PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals vulnerabilities in PrestaShop E-Commerce
☆31Dec 26, 2023Updated 2 years ago
Alternatives and similar repositories for PrestaXSRF
Users that are interested in PrestaXSRF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆29Dec 19, 2023Updated 2 years ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆73Dec 28, 2023Updated 2 years ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Dec 24, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆17Nov 24, 2023Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)☆29Nov 15, 2023Updated 2 years ago
- CVE-2023-7028☆58Jan 12, 2024Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆129Dec 23, 2025Updated 3 months ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Apr 13, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Feb 20, 2026Updated last month
- Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution☆83Feb 6, 2024Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- Simplify your life with leak detection in JavaScript. NipeJS streamlines the use of regex, making it effortless to uncover potential leak…☆95Aug 9, 2024Updated last year
- This repository presents a proof-of-concept of CVE-2024-23897☆16Apr 16, 2024Updated last year
- PoC Script for CVE-2023-4596, unauthenticated Remote Command Execution through arbitrary file uploads.☆24Aug 28, 2025Updated 7 months ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆59Dec 15, 2023Updated 2 years ago
- MajorDoMo Unauthenticated RCE: Deep Dive & Exploitation Techniques☆15Dec 18, 2023Updated 2 years ago
- CVE-2023-34960 Chamilo PoC☆34Jun 9, 2023Updated 2 years ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆61Nov 22, 2024Updated last year
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- ☆41Oct 20, 2023Updated 2 years ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- DomainTrail is a fast subdomain enumeration tool that uses effective passive and active techniques.☆41Apr 18, 2024Updated last year
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tools to Exploit Bitwarden v2023.3.0 with Windows Hello☆32Jan 3, 2024Updated 2 years ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- A Series of Tweets☆15Jan 30, 2024Updated 2 years ago
- This repository contains combined exploits for two vulnerabilities in Moodle, a widely used open-source learning management system (LMS)☆17Mar 13, 2024Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Jul 4, 2022Updated 3 years ago
- Simple Latest CVE Collector Written in Python☆59Feb 29, 2024Updated 2 years ago