Python script for exploiting Werkzeug Debug RCE useful for CTF
☆39Feb 18, 2020Updated 6 years ago
Alternatives and similar repositories for Werkzeug-Debug-RCE
Users that are interested in Werkzeug-Debug-RCE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OpenNetAdmin 18.1.1 - Remote Code Execution☆31Feb 11, 2020Updated 6 years ago
- Windows Privilege Escalation☆23Jun 7, 2022Updated 3 years ago
- 📨 Quick tool to finds and extract email addresses from a body of text☆12Apr 15, 2023Updated 2 years ago
- ☆16Oct 24, 2018Updated 7 years ago
- Fuzzapi is a tool used for REST API pentesting and uses Fuzzapi gem☆15May 30, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Yet another Werkzeug Console Pin Exploit Explanation☆23Jul 30, 2021Updated 4 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 6 years ago
- coremail address list export☆12Sep 9, 2021Updated 4 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- This project is an AES loader for c2 shellcode☆36Jan 24, 2024Updated 2 years ago
- GQL Burp Extension☆21Sep 16, 2022Updated 3 years ago
- CTF, wargame cheatsheet☆33Nov 29, 2018Updated 7 years ago
- Single purpose repository for a Docker image with multiple Python versions installed☆12Jun 28, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆16Aug 28, 2014Updated 11 years ago
- POC for CVE-2020-13151☆39Aug 3, 2020Updated 5 years ago
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆16Feb 1, 2026Updated 2 months ago
- CVE-2023-46818 Python3 Exploit for ISPConfig <= 3.2.11 (language_edit.php) PHP Code Injection Vulnerability☆15Apr 16, 2025Updated 11 months ago
- Lsass dumper evading (all ?) EDR detection☆51Nov 10, 2025Updated 5 months ago
- An easy way to maintain your WSL distros. Being able to reduce disk usage, move wsl and restore from vhdx file☆11Mar 12, 2026Updated last month
- A simple JavaScript package that returns random Unicode emojis. 📜☆14Jan 26, 2026Updated 2 months ago
- Bug Bounty Recon Automation Script -- Scan AWS IP Range Certs for Matching FQDN☆27Sep 17, 2021Updated 4 years ago
- A Burp Suite extension to add a custom header (e.g. JWT)☆20Dec 9, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Custom C++ Reverse Shell POC | No AV Bypass Techniques or Tweaks Done | AVT Detection ratio: 2/61☆39Apr 15, 2017Updated 8 years ago
- Perform operations on URLs like extracting paths, parameter names and/or values, domain name, host name (without HTTP[s]).☆29Aug 19, 2020Updated 5 years ago
- A simple Swagger-ui scanner that can detect old versions vulnerable to various XSS attacks☆60Aug 30, 2019Updated 6 years ago
- Using this script, you can enumerate Usernames and passwords of Nosql(mongodb) injecion vulnerable web applications.☆173Nov 29, 2019Updated 6 years ago
- Simple veracrypt container cracker using wordlist☆17May 14, 2021Updated 4 years ago
- Find orphaned IP's on cloud services☆29Oct 23, 2019Updated 6 years ago
- A custom script I created because I got tired of installing my tools manually!☆13Nov 19, 2024Updated last year
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆20Mar 12, 2023Updated 3 years ago
- CTF pwnable cheatsheet☆20Feb 15, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- 一个神一般的linux全架构全漏洞提权程序☆13Updated this week
- A repository hosting some of my own vulnerability reports and proof-of-concepts.☆15Aug 8, 2019Updated 6 years ago
- An ArchLinux GUI installer that focuses on generating a customizable mkrootfs script.☆16Nov 3, 2021Updated 4 years ago
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Apr 12, 2022Updated 4 years ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆156Nov 2, 2025Updated 5 months ago
- XOR crypt/decrypt using C#☆12Sep 30, 2020Updated 5 years ago
- Yet another subdomain finder☆211Jan 20, 2020Updated 6 years ago