Proof-of-Concept for Authorization Bypass in Next.js Middleware
β19Mar 23, 2025Updated last year
Alternatives and similar repositories for CVE-2025-29927-PoC-Exploit
Users that are interested in CVE-2025-29927-PoC-Exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities π΅οΈββοΈ using Metasploit π. Learn how to idβ¦β13May 25, 2025Updated 11 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privilegesβ27Nov 20, 2024Updated last year
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at onceβ13Jul 14, 2022Updated 3 years ago
- A WordPress rest-enumeration scriptβ10Mar 16, 2026Updated last month
- β13Jun 26, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- NRefactory - Refactoring Your C# Codeβ15Apr 9, 2026Updated 3 weeks ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.β20Dec 10, 2022Updated 3 years ago
- Easy discovery of assetsβ13Jun 22, 2022Updated 3 years ago
- Small tool to decode ASP.NET __VIEWSTATE variable when doing webpentestsβ15Feb 27, 2021Updated 5 years ago
- Program to Encrypt/Decrypt audio files from audiocubes.β36Aug 30, 2024Updated last year
- Reconnaisance Toolβ12Jun 4, 2020Updated 5 years ago
- ToolShell scanner - CVE-2025-53770 and detection informationβ19Dec 7, 2025Updated 5 months ago
- β12Aug 27, 2025Updated 8 months ago
- Terminate the eventlog thread to disable the windows eventlogβ21Apr 1, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits β’ AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- AI-powered Windows Event Log analyzer that learns from your feedback. Uses Claude AI with RAG to detect suspicious activity, improve acβ¦β37Dec 18, 2025Updated 4 months ago
- β13Jul 12, 2021Updated 4 years ago
- Chat GPT translatorβ10Feb 20, 2023Updated 3 years ago
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do notβ¦β19Feb 20, 2026Updated 2 months ago
- This script will not work with the latest version of chromeβ15May 11, 2025Updated 11 months ago
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab providβ¦β10Sep 20, 2023Updated 2 years ago
- My lab notes and learning progress for the PortSwigger Web Security Academy's SQL Injection chapter.β12Aug 10, 2023Updated 2 years ago
- Cross-Site Scripting (XSS) is a common vulnerability that allows attackers to inject malicious scripts into web pages viewed by users. Inβ¦β11Sep 10, 2024Updated last year
- C++ project used for quickly querying all files/directories located on an NTFS volume/partition. It works by reading and parsing file recβ¦β24Aug 26, 2025Updated 8 months ago
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Argument injection vulnerability in PHPβ13Jun 15, 2024Updated last year
- A tool designed to detect the vulnerability **CVE-2025-31650** in Apache Tomcat (versions 10.1.10 to 10.1.39)β20Apr 30, 2025Updated last year
- β27Mar 6, 2025Updated last year
- Find alive host from dumped subdomains, huge domain list , alive subdomainsβ26Mar 29, 2021Updated 5 years ago
- Exploit for CVE-2022-26134: Confluence Pre-Auth Remote Code Execution via OGNL Injectionβ13Jul 24, 2022Updated 3 years ago
- Pre-auth RCE in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0.β60Dec 9, 2025Updated 4 months ago
- VTC - Velociraptor Timeline Creatorβ19May 15, 2024Updated last year
- An experimental Velociraptor implementation using cloud infrastructureβ26Dec 2, 2025Updated 5 months ago
- PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivβ¦β51Jan 16, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- CVE-2023-2640 CVE-2023-32629β13Aug 15, 2023Updated 2 years ago
- A Python-based tool designed to capture IP addresses and NTLM authentication hashes from remote Windows clients using Telegram (lack of bβ¦β28Mar 31, 2025Updated last year
- This is my own custom fork of Bhassani's original repo, which contains the (unfinished) reverse-engineered WannaCry Ransomware-related fiβ¦β10Mar 7, 2023Updated 3 years ago
- A collection of tools and scripts for customizing and enhancing your MyFaba storytelling box. Unlock new features, personalize your experβ¦β117Mar 8, 2026Updated last month
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacksβ23Jun 22, 2021Updated 4 years ago
- Bitrix vulnerability scannerβ23Mar 28, 2023Updated 3 years ago
- A performance insights and knowledge assistant agent built on top of Chrome DevTools internals, Mastra, AI SDK and NextJSβ21Apr 22, 2026Updated 2 weeks ago