so1icitx / CVE-2024-25600View external linksLinks
Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.
☆13Apr 5, 2025Updated 10 months ago
Alternatives and similar repositories for CVE-2024-25600
Users that are interested in CVE-2024-25600 are comparing it to the libraries listed below
Sorting:
- WordPress XML-RPC & WP-Login Bruteforce + Auto Uploader Powerful asynchronous bruteforce tool for WordPress sites via wp-login.php and …☆20Apr 22, 2025Updated 9 months ago
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆19Feb 8, 2023Updated 3 years ago
- PoC for CVE-2024-42327 / ZBX-25623☆17Dec 3, 2024Updated last year
- AutoExploiter Wordpress , Joomla , Drupal☆18Mar 27, 2018Updated 7 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated last month
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆34Jan 18, 2026Updated 3 weeks ago
- ☆34Apr 16, 2022Updated 3 years ago
- Mobus write and read applications, standalone.☆10Jun 27, 2025Updated 7 months ago
- ☆11Apr 18, 2022Updated 3 years ago
- WordPress auto exploit☆29Dec 28, 2017Updated 8 years ago
- Jenkins WebInspect Plugin Publisher provides the ability to upload a WebInspect scan file, from your Jenkins server to your Fortify Softw…☆11Dec 23, 2025Updated last month
- Final year project in Magshimim, focusing on Python development and Web Exploitation.☆10Apr 29, 2023Updated 2 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- fofa+xray vul scan golang☆10Sep 19, 2021Updated 4 years ago
- This repository features Zyra, a crypto wallet tool that includes functionality for checking balances using mnemonic seed phrases. It all…☆12Aug 21, 2024Updated last year
- Goby-Poc-Collection for Goby scanner https://github.com/gobysec/Goby - forked from many github accounts Thanks the authors☆12Dec 10, 2023Updated 2 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- ☆13Nov 30, 2023Updated 2 years ago
- ☆11Feb 10, 2022Updated 4 years ago
- Webapp builder: The easy (and fast) way to create a web project☆13Jul 3, 2017Updated 8 years ago
- Lightweight reflection scanner☆20Aug 31, 2025Updated 5 months ago
- 0day-today-archive: Historical collection of exploits and vulnerabilities from 0day.today☆33Sep 22, 2025Updated 4 months ago
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- A google dork parser that bypasses captcha's automatically.☆17Jul 15, 2025Updated 7 months ago
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- A web crawler written in PHP php网络蜘蛛,信息收集工具A web spider, using php, based on cURL & simple html dom.☆12Feb 18, 2015Updated 10 years ago
- my nuclei templates #new☆11Jun 24, 2024Updated last year
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Feb 1, 2023Updated 3 years ago
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- 基于机器学习的Webshell检测工具☆12May 15, 2023Updated 2 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- perl, non-alphanumeric, php☆10Mar 16, 2017Updated 8 years ago
- Exploit for Joomla JCK Editor 6.4.4 (CVE-2018-17254)☆10Apr 17, 2021Updated 4 years ago
- An patch porting qwingraph (wingraph written in qt4) to qt5.☆10Aug 21, 2019Updated 6 years ago
- Quake Command-Line Application With Golang☆10Jul 20, 2023Updated 2 years ago
- Parser library for 8SVX: digitally sampled audio voices consisting of 8-bit samples☆12Mar 2, 2024Updated last year