wdahlenburg / werkzeug-debug-console-bypassView external linksLinks
Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege escalation vector.
☆62Nov 16, 2022Updated 3 years ago
Alternatives and similar repositories for werkzeug-debug-console-bypass
Users that are interested in werkzeug-debug-console-bypass are comparing it to the libraries listed below
Sorting:
- A python based minimal DNS server to test/verify DNS rebinding attacks☆70May 15, 2023Updated 2 years ago
- Yet another Werkzeug Console Pin Exploit Explanation☆23Jul 30, 2021Updated 4 years ago
- Exploit codes for rconfig <= 3.9.4☆12Mar 17, 2020Updated 5 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- ☆13Dec 30, 2024Updated last year
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆11Feb 6, 2024Updated 2 years ago
- CVE-2023-46818 Python3 Exploit for ISPConfig <= 3.2.11 (language_edit.php) PHP Code Injection Vulnerability☆15Apr 16, 2025Updated 10 months ago
- Privilege escalation in Docker☆31Jun 30, 2022Updated 3 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- A wordlist repository with human-curated and reviewed content.☆121Oct 24, 2023Updated 2 years ago
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆10Dec 16, 2017Updated 8 years ago
- ☆20Nov 14, 2024Updated last year
- A free, open-source, multi-lingual, template-based VDP policy, safe harbor clause, securitytxt, and DNS Security TXT generator.☆15May 28, 2025Updated 8 months ago
- Hackthebox tools☆12Mar 3, 2019Updated 6 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- A one-liner command to archive, compress, encrypt, split and sign files.☆16Sep 8, 2025Updated 5 months ago
- Toy version of the sweet32 attack☆16Nov 24, 2017Updated 8 years ago
- Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.☆15Jul 30, 2020Updated 5 years ago
- Compiled dataset of Java deserialization CVEs☆60Aug 31, 2020Updated 5 years ago
- Get a reverse shell using PostgreSQL☆20Aug 16, 2024Updated last year
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Apr 12, 2022Updated 3 years ago
- Query various sources for CVE proof-of-concepts☆53Jun 1, 2023Updated 2 years ago
- A very high performance Domain Name parser package in Go.☆49Aug 27, 2021Updated 4 years ago
- A weird and wonderful console based tool for pentesting web applications☆19Apr 20, 2020Updated 5 years ago
- ☆25Oct 1, 2025Updated 4 months ago
- Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion in Python3☆24Feb 27, 2023Updated 2 years ago
- Vulnerability analysis and PoC for the Apache Tomcat - CGIServlet enableCmdLineArguments Remote Code Execution (RCE)☆22Sep 4, 2021Updated 4 years ago
- 🐋 Pipe builds your Docker image locally, transfers only the changed layers to your server, and starts your container. It's like git push…☆24Dec 27, 2025Updated last month
- Generating payloads to reverse shell in different contexts of java.☆50Jul 7, 2022Updated 3 years ago
- Sample Spring application to Demonstrate the Gateway Actuator☆48Mar 3, 2022Updated 3 years ago
- ☆23Mar 29, 2022Updated 3 years ago
- CVE PoCs☆21Jul 16, 2020Updated 5 years ago
- Framework for blind boolean-based sql injections exploatation. Use it if sqlmap does shit.☆29Mar 26, 2022Updated 3 years ago
- Wfuzz fork☆39Jan 10, 2025Updated last year
- Proof of concept for abusing SeLoadDriverPrivilege (Privilege Escalation in Windows)☆161Jun 14, 2018Updated 7 years ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆25Feb 11, 2023Updated 3 years ago
- KeePass 2.X dumper (CVE-2023-32784)☆25Nov 4, 2023Updated 2 years ago
- Kerberoast with ACL abuse capabilities☆603Dec 16, 2024Updated last year