wdahlenburg / werkzeug-debug-console-bypass
Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege escalation vector.
☆52Updated 2 years ago
Alternatives and similar repositories for werkzeug-debug-console-bypass:
Users that are interested in werkzeug-debug-console-bypass are comparing it to the libraries listed below
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆69Updated 3 years ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆60Updated last year
- Tool to enable blind sql injection attacks against websockets using sqlmap☆58Updated last year
- generate payloads that force authentication against an attacker machine☆97Updated 2 years ago
- ☆39Updated last year
- ☆78Updated 5 months ago
- SSTI Payload Generator☆89Updated 2 years ago
- Shell Simulation over Net-SNMP with extend functionality☆93Updated 4 years ago
- Some tips for Bug Bounty using LibreOffice☆36Updated this week
- This script will bruteforce the credential of tomcat manager or host-manager☆20Updated 4 years ago
- Phar + JPG Polyglot generator and playground (CTF CODE)☆75Updated 6 years ago
- Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell☆21Updated 3 years ago
- Aspx reverse shell☆98Updated 4 years ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- CLI monitor for windows process- & file activity☆78Updated 4 years ago
- Becoming the spider, crawling through the webs to catch the fly.☆72Updated 3 years ago
- Collection of username lists for enumerating kerberos domain users☆84Updated 7 years ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆119Updated 5 years ago
- Repo for OSWE related video content for @SecAura Youtube Channel☆32Updated 2 years ago
- Python exploit for the CVE-2021-22204 vulnerability in Exiftool☆90Updated 3 years ago
- ☆59Updated 2 years ago
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆68Updated 10 months ago
- ☆33Updated 2 years ago
- ☆114Updated 2 years ago
- ☆25Updated 2 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆21Updated 2 years ago
- Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473☆105Updated 8 months ago
- POC for CVE-2020-13151☆29Updated 4 years ago
- POC for CVE-2021-41091☆64Updated last year
- A cheat sheet for CrackMapExec and NetExec☆57Updated 3 weeks ago