shamo0 / CVE-2023-38646-PoCLinks
Metabase Pre-auth RCE
☆12Updated last year
Alternatives and similar repositories for CVE-2023-38646-PoC
Users that are interested in CVE-2023-38646-PoC are comparing it to the libraries listed below
Sorting:
- Classic Web shell upload techniques & Web RCE techniques☆30Updated 7 months ago
- ☆74Updated last year
- ☆39Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- ☆55Updated 2 years ago
- CVE-2023-4634☆46Updated last year
- External recon toolkit☆48Updated 5 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )☆60Updated 11 months ago
- Automatic Tools For Metabase Exploit Known As CVE-2023-38646☆27Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆61Updated 6 months ago
- My personal collection of nuclei templates made for fuzzing.☆27Updated 9 months ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆26Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆38Updated 2 years ago
- CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script w…☆23Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- Web cache poisoning vulnerability scanner.☆68Updated 3 years ago
- ☆68Updated last year
- Exploits targeting vBulletin.☆76Updated 2 years ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆44Updated last year
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆37Updated 2 years ago
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆30Updated 2 years ago
- JaelesFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications☆20Updated last year
- ☆44Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- HydrAttack PoC eMail Spoofer Module is designed to test the security posture of a domain against email spoofing attacks. It performs step…☆20Updated 2 months ago
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆54Updated 7 months ago
- A Complete SSRF (Server Side Request Forgery) Scanner.☆37Updated 4 months ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆27Updated 2 years ago