Exploiting the xmlrpc.php on all WordPress versions
☆26Nov 4, 2022Updated 3 years ago
Alternatives and similar repositories for xmlrpc-exploit
Users that are interested in xmlrpc-exploit are comparing it to the libraries listed below
Sorting:
- Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin <= 5.7.14 - Unauthenticated SQL Injection☆20Sep 15, 2024Updated last year
- Shodan Favicon Hash Generator By Aziz Hakim @eternyle☆26May 25, 2024Updated last year
- A curated list of various bug bounty tools☆19Nov 7, 2021Updated 4 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- TensorFlow materials☆13Jan 8, 2021Updated 5 years ago
- CVE-2019–9193 - PostgreSQL 9.3-12.3 Authenticated Remote Code Execution☆20May 26, 2022Updated 3 years ago
- Additional nuclei templates☆38Oct 16, 2023Updated 2 years ago
- Basic Bash Script to scrape all subdomains from crtsh in a single run☆19May 23, 2022Updated 3 years ago
- Python Script to Print the name of the companies that are acquired by a Target Company and the Time of Acquisition.☆26Dec 5, 2021Updated 4 years ago
- CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7☆147Mar 28, 2022Updated 3 years ago
- Noobish Recon Automation☆20Feb 15, 2024Updated 2 years ago
- CVE-2024-28955 Exploitation PoC☆34Jul 1, 2024Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Oct 2, 2023Updated 2 years ago
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- oneliner commands for bug bounties☆461Jul 25, 2022Updated 3 years ago
- Solutions of xchg rax,rax☆15Jun 2, 2020Updated 5 years ago
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- Web cache poisoning vulnerability scanner.☆73May 5, 2022Updated 3 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Jun 6, 2024Updated last year
- ☆38Feb 9, 2025Updated last year
- CTF Writeups☆15Aug 20, 2023Updated 2 years ago
- Informer is a OSINT information gathering tool that gathers whois, Sub-domain ,DNS, geolocation and shodan information of the target.☆20Nov 8, 2022Updated 3 years ago
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆31Jan 25, 2017Updated 9 years ago
- High-speed Go email scraper that crawls sites and internal links concurrently to collect email addresses for reconnaissance, research, or…☆31Dec 18, 2025Updated 3 months ago
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Feb 15, 2022Updated 4 years ago
- Tool for testing reflections in the HTTP responses☆60Jun 10, 2023Updated 2 years ago
- A python script that finds endpoints in JavaScript files☆10Nov 29, 2019Updated 6 years ago
- Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)☆13Aug 22, 2025Updated 6 months ago
- NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems [USENIX Security '23]☆20Nov 17, 2022Updated 3 years ago
- Qakbot Registry Key Configuration Decryptor☆14Dec 20, 2021Updated 4 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago
- Pentesting Apache Tomcat 101☆14Apr 4, 2023Updated 2 years ago
- SPIP BigUp Plugin Unauthenticated RCE☆16Sep 7, 2024Updated last year
- learning case to prepare OSWE☆36Nov 4, 2019Updated 6 years ago
- Generic fuzzing wordlist to test for SQLi. Merged from different SQLi wordlists.☆17Jul 24, 2021Updated 4 years ago
- decompiled pegasus_spyware☆14Jul 31, 2021Updated 4 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago