shamo0 / CVE-2023-38646-PoC
Metabase Pre-auth RCE
☆12Updated last year
Alternatives and similar repositories for CVE-2023-38646-PoC
Users that are interested in CVE-2023-38646-PoC are comparing it to the libraries listed below
Sorting:
- CVE-2023-4634☆46Updated last year
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆30Updated 2 years ago
- ☆74Updated last year
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Updated last year
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- External recon toolkit☆48Updated 4 months ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆51Updated 2 years ago
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated last year
- Automatic Tools For Metabase Exploit Known As CVE-2023-38646☆27Updated last year
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- Classic Web shell upload techniques & Web RCE techniques☆30Updated 6 months ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆105Updated 2 years ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆37Updated last year
- CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script w…☆22Updated 2 years ago
- CVE-2022-21907 Vulnerability PoC☆27Updated 3 years ago
- ☆39Updated 2 years ago
- CVE-2024-27956 WordPress Automatic < 3.92.1 - Unauthenticated SQL Injection☆18Updated last year
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 3 months ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆27Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆37Updated 2 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆49Updated 11 months ago
- Unauthorized Access to Metadata and User Data like CTF☆26Updated 5 months ago
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE