im-hanzou / MSAPer
Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (Mass Add Admin + PHP File Upload)
☆16Updated 11 months ago
Related projects: ⓘ
- hacking tools☆14Updated last year
- ☆21Updated last year
- CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account Takeover☆27Updated last month
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆15Updated last year
- xdebug 2.5.5 RCE exploit☆29Updated 2 years ago
- ☆13Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated last month
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Another vulnerability scanner☆17Updated 10 months ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆15Updated 4 months ago
- This tool is designed to detect and identify Server-Side Template Injection (SSTI) vulnerabilities in web applications☆9Updated 8 months ago
- A Simple Script For SSH BruteForce☆33Updated last year
- This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness related…☆17Updated 2 years ago
- C2Matrix Automation☆11Updated last year
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆23Updated 9 months ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆14Updated last year
- Enumeration & fingerprint tool☆23Updated 6 months ago
- A wrapper around tools used for port scanning(nmap, naabu & masscan), the goal being reducing scan time, increasing scan efficiency and a…☆11Updated 6 months ago
- 「📖」Tool created to extract metadata from a domain☆13Updated last year
- Priv8 Tools Software Mass Dork Auto Exploit.☆11Updated last year
- Exploit for the unauthenticated file upload vulnerability in WordPress's Royal Elementor Addons and Templates plugin (< 1.3.79). CVE-ID: …☆9Updated 10 months ago
- Whspdefendor Exploit Framework v1.0☆13Updated 9 months ago
- Come on a tool to decode "MD5" + "Sha1" + "Sha256" even if it is very difficult☆12Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆10Updated last year
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆20Updated 4 months ago
- Automate Blind SQL Injection with Python.☆19Updated 2 years ago
- theHarvester is a very simple to use, yet powerful and effective tool designed to be used in the early stages of a penetration test or re…☆17Updated last year
- ☆17Updated this week
- Atlassian Confluence - Remote Code Execution☆9Updated 7 months ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆11Updated 7 months ago