CVE-2024-2879 - LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection
☆23Apr 8, 2024Updated last year
Alternatives and similar repositories for CVE-2024-2879
Users that are interested in CVE-2024-2879 are comparing it to the libraries listed below
Sorting:
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Apr 5, 2024Updated last year
- Simple username generator based on a list of name and surname☆13May 20, 2021Updated 4 years ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Dec 28, 2022Updated 3 years ago
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆18Jul 16, 2024Updated last year
- Welcome to the 403 and 401 Bypass Techniques and Bug Bounty Tips repository! This repo is a collection of methods and strategies to bypas…☆19Dec 26, 2024Updated last year
- Hacking with PasteJacking technique☆22Jul 2, 2024Updated last year
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated last year
- Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)☆51Jul 14, 2025Updated 7 months ago
- ☆29May 22, 2024Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)☆28Mar 16, 2024Updated last year
- Numbeo Unofficial API☆15Oct 16, 2022Updated 3 years ago
- ☆14Nov 21, 2025Updated 3 months ago
- ☆12Mar 19, 2023Updated 2 years ago
- Recreating GunZ: The Duel in the browser using Three.js☆12Feb 28, 2026Updated last week
- Antlr4 / Javascript example☆10Mar 3, 2018Updated 8 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- A remapper for Touhou Project☆12Mar 24, 2023Updated 2 years ago
- ☆21Jul 25, 2017Updated 8 years ago
- ☆13Jun 29, 2023Updated 2 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- ☆11Sep 19, 2022Updated 3 years ago
- Vulnerabilities, security advisories, exploit codes and proof-of-concept codes.☆10Mar 1, 2026Updated last week
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- Offshore.CAT provides DMCA-ignored offshore hosting solutions. Built with HTML and CSS, it offers an intuitive interface for seamless int…☆18Sep 9, 2025Updated 6 months ago
- ☆28Jan 19, 2026Updated last month
- CyberPanel 2.3.6 pre-auth RCE☆40Oct 27, 2024Updated last year
- Standalone Metasploit-like XOR encoder for shellcode☆51May 12, 2024Updated last year
- TOOL - Unauthenticated Remote DNS , Scanner ranger IP.☆11Feb 18, 2015Updated 11 years ago
- Simple KDMapper driver dumper. Unlike other dumpers, this dumper dumps the PE headers of the image too.☆17May 10, 2024Updated last year
- ☆11Dec 8, 2023Updated 2 years ago
- ☆15Updated this week
- Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to…☆13May 30, 2022Updated 3 years ago
- ☆13Mar 11, 2023Updated 2 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- ☆12Apr 26, 2022Updated 3 years ago
- 🌈 Render PowerShell in the Terminal with Syntax Highlighting☆10May 25, 2023Updated 2 years ago
- A .Net Core MVC webshell☆11Sep 8, 2018Updated 7 years ago