Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege escalation vector.
☆62Nov 16, 2022Updated 3 years ago
Alternatives and similar repositories for werkzeug-debug-console-bypass
Users that are interested in werkzeug-debug-console-bypass are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- "VMBreaker" is a specialized tool for virtual machine security testing, offering essential, user-friendly features for efficient penetrat…☆13Apr 15, 2024Updated last year
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- LimeSurvey Authenticated RCE☆24Jul 16, 2023Updated 2 years ago
- A tool collection of various attacks on TLS based on TLS-Attacker☆23Jun 25, 2025Updated 9 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- Yet another Werkzeug Console Pin Exploit Explanation☆23Jul 30, 2021Updated 4 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- A python based minimal DNS server to test/verify DNS rebinding attacks☆75May 15, 2023Updated 2 years ago
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆10Dec 16, 2017Updated 8 years ago
- ☆13Dec 30, 2024Updated last year
- A simple reverse and as well a webshell that recognices the OS (Windows/Linux).☆17Nov 11, 2020Updated 5 years ago
- Sample Spring application to Demonstrate the Gateway Actuator☆48Mar 3, 2022Updated 4 years ago
- Compiled dataset of Java deserialization CVEs☆60Aug 31, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Toy version of the sweet32 attack☆16Nov 24, 2017Updated 8 years ago
- Get a reverse shell using PostgreSQL☆21Aug 16, 2024Updated last year
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Apr 12, 2022Updated 3 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆131Aug 20, 2018Updated 7 years ago
- Generating payloads to reverse shell in different contexts of java.☆50Jul 7, 2022Updated 3 years ago
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- A wordlist repository with human-curated and reviewed content.☆126Oct 24, 2023Updated 2 years ago
- Privilege escalation in Docker☆31Jun 30, 2022Updated 3 years ago
- RCE PoC for Tensorflow using a malicious Lambda layer☆61Jul 30, 2025Updated 8 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A multithreaded Python3 program that fuzzes HTTP headers and values and outputs the results to a CSV file.☆21Jan 13, 2019Updated 7 years ago
- Parse HPROF files from the Spring Boot Heapdump Actuator☆29Jun 11, 2024Updated last year
- Resources required for my BiliBili Pwn tutorial☆12Feb 10, 2023Updated 3 years ago
- Query various sources for CVE proof-of-concepts☆53Jun 1, 2023Updated 2 years ago
- Reverse shell cheat sheet☆35Nov 11, 2022Updated 3 years ago
- Multiple Brute Force XMLRPC [Wordpress]☆14Jun 27, 2022Updated 3 years ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆171Jun 29, 2025Updated 9 months ago
- Exploit for CVE-2024-27198 - TeamCity Server☆36Dec 19, 2024Updated last year
- CVE-2022-1292 OpenSSL c_rehash Vulnerability - POC☆28Jul 20, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Hackthebox tools☆13Mar 3, 2019Updated 7 years ago
- ☆27Oct 1, 2025Updated 5 months ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- A script that gives you the credentials of a Pterodactyl panel vulnerable to CVE-2025-49132☆17Jun 22, 2025Updated 9 months ago
- Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion in Python3☆24Feb 27, 2023Updated 3 years ago
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆438Jul 29, 2013Updated 12 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago