wdahlenburg / werkzeug-debug-console-bypassLinks
Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege escalation vector.
☆62Updated 3 years ago
Alternatives and similar repositories for werkzeug-debug-console-bypass
Users that are interested in werkzeug-debug-console-bypass are comparing it to the libraries listed below
Sorting:
- LFI to RCE via phpinfo() assistance or via controlled log file☆73Updated 2 years ago
- Squid Pivoting Open Port Scanner☆90Updated last year
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆71Updated 4 years ago
- Becoming the spider, crawling through the webs to catch the fly.☆80Updated 4 years ago
- Root shell PoC for CVE-2021-3156☆71Updated 4 years ago
- ☆42Updated 2 years ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆66Updated 7 months ago
- generate payloads that force authentication against an attacker machine☆116Updated 3 years ago
- A python based minimal DNS server to test/verify DNS rebinding attacks☆69Updated 2 years ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆141Updated 6 years ago
- Aspx reverse shell☆118Updated 5 years ago
- ☆125Updated 3 years ago
- A webshell plugin and interactive shell for pentesting a WordPress website.☆102Updated 2 years ago
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆105Updated 4 months ago
- Static binaries, removing any required dependencies from the operating system. Gziped files availabe to download via curl onto your targ…☆81Updated 3 years ago
- Dockerized labs For Web Expert (OSWE) certification. Preparation for coming AWAE Training ...☆119Updated 4 years ago
- SSTI Payload Generator☆92Updated 3 years ago
- Enumerate / Dump Docker Registry☆180Updated last year
- Python Duo Push API☆41Updated 6 months ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆91Updated last year
- POC for CVE-2024-23897 Jenkins File-Read☆37Updated 3 weeks ago
- TUDO - A vulnerable PHP Web Application☆123Updated 2 years ago
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆129Updated 2 years ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆121Updated 4 months ago
- CVE-2023-2255 Libre Office☆63Updated 2 years ago
- POC for CVE-2021-41091☆65Updated 2 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆24Updated 10 months ago
- Phar + JPG Polyglot generator and playground (CTF CODE)☆94Updated 7 years ago
- Peas create serialized payload for deserialization RCE attack on python driven applications where pickle ,pyYAML, ruamel.yaml or jsonpick…☆124Updated 2 years ago
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆29Updated 2 years ago