POC for CVE-2023-24488
β14Jul 4, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2023-24488
Users that are interested in CVE-2023-24488 are comparing it to the libraries listed below
Sorting:
- γπ₯γCVE-2022-33891 - Apache Spark Command Injectionβ25Aug 1, 2022Updated 3 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]β11Jul 14, 2023Updated 2 years ago
- β12Jan 30, 2025Updated last year
- Hun2race is an automated report generation tool designed for bug hunters and penetration testers.β14Sep 17, 2024Updated last year
- Extract metadata with SSRF (Server-Side Request Forgery)β16Jul 23, 2022Updated 3 years ago
- CVE-2023-1671-POC, based on dnslog platformβ17Apr 26, 2023Updated 2 years ago
- Sample Vulnerable and Secure Code Snippets for Various Vulnerabilitiesβ23Jun 18, 2024Updated last year
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)β21Feb 5, 2024Updated 2 years ago
- CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secureβ95Feb 2, 2024Updated 2 years ago
- Cloudpanel 0-day Exploitβ56Jul 24, 2023Updated 2 years ago
- Lexmark CVE-2023-26067β28Aug 8, 2023Updated 2 years ago
- Repository of useful payloads and tips for pentesting/bug bounty.β30Nov 15, 2024Updated last year
- Basic PoC for CVE-2023-27524: Insecure Default Configuration in Apache Supersetβ111Sep 9, 2023Updated 2 years ago
- Authentication Bypass in GoAnywhere MFTβ65Jan 23, 2024Updated 2 years ago
- CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POCβ118Jul 29, 2023Updated 2 years ago
- this script will help you find favicon hashes which you can use to shodan to get more details about an assetβ30Mar 18, 2025Updated 11 months ago
- Check if domain has bug bounty program or notβ28Jul 28, 2023Updated 2 years ago
- β60Oct 9, 2024Updated last year
- CVE-2023-26255_POC,CVE-2023-26256_POCβ32Aug 24, 2023Updated 2 years ago
- Manjaro LPEβ34Jul 6, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"β14Dec 8, 2023Updated 2 years ago
- Subdomain Recon Toolβ13Sep 11, 2022Updated 3 years ago
- β15Mar 21, 2025Updated 11 months ago
- My Notes & Resources Of Bug Bounty Checklistsβ83Dec 28, 2024Updated last year
- bounty collectionβ41Sep 1, 2024Updated last year
- CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Informationβ34Jul 19, 2024Updated last year
- β42Jul 31, 2024Updated last year
- CVE Collection of jQuery XSS Payloadsβ75Jan 4, 2023Updated 3 years ago
- WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) <= 7.6.4 - Authentication Bypassβ81Jul 6, 2023Updated 2 years ago
- A FireBase DataBase TakeOver Tool along with POC Generatorβ35Sep 16, 2021Updated 4 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.β11May 6, 2023Updated 2 years ago
- β12Jul 4, 2024Updated last year
- Bat Script to collect system and network information from Windows machines without external agents. Ideal for vulnerability assessment anβ¦β11Jan 27, 2025Updated last year
- β13Sep 28, 2024Updated last year
- Tooll for sql injections scanβ11Jul 17, 2018Updated 7 years ago
- Take control of a remote machine using reverse shells in python(The hacking side of python)β10May 23, 2023Updated 2 years ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..β10Aug 15, 2024Updated last year
- RepoToStoreBugBountyInfoβ11Mar 11, 2020Updated 5 years ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.β10Oct 27, 2024Updated last year