wdahlenburg / werkzeug-debug-console-bypass
Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege escalation vector.
☆55Updated 2 years ago
Alternatives and similar repositories for werkzeug-debug-console-bypass:
Users that are interested in werkzeug-debug-console-bypass are comparing it to the libraries listed below
- generate payloads that force authentication against an attacker machine☆105Updated 2 years ago
- ☆81Updated 8 months ago
- Squid Pivoting Open Port Scanner☆67Updated 3 months ago
- CLI monitor for windows process- & file activity☆83Updated 4 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 3 years ago
- Aspx reverse shell☆105Updated 5 years ago
- ☆39Updated last year
- A webshell plugin and interactive shell for pentesting a WordPress website.☆84Updated last year
- SSTI Payload Generator☆89Updated 2 years ago
- ☆60Updated 2 years ago
- Root shell PoC for CVE-2021-3156☆67Updated 4 years ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆62Updated 2 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆22Updated 2 months ago
- ☆34Updated 2 years ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆58Updated last year
- A cheatsheet for NetExec☆114Updated last month
- TUDO - A vulnerable PHP Web Application.☆103Updated 2 years ago
- Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.☆105Updated 2 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆71Updated last year
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- Journey so Far☆22Updated 3 years ago
- Repo for OSWE related video content for @SecAura Youtube Channel☆32Updated 3 years ago
- Exploit to dump ipmi hashes☆32Updated last year
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆138Updated 9 months ago
- Shell Simulation over Net-SNMP with extend functionality☆95Updated 4 years ago
- ☆28Updated 4 years ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆94Updated 10 months ago
- Get a reverse shell using PostgreSQL☆17Updated 7 months ago
- Enumerate / Dump Docker Registry☆173Updated 11 months ago
- ☆38Updated 2 years ago