roughiz / lfito_rceLinks
LFI to RCE via phpinfo() assistance or via controlled log file
☆72Updated 2 years ago
Alternatives and similar repositories for lfito_rce
Users that are interested in lfito_rce are comparing it to the libraries listed below
Sorting:
- Tool to enable blind sql injection attacks against websockets using sqlmap☆66Updated 7 months ago
- ☆42Updated 2 years ago
- ☆42Updated 2 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆71Updated 4 years ago
- Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473☆111Updated last year
- ☆28Updated 3 years ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆141Updated 6 years ago
- POC for CVE-2024-23897 Jenkins File-Read☆38Updated last month
- Exploit tool for CVE-2021-43008 Adminer 1.0 up to 4.6.2 Arbitrary File Read vulnerability☆87Updated last year
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆62Updated 3 years ago
- ☆34Updated 3 years ago
- Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800)☆77Updated last year
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆129Updated 2 years ago
- CVE-2023-33733 reportlab RCE☆117Updated 2 years ago
- Wordlist to bruteforce for LFI☆128Updated 6 years ago
- ☆91Updated 3 weeks ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆82Updated last year
- Collection Of Reverse Shell that can easily generate using Python3☆59Updated last year
- Enumerate / Dump Docker Registry☆180Updated last year
- Burp Extension to add additional functionality for pentesting websocket based applications☆101Updated 3 months ago
- ☆55Updated 10 months ago
- Repository to store exploits created by Assetnotes Security Research team☆179Updated 2 years ago
- Python exploit for the CVE-2021-22204 vulnerability in Exiftool☆94Updated 4 years ago
- A utility for automating the testing and re-signing of Express.js cookie secrets.☆58Updated 3 years ago
- Content-Security-Policy (CSP) Bypass Techniques☆70Updated 5 years ago
- Exploits targeting Symfony☆211Updated last year
- ☆41Updated last month
- Make better use of the embedded browser that comes by default with Burp☆45Updated last year
- Transition form local file inclusion attacks to remote code exection☆66Updated 5 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆30Updated 3 years ago