Exploit for PrestaShop bockwishlist module 2.1.0 SQLi (CVE-2022-31101)
☆25Aug 9, 2022Updated 3 years ago
Alternatives and similar repositories for CVE-2022-31101
Users that are interested in CVE-2022-31101 are comparing it to the libraries listed below
Sorting:
- CVE-2022-32119 - Arox-Unrestricted-File-Upload☆17Dec 20, 2023Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆25Aug 1, 2022Updated 3 years ago
- A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.☆116Jan 31, 2025Updated last year
- Apache Spark Shell Command Injection Vulnerability☆89Sep 7, 2022Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Mar 27, 2024Updated last year
- Email addresses harvester☆18May 3, 2016Updated 9 years ago
- ☆46Nov 5, 2025Updated 4 months ago
- An Bug Hunters tool to find many Vulnerabilities using Google dorks☆19Nov 18, 2020Updated 5 years ago
- Hackthebox automation scripts and writeups.☆22Jan 27, 2020Updated 6 years ago
- ☆88Jul 31, 2022Updated 3 years ago
- ELF Sectional docking payload injector system☆21Jun 28, 2022Updated 3 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆20Aug 9, 2022Updated 3 years ago
- CVE-2022-36946 linux kernel panic in netfilter_queue☆22Jun 21, 2024Updated last year
- ☆27May 14, 2022Updated 3 years ago
- ☆38Feb 9, 2025Updated last year
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆34Jan 26, 2026Updated last month
- BBSSRF - Bug Bounty SSRF is a powerful tool to check SSRF OOB connection☆38Apr 3, 2023Updated 2 years ago
- ☆11Jun 10, 2025Updated 8 months ago
- Educational Python implementation of RSA cryptosystem featuring key generation, encryption/decryption, and Base64 key exchange. Designed …☆10May 20, 2025Updated 9 months ago
- Extendable Python script handler for automating penetration testing.☆40Mar 3, 2023Updated 3 years ago
- Looks for parameters in urls☆34Oct 14, 2024Updated last year
- A simple DNS exfiltration script☆11Apr 17, 2023Updated 2 years ago
- Software Exploitation☆11Sep 22, 2025Updated 5 months ago
- ☆10Feb 28, 2023Updated 3 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Jul 19, 2024Updated last year
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆41May 18, 2022Updated 3 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆90Oct 8, 2023Updated 2 years ago
- A pre-authenticated RCE exploit for Inductive Automation Ignition☆48Jul 18, 2022Updated 3 years ago
- Just some public notes that can be useful and i want let the world knows.☆88Oct 18, 2020Updated 5 years ago
- PATRIOTIC - Pervasive Anti-Tampering and Anti-Repackaging for IoT for Integrated C-based Firmware☆10Jan 26, 2023Updated 3 years ago
- A Collection of all things Security☆11Sep 24, 2020Updated 5 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It support…☆15Feb 2, 2025Updated last year
- ☆11Mar 19, 2019Updated 6 years ago
- A python RCE exploit on QNAP-QTS☆14Sep 15, 2020Updated 5 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- perl, non-alphanumeric, php☆10Mar 16, 2017Updated 8 years ago