wdahlenburg / werkzeug-debug-console-bypassView external linksLinks
Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege escalation vector.
☆62Nov 16, 2022Updated 3 years ago
Alternatives and similar repositories for werkzeug-debug-console-bypass
Users that are interested in werkzeug-debug-console-bypass are comparing it to the libraries listed below
Sorting:
- A tool collection of various attacks on TLS based on TLS-Attacker☆21Jun 25, 2025Updated 7 months ago
- A python based minimal DNS server to test/verify DNS rebinding attacks☆70May 15, 2023Updated 2 years ago
- Yet another Werkzeug Console Pin Exploit Explanation☆23Jul 30, 2021Updated 4 years ago
- Exploit codes for rconfig <= 3.9.4☆12Mar 17, 2020Updated 5 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- "VMBreaker" is a specialized tool for virtual machine security testing, offering essential, user-friendly features for efficient penetrat…☆13Apr 15, 2024Updated last year
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆11Feb 6, 2024Updated 2 years ago
- CVE-2023-46818 Python3 Exploit for ISPConfig <= 3.2.11 (language_edit.php) PHP Code Injection Vulnerability☆15Apr 16, 2025Updated 10 months ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- A wordlist repository with human-curated and reviewed content.☆121Oct 24, 2023Updated 2 years ago
- ☆20Nov 14, 2024Updated last year
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆10Dec 16, 2017Updated 8 years ago
- Tool to read and translate morse code from picture.☆19Aug 11, 2020Updated 5 years ago
- A one-liner command to archive, compress, encrypt, split and sign files.☆16Sep 8, 2025Updated 5 months ago
- Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.☆15Jul 30, 2020Updated 5 years ago
- A simple reverse and as well a webshell that recognices the OS (Windows/Linux).☆16Nov 11, 2020Updated 5 years ago
- Enumerate AWS permissions and resources.☆70Jun 23, 2022Updated 3 years ago
- Get a reverse shell using PostgreSQL☆20Aug 16, 2024Updated last year
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Apr 12, 2022Updated 3 years ago
- Query various sources for CVE proof-of-concepts☆53Jun 1, 2023Updated 2 years ago
- CrlfiX☆21Jan 30, 2025Updated last year
- Vulnerability analysis and PoC for the Apache Tomcat - CGIServlet enableCmdLineArguments Remote Code Execution (RCE)☆22Sep 4, 2021Updated 4 years ago
- Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion in Python3☆24Feb 27, 2023Updated 2 years ago
- A weird and wonderful console based tool for pentesting web applications☆19Apr 20, 2020Updated 5 years ago
- Generating payloads to reverse shell in different contexts of java.☆50Jul 7, 2022Updated 3 years ago
- ☆107Dec 13, 2019Updated 6 years ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆143Oct 27, 2019Updated 6 years ago
- Sample Spring application to Demonstrate the Gateway Actuator☆48Mar 3, 2022Updated 3 years ago
- CVE-2022-1292 OpenSSL c_rehash Vulnerability - POC☆28Jul 20, 2022Updated 3 years ago
- Wfuzz fork☆39Jan 10, 2025Updated last year
- CVE PoCs☆21Jul 16, 2020Updated 5 years ago
- Framework for blind boolean-based sql injections exploatation. Use it if sqlmap does shit.☆29Mar 26, 2022Updated 3 years ago
- ☆23Mar 29, 2022Updated 3 years ago
- Proof of concept for abusing SeLoadDriverPrivilege (Privilege Escalation in Windows)☆161Jun 14, 2018Updated 7 years ago
- KeePass 2.X dumper (CVE-2023-32784)☆26Nov 4, 2023Updated 2 years ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆25Feb 11, 2023Updated 3 years ago
- Kerberoast with ACL abuse capabilities☆606Dec 16, 2024Updated last year
- Tool to enable blind sql injection attacks against websockets using sqlmap☆66Apr 30, 2025Updated 9 months ago