 2024Updated last year
- NotSoCereal: A Deserialization exploit playground☆54Jan 13, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Script to extract the cached credentials from SSSD, getting Active Directory credentials from Unix systems☆24Jun 14, 2023Updated 2 years ago
- Collection of Tools & Techniques for analyzing URLs☆32Oct 1, 2023Updated 2 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆135Aug 20, 2018Updated 7 years ago
- Lots of POC Codes & Preparation materials, scripts, discovery processes in there.☆15Feb 8, 2024Updated 2 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Oct 18, 2020Updated 5 years ago
- A simple extension for https://intra.42.fr that shows how many days you have left before you get absorbed by the Blackhole.☆13Oct 21, 2022Updated 3 years ago
- Vulnerable code snippets repository showcasing different vulnerabilities to practice code analysis skills.☆23Sep 4, 2023Updated 2 years ago
- A set of scripts to facilitate HTTP interception on mobile apps☆22Mar 11, 2026Updated last month
- ☆17Sep 2, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆130Sep 7, 2023Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆36Apr 9, 2022Updated 4 years ago
- Exploit for CVE-2022-26134: Confluence Pre-Auth Remote Code Execution via OGNL Injection☆13Jul 24, 2022Updated 3 years ago
- In-depth internals, my personal notes, example codes and projects. Includes - Thousands of codes, OOP, Concurrency, Parallelism, Gorouti…☆12Nov 25, 2020Updated 5 years ago
- All about Active Directory pentesting☆171Dec 29, 2020Updated 5 years ago
- ☆17Jul 13, 2016Updated 9 years ago
- Python unbup script for McAfee .bup files (with some additional fun features). This script is fully implemented in python it's not just a…☆37Apr 24, 2018Updated 7 years ago