ill-deed / CVE-2025-34085-Multi-targetLinks
Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers PHP webshells across large target sets.
☆31Updated 6 months ago
Alternatives and similar repositories for CVE-2025-34085-Multi-target
Users that are interested in CVE-2025-34085-Multi-target are comparing it to the libraries listed below
Sorting:
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆77Updated last year
- Bypass Reset Password Code Lead to Account Takeover☆26Updated last year
- ☆14Updated last year
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆32Updated last month
- Grep subdomains from web pages.☆42Updated 11 months ago
- ☆22Updated 10 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Updated 3 weeks ago
- This script is used to search for cloud certificate entities such as Amazon, Azure, and others that have been extracted by the kaeferjaeg…☆55Updated 2 months ago
- Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulner…☆56Updated 11 months ago
- 🔍 SubWatch – Automated Subdomain Monitoring Script☆39Updated 7 months ago
- A passive way to find backups/ sensitive information.☆87Updated 6 months ago
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆44Updated last year
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Updated 11 months ago
- Passive Web Vulnerability Detection Tool☆37Updated 8 months ago
- xsschecker tests endpoints for reflected XSS by injecting payloads and checking responses. It prints vulnerable if the payload is reflect…☆36Updated 2 months ago
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆43Updated 11 months ago
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆81Updated 9 months ago
- ☆109Updated 11 months ago
- ☆47Updated last year
- Url scrapper or extractor from alienvault☆37Updated 11 months ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Updated last year
- JScripter is a Python script designed to scrape and save unique JavaScript files from a list of URLs or a single URL.☆29Updated last year
- Collection of templates from various resources☆42Updated last month
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆36Updated 2 years ago
- Welcome to the 403 and 401 Bypass Techniques and Bug Bounty Tips repository! This repo is a collection of methods and strategies to bypas…☆19Updated last year
- ☆63Updated last year
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leve…☆41Updated last year
- A collaborative hub for Nuclei templates. Contribute, share, and explore powerful vulnerability detection tools!☆50Updated last year
- anveshan is a completed script that helps to automate your recon process, It finds subdomains, urls, js files, parameters, screenshots, a…☆30Updated last year
- ☆65Updated 2 years ago