jhonnybonny / CVE-2024-23334Links
aiohttp LFI (CVE-2024-23334)
☆27Updated last year
Alternatives and similar repositories for CVE-2024-23334
Users that are interested in CVE-2024-23334 are comparing it to the libraries listed below
Sorting:
- Unauthorized Access to Metadata and User Data like CTF☆27Updated 10 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- Burp extension used to snip any header from all the requests.☆23Updated last year
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Updated last year
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated last year
- CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow☆25Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆29Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- ☆38Updated 10 months ago
- CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)☆28Updated last year
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Updated last year
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆29Updated last year
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆18Updated last year
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Updated last year
- CVE-2023-7028☆59Updated last year
- Monitor your target continuously for new subdomains!☆24Updated 2 years ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆24Updated last year
- Repo for all my exploits/PoCs☆53Updated 5 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- ☆19Updated 10 months ago
- BoltWire v6.03 vulnerable to "Improper Access Control"☆13Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Updated last year
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Updated last year
- PoC for the CVE-2023-49103☆30Updated last year
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆12Updated 10 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year