wp-file-manager 6.7 (Aug 2020) Wordpress Plugin 0day - Remote Code Execution
☆75Oct 9, 2020Updated 5 years ago
Alternatives and similar repositories for wp-file-manager-0day
Users that are interested in wp-file-manager-0day are comparing it to the libraries listed below
Sorting:
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆12Nov 17, 2020Updated 5 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- AliGuard PHP WAF☆12Feb 16, 2024Updated 2 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this …☆23Aug 6, 2024Updated last year
- Gmail shell, for hackers execute commands via gmail☆19Feb 3, 2021Updated 5 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Random Exploits☆51Sep 12, 2023Updated 2 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Apr 13, 2023Updated 2 years ago
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- Yet another PHP Obfuscator☆33Jan 28, 2026Updated last month
- Mini Wordress Exploiter using CVE2020☆30Dec 25, 2020Updated 5 years ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆22Apr 22, 2024Updated last year
- 👤 🗑 Deletes users that did not log in in the last days.☆10Updated this week
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Dec 2, 2020Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Unicode encoding attacks with machine learning☆98Nov 25, 2021Updated 4 years ago
- https://medium.com/@mansoorr/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8☆58Oct 12, 2020Updated 5 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Jul 20, 2023Updated 2 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- Check arbitrary file download vulnerability in the WordPress☆22Feb 21, 2020Updated 6 years ago
- SonicWall VPN-SSL Exploit* using Golang ( * and other targets vulnerable to shellshock ).☆18Feb 11, 2021Updated 5 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Proof Of Concept code for OctoberCMS Auth Bypass CVE-2021-32648☆12Jan 14, 2022Updated 4 years ago
- SubDomain Finder☆13Nov 9, 2021Updated 4 years ago
- Elasticsearch to CSV Python Script☆11Jan 28, 2014Updated 12 years ago
- ☆11May 15, 2020Updated 5 years ago
- 010 Editor template for ACE archive format & CVE-2018-2025[0-3]☆26Feb 22, 2019Updated 7 years ago
- Raptor - Web application firewall [ Stable ]☆15Dec 8, 2016Updated 9 years ago
- ☆12Oct 7, 2020Updated 5 years ago
- Dashboard containing various recon tools☆14Oct 12, 2017Updated 8 years ago
- ☆15Apr 13, 2021Updated 4 years ago
- mikrot8over: Fast exploitation tool for Mikrotik RouterOS up to 6.38.4☆110Oct 7, 2020Updated 5 years ago
- Bucket Flaws ( S3 Bucket Mass Scanner ): A Simple Lightweight Script to Check for Common S3 Bucket Misconfigurations☆58Jul 26, 2020Updated 5 years ago