Proof-of-Concept for Authorization Bypass in Next.js Middleware
β19Mar 23, 2025Updated last year
Alternatives and similar repositories for CVE-2025-29927-PoC-Exploit
Users that are interested in CVE-2025-29927-PoC-Exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities π΅οΈββοΈ using Metasploit π. Learn how to idβ¦β12May 25, 2025Updated 10 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privilegesβ27Nov 20, 2024Updated last year
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at onceβ13Jul 14, 2022Updated 3 years ago
- β13Jun 26, 2023Updated 2 years ago
- NRefactory - Refactoring Your C# Codeβ15Apr 9, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Thanks to @d35haβ13Aug 16, 2021Updated 4 years ago
- Easy discovery of assetsβ13Jun 22, 2022Updated 3 years ago
- Small tool to decode ASP.NET __VIEWSTATE variable when doing webpentestsβ15Feb 27, 2021Updated 5 years ago
- Program to Encrypt/Decrypt audio files from audiocubes.β36Aug 30, 2024Updated last year
- Reconnaisance Toolβ12Jun 4, 2020Updated 5 years ago
- ToolShell scanner - CVE-2025-53770 and detection informationβ18Dec 7, 2025Updated 4 months ago
- Collection of antivirus bypass techniquesβ13Nov 20, 2023Updated 2 years ago
- β12Aug 27, 2025Updated 7 months ago
- Terminate the eventlog thread to disable the windows eventlogβ21Apr 1, 2020Updated 6 years ago
- Deploy open-source AI quickly and easily - Bonus Offer β’ AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- AI-powered Windows Event Log analyzer that learns from your feedback. Uses Claude AI with RAG to detect suspicious activity, improve acβ¦β37Dec 18, 2025Updated 3 months ago
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do notβ¦β18Feb 20, 2026Updated last month
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab providβ¦β10Sep 20, 2023Updated 2 years ago
- My lab notes and learning progress for the PortSwigger Web Security Academy's SQL Injection chapter.β12Aug 10, 2023Updated 2 years ago
- C++ project used for quickly querying all files/directories located on an NTFS volume/partition. It works by reading and parsing file recβ¦β24Aug 26, 2025Updated 7 months ago
- Argument injection vulnerability in PHPβ13Jun 15, 2024Updated last year
- A tool designed to detect the vulnerability **CVE-2025-31650** in Apache Tomcat (versions 10.1.10 to 10.1.39)β20Apr 30, 2025Updated 11 months ago
- β27Mar 6, 2025Updated last year
- Documentation for Blueprint build with Jigsawβ11Dec 9, 2025Updated 4 months ago
- Deploy open-source AI quickly and easily - Bonus Offer β’ AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Exploit for CVE-2022-26134: Confluence Pre-Auth Remote Code Execution via OGNL Injectionβ13Jul 24, 2022Updated 3 years ago
- nmap nse script for scan a whole countryβ13Jun 28, 2022Updated 3 years ago
- VTC - Velociraptor Timeline Creatorβ19May 15, 2024Updated last year
- Puppeteer Recaptcha solverβ10Jan 10, 2024Updated 2 years ago
- PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivβ¦β51Jan 16, 2025Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)β43Sep 15, 2024Updated last year
- CVE-2023-2640 CVE-2023-32629β13Aug 15, 2023Updated 2 years ago
- A Python-based tool designed to capture IP addresses and NTLM authentication hashes from remote Windows clients using Telegram (lack of bβ¦β28Mar 31, 2025Updated last year
- RobotScraper is a simple tool written in Python to check each of the paths found in the robots.txt file and what HTTP response code they β¦β14Jul 23, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacksβ23Jun 22, 2021Updated 4 years ago
- Bitrix vulnerability scannerβ23Mar 28, 2023Updated 3 years ago
- CVE-2025-29927 Proof of Conceptβ98Mar 23, 2025Updated last year
- This IP2Location Nmap script provides a fast lookup of country, region, city, latitude, longitude, ZIP code, time zone, ISP, domain name,β¦β19Dec 31, 2025Updated 3 months ago
- A Nuclei template to detect CVE-2025-29927 the Next.js authentication bypass vulnerabilityβ18Mar 23, 2025Updated last year
- Detect whether a site is running behind Cloudflare.β24Jun 16, 2024Updated last year
- Simple CLI-oriented utility to test proxiesβ19Oct 24, 2020Updated 5 years ago