Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege escalation vector.
☆64Nov 16, 2022Updated 3 years ago
Alternatives and similar repositories for werkzeug-debug-console-bypass
Users that are interested in werkzeug-debug-console-bypass are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- "VMBreaker" is a specialized tool for virtual machine security testing, offering essential, user-friendly features for efficient penetrat…☆13Apr 15, 2024Updated 2 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- CVE-2023-46818 Python3 Exploit for ISPConfig <= 3.2.11 (language_edit.php) PHP Code Injection Vulnerability☆15Apr 16, 2025Updated last year
- LimeSurvey Authenticated RCE☆24Jul 16, 2023Updated 2 years ago
- ☆20Nov 14, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A tool collection of various attacks on TLS based on TLS-Attacker☆23Jun 25, 2025Updated 9 months ago
- Yet another Werkzeug Console Pin Exploit Explanation☆23Jul 30, 2021Updated 4 years ago
- A free, open-source, multi-lingual, template-based VDP policy, safe harbor clause, securitytxt, and DNS Security TXT generator.☆16Mar 28, 2026Updated 3 weeks ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- A python based minimal DNS server to test/verify DNS rebinding attacks☆75May 15, 2023Updated 2 years ago
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆10Dec 16, 2017Updated 8 years ago
- ☆13Dec 30, 2024Updated last year
- Sample Spring application to Demonstrate the Gateway Actuator☆49Mar 3, 2022Updated 4 years ago
- The script checks Jenkins endpoints for CVE-2024-43044 by retrieving the Jenkins version from the innstance and comparing it against know…☆19Aug 8, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Get a reverse shell using PostgreSQL☆21Aug 16, 2024Updated last year
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆135Aug 20, 2018Updated 7 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- Proof of concept for abusing SeLoadDriverPrivilege (Privilege Escalation in Windows)☆164Jun 14, 2018Updated 7 years ago
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- Official Writeups for HackTheBox Business CTF 2025: Operation Blackout☆63Jun 5, 2025Updated 10 months ago
- A wordlist repository with human-curated and reviewed content.☆127Oct 24, 2023Updated 2 years ago
- RCE PoC for Tensorflow using a malicious Lambda layer☆61Jul 30, 2025Updated 8 months ago
- Tool to read and translate morse code from picture.☆19Aug 11, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Parse HPROF files from the Spring Boot Heapdump Actuator☆28Jun 11, 2024Updated last year
- Query various sources for CVE proof-of-concepts☆53Jun 1, 2023Updated 2 years ago
- Reverse shell cheat sheet☆38Nov 11, 2022Updated 3 years ago
- Multiple Brute Force XMLRPC [Wordpress]☆14Jun 27, 2022Updated 3 years ago
- KeePass 2.X dumper (CVE-2023-32784)☆27Nov 4, 2023Updated 2 years ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆171Jun 29, 2025Updated 9 months ago
- Exploit for CVE-2024-27198 - TeamCity Server☆36Dec 19, 2024Updated last year
- CVE-2022-1292 OpenSSL c_rehash Vulnerability - POC☆28Jul 20, 2022Updated 3 years ago
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆83Feb 21, 2019Updated 7 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆29Oct 1, 2025Updated 6 months ago
- Hackthebox tools☆13Mar 3, 2019Updated 7 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- A script that gives you the credentials of a Pterodactyl panel vulnerable to CVE-2025-49132☆17Jun 22, 2025Updated 9 months ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- IIS shortname scanner written in Go☆353Mar 25, 2023Updated 3 years ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆145Oct 27, 2019Updated 6 years ago