wdahlenburg / werkzeug-debug-console-bypass
Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege escalation vector.
☆52Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for werkzeug-debug-console-bypass
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆69Updated 3 years ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆59Updated last year
- ☆39Updated 11 months ago
- generate payloads that force authentication against an attacker machine☆93Updated 2 years ago
- ☆71Updated 4 months ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆57Updated last year
- Shell Simulation over Net-SNMP with extend functionality☆89Updated 3 years ago
- ☆73Updated 4 months ago
- Enumerate / Dump Docker Registry☆162Updated 7 months ago
- Dockerized labs For Web Expert (OSWE) certification. Preparation for coming AWAE Training ...☆90Updated 3 years ago
- A webshell plugin and interactive shell for pentesting a WordPress website.☆76Updated last year
- Some tips for Bug Bounty using LibreOffice☆33Updated this week
- Becoming the spider, crawling through the webs to catch the fly.☆72Updated 3 years ago
- Peas create serialized payload for deserialization RCE attack on python driven applications where pickle ,pyYAML, ruamel.yaml or jsonpick…☆101Updated 11 months ago
- ☆111Updated 2 years ago
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆115Updated last year
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆113Updated 5 years ago
- Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473☆104Updated 6 months ago
- Root shell PoC for CVE-2021-3156☆62Updated 3 years ago
- SSTI Payload Generator☆88Updated 2 years ago
- ☆24Updated 2 years ago
- Aspx reverse shell☆93Updated 4 years ago
- CVE-2023-33733 reportlab RCE☆113Updated last year
- ☆58Updated 2 years ago
- Collection of username lists for enumerating kerberos domain users☆81Updated 6 years ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆119Updated 2 weeks ago
- Python exploit for the CVE-2021-22204 vulnerability in Exiftool☆89Updated 3 years ago
- TUDO - A vulnerable PHP Web Application.☆98Updated last year
- NotSoCereal: A Deserialization exploit playground☆50Updated 2 years ago
- Review of AWAE.OSWE☆30Updated 2 years ago