Python package dependency confusion vulnerability POC. Impact this vulnerability is Remote code execution (RCE)
☆12Apr 29, 2025Updated 10 months ago
Alternatives and similar repositories for Python_dependency_confusion_attacks
Users that are interested in Python_dependency_confusion_attacks are comparing it to the libraries listed below
Sorting:
- CVE-2025-3248 Langflow RCE Exploit☆16Jun 17, 2025Updated 9 months ago
- CVE-2024-34102: Unauthenticated Magento XXE☆14Jan 12, 2025Updated last year
- Statically built Nix binaries☆17Jan 27, 2020Updated 6 years ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆23May 15, 2024Updated last year
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- This script will find some basic vulns. I made this script for my daily hunting. The best feature about this script is just run it in bac…☆20Feb 19, 2024Updated 2 years ago
- Android third-party library Detection☆17Mar 7, 2020Updated 6 years ago
- nodecraw allows you to perform web crawling on specified URLs. It utilizes various modules and libraries to crawl web pages, extract info…☆13Aug 25, 2024Updated last year
- IRC-like chat program using POSIX advisory lock covert-channel on time namespaces☆23Nov 12, 2025Updated 4 months ago
- Long Form NLG Generation Based on Large Language Models☆18Jan 31, 2024Updated 2 years ago
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- ☆79Apr 29, 2024Updated last year
- ☆13Oct 27, 2020Updated 5 years ago
- ☆13Jan 4, 2022Updated 4 years ago
- A collaborative effort to liberate Sonos devices from their cloudy masters.☆13May 7, 2021Updated 4 years ago
- EH-Bble☆10Jul 23, 2019Updated 6 years ago
- A curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆78Dec 3, 2023Updated 2 years ago
- Statically compiled binaries for various architectures.☆18Oct 12, 2022Updated 3 years ago
- Arlo file format helper☆16Mar 7, 2024Updated 2 years ago
- Good resources about web security that I have read.☆27Jul 23, 2023Updated 2 years ago
- Kavosh: a new algorithm for finding network motifs☆17Oct 1, 2014Updated 11 years ago
- Python based Denial of Service attack script based on Slow Loris☆20Jul 24, 2024Updated last year
- This Is The Ultimate Bug Bounty Automation & Web Hacking Tool That I've Created.☆28Feb 27, 2023Updated 3 years ago
- A command-line whois - like client for the WHOIS and WHOIS History APIs by WhoisXML API Inc.☆19Feb 9, 2022Updated 4 years ago
- My bug bounty notes☆35Apr 10, 2021Updated 4 years ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆36Dec 8, 2023Updated 2 years ago
- ☆37May 19, 2023Updated 2 years ago
- Find alive host from dumped subdomains, huge domain list , alive subdomains