win3zz / CVE-2023-43261Links
CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption
☆58Updated last year
Alternatives and similar repositories for CVE-2023-43261
Users that are interested in CVE-2023-43261 are comparing it to the libraries listed below
Sorting:
- CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC☆118Updated last year
- CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow☆24Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Updated 10 months ago
- A fast subdomain takeover tool☆81Updated last year
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆61Updated 5 months ago
- an exploit of Server-side request forgery (SSRF)☆50Updated 11 months ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆50Updated last year
- CVE-2023-7028☆59Updated last year
- Repo for all my exploits/PoCs☆51Updated 2 months ago
- APK Infrastructure Investigator☆63Updated 2 years ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated 2 weeks ago
- This repository contains the best fuzzing wordlist files☆34Updated 7 months ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- Unofficial Acunetix CLI tool for automated pentesting and bug hunting across large scopes.☆82Updated last year
- GeoServer Remote Code Execution☆81Updated 3 months ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆77Updated 4 months ago
- 「🚪」Linux Backdoor based on ICMP protocol☆64Updated 7 months ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- CVE-2024-27956 WordPress Automatic < 3.92.1 - Unauthenticated SQL Injection☆18Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 7 months ago
- Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution☆75Updated last year
- ☆13Updated last year
- Quicky serve files over http or https using flask.☆35Updated 5 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated 11 months ago
- Web Path Finder☆61Updated last year
- Origin IP scanning utility developed with ChatGPT☆69Updated 2 years ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last year
- CVE-2023-4634☆46Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Updated 10 months ago