xaitax / CVE-2024-6387_CheckLinks
CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH
☆507Updated 7 months ago
Alternatives and similar repositories for CVE-2024-6387_Check
Users that are interested in CVE-2024-6387_Check are comparing it to the libraries listed below
Sorting:
- PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC☆303Updated last year
- MIRROR of the original 32-bit PoC for CVE-2024-6387 "regreSSHion" by 7etsuo/cve-2024-6387-poc☆124Updated last year
- a signal handler race condition in OpenSSH's server (sshd)☆491Updated last year
- This repository presents a proof-of-concept of CVE-2023-7028☆242Updated last year
- Local Privilege Escalation to Root via Sudo chroot in Linux☆435Updated 6 months ago
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆510Updated last year
- This Python script allows you to generate Nessus Professional Keys directly without having to fill out the registration form. It simplifi…☆109Updated last year
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆178Updated 9 months ago
- Nessus Professional 2023 Manual Crack - No Backdoors/Virus☆124Updated 2 years ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆628Updated last week
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆165Updated last year
- HTTP 403 bypass tool☆611Updated last year
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆334Updated 4 months ago
- Nmap Dashboard Mini Project☆621Updated last year
- A command-line scanner for batch detection of Next.js application versions and determining if they are affected by CVE-2025-66478 vulnera…☆391Updated 3 weeks ago
- CVE-2025-29927 Proof of Concept☆93Updated 9 months ago
- A fast WordPress plugin enumeration tool☆747Updated last week
- ☆352Updated 2 years ago
- LazyHunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs☆229Updated 9 months ago
- Latest CVEs with their Proof of Concept exploits.☆1,063Updated this week
- Phishing with a fake reCAPTCHA☆633Updated last year
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆434Updated this week
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆390Updated 9 months ago
- Original PoC for CVE-2023-32784☆644Updated 2 years ago
- NucleiScanner is a Powerful Automation tool for detecting Unknown Vulnerabilities in the Web Applications☆337Updated 9 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆431Updated last year
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆779Updated last year
- Automation tool to testing and confirm the xss vulnerability.☆303Updated 5 months ago
- Unauthenticated Remote Code Execution via unsafe deserialization in Microsoft SharePoint Server (CVE-2025-53770)☆55Updated 5 months ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,263Updated last week