wdahlenburg / werkzeug-debug-console-bypassLinks
Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege escalation vector.
☆61Updated 2 years ago
Alternatives and similar repositories for werkzeug-debug-console-bypass
Users that are interested in werkzeug-debug-console-bypass are comparing it to the libraries listed below
Sorting:
- LFI to RCE via phpinfo() assistance or via controlled log file☆69Updated 2 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 4 years ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆65Updated 4 months ago
- Aspx reverse shell☆112Updated 5 years ago
- A webshell plugin and interactive shell for pentesting a WordPress website.☆91Updated 2 years ago
- generate payloads that force authentication against an attacker machine☆109Updated 2 years ago
- SSTI Payload Generator☆91Updated 3 years ago
- Becoming the spider, crawling through the webs to catch the fly.☆76Updated 4 years ago
- Squid Pivoting Open Port Scanner☆82Updated 8 months ago
- TESTR - A Vulnerable Python Web-App to practice XSS and Command Injection☆39Updated 2 years ago
- This script will bruteforce the credential of tomcat manager or host-manager☆22Updated 5 years ago
- Root shell PoC for CVE-2021-3156☆69Updated 4 years ago
- ☆42Updated last year
- Dockerized labs For Web Expert (OSWE) certification. Preparation for coming AWAE Training ...☆110Updated 4 years ago
- Enumerate / Dump Docker Registry☆180Updated last year
- TUDO - A vulnerable PHP Web Application☆121Updated 2 years ago
- CVE-2023-2255 Libre Office☆60Updated 2 years ago
- A utility for automating the testing and re-signing of Express.js cookie secrets.☆59Updated 2 years ago
- CLI monitor for windows process- & file activity☆89Updated 4 years ago
- ☆122Updated 2 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆24Updated 7 months ago
- Collection Of Reverse Shell that can easily generate using Python3☆60Updated last year
- ☆30Updated 4 years ago
- ☆27Updated 2 years ago
- ☆89Updated last month
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆110Updated 2 weeks ago
- Collection of username lists for enumerating kerberos domain users☆97Updated 7 years ago
- ☆161Updated 3 years ago
- Get a reverse shell using PostgreSQL☆20Updated last year
- Exploit to dump ipmi hashes☆35Updated 2 years ago