soltanali0 / CVE-2025-1094-ExploitView external linksLinks
WebSocket and SQL Injection Exploit Script
☆40Feb 27, 2025Updated 11 months ago
Alternatives and similar repositories for CVE-2025-1094-Exploit
Users that are interested in CVE-2025-1094-Exploit are comparing it to the libraries listed below
Sorting:
- ☆41Mar 12, 2025Updated 11 months ago
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆42Feb 19, 2025Updated 11 months ago
- Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.☆159Jun 13, 2025Updated 8 months ago
- ☆22Jul 15, 2023Updated 2 years ago
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆43Feb 24, 2025Updated 11 months ago
- CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web …☆83Jul 19, 2024Updated last year
- ☆27Feb 6, 2024Updated 2 years ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- Simple python3 script to automate CVE-2018-9995☆11Feb 20, 2024Updated last year
- A tool designed to detect the vulnerability **CVE-2025-31650** in Apache Tomcat (versions 10.1.10 to 10.1.39)☆18Apr 30, 2025Updated 9 months ago
- ☆19Nov 26, 2024Updated last year
- CVE-2023-21823 PoC☆14Apr 20, 2023Updated 2 years ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Feb 20, 2025Updated 11 months ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆18May 7, 2024Updated last year
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆22Apr 16, 2025Updated 9 months ago
- Elasticsearch Stack Overflow Vulnerability☆18Sep 23, 2023Updated 2 years ago
- A powerful Redis exploitation tool that leverages CVE-2025-4984☆63Oct 10, 2025Updated 4 months ago
- Will attempt to retrieve DB details for FastAdmin instances☆69Aug 20, 2024Updated last year
- ZTE F660 Routers Authentication Bypass Leading to RCE.☆19Feb 18, 2024Updated last year
- CVE-2025-1974☆90Apr 2, 2025Updated 10 months ago
- Top 400 passwords as per HaveIBeenPwned☆22Oct 14, 2024Updated last year
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆48Sep 16, 2024Updated last year
- An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to …☆23Jan 17, 2024Updated 2 years ago
- POC exploit for SMBLost vulnerability (CVE-2020-1301)☆17Jun 13, 2020Updated 5 years ago
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆96Nov 14, 2024Updated last year
- CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC☆20Nov 19, 2024Updated last year
- ☆24Nov 19, 2024Updated last year
- Log4jScanner is a Log4j Related CVEs Scanner, Designed to Help Penetration Testers to Perform Black Box Testing on given subdomains.☆49Sep 1, 2025Updated 5 months ago
- exploit for f5-big-ip RCE cve-2023-46747☆206Oct 20, 2024Updated last year
- This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.☆55Apr 18, 2024Updated last year
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Dec 18, 2023Updated 2 years ago
- Nuclei template and information about the POC for CVE-2024-25600☆31Feb 21, 2024Updated last year
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆65Dec 4, 2024Updated last year
- Powerful WiFi Hacking penetration testing tools for Linux, designed for ethical hacking, security testing, and network auditing.☆16Nov 18, 2025Updated 2 months ago
- Future version of the AnyBody Managed Model Repository with a full thoracic spine model.☆18Feb 2, 2026Updated last week
- ☆232Mar 13, 2025Updated 11 months ago
- Ollama AI Analyzer runs directly on your local computer, using Ollama's AI models to analyze your HTTP requests and responses. This means…☆32Mar 1, 2025Updated 11 months ago
- ☆35Apr 14, 2025Updated 10 months ago