jhonnybonny / CVE-2024-23334Links
aiohttp LFI (CVE-2024-23334)
☆27Updated last year
Alternatives and similar repositories for CVE-2024-23334
Users that are interested in CVE-2024-23334 are comparing it to the libraries listed below
Sorting:
- Burp extension used to snip any header from all the requests.☆23Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Updated last year
- Unauthorized Access to Metadata and User Data like CTF☆27Updated 7 months ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆21Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)☆29Updated last year
- CVE-2023-7028☆59Updated last year
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆29Updated 11 months ago
- exfiltration/infiltration toolkit☆23Updated last year
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last year
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated last year
- Repo for all my exploits/PoCs☆51Updated 2 months ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆31Updated 11 months ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆47Updated 6 months ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- ☆13Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆17Updated last year
- CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow☆24Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆17Updated 11 months ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆12Updated 7 months ago
- ☆34Updated 10 months ago
- ☆18Updated 7 months ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Updated 10 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated 11 months ago
- BoltWire v6.03 vulnerable to "Improper Access Control"☆13Updated last year