yubsy / Wordpress-ExploitsLinks
Collection of Exploit, CVES(Unauthenticated) and Wordpress Scanners
☆97Updated 2 years ago
Alternatives and similar repositories for Wordpress-Exploits
Users that are interested in Wordpress-Exploits are comparing it to the libraries listed below
Sorting:
- The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.☆90Updated 2 years ago
- Huge Collection of Wordpress Exploits and CVES☆124Updated 2 years ago
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆81Updated 2 years ago
- CVE Collection of jQuery UI XSS Payloads☆119Updated 2 years ago
- 403-bypass tool to bypass 403 responses.☆119Updated 2 years ago
- Log4jScanner is a Log4j Related CVEs Scanner, Designed to Help Penetration Testers to Perform Black Box Testing on given subdomains.☆51Updated 3 years ago
- Unofficial Acunetix CLI tool for automated pentesting and bug hunting across large scopes.☆82Updated last year
- Wordlist for web fuzzing, made from a variety of reliable sources including: result from my pentests, git.rip, ChatGPT, Lex, nuclei templ…☆102Updated 3 months ago
- A Complete SSRF (Server Side Request Forgery) Scanner.☆37Updated 5 months ago
- Payload for bug bounty☆95Updated last year
- Bypass WAF SQL Injection SQLMAP☆192Updated 3 years ago
- Will attempt to retrieve DB details for FastAdmin instances☆67Updated 10 months ago
- All Type of Payloads☆136Updated last year
- Fetches JavaScript files quickly and comprehensively.☆126Updated 2 years ago
- CVE Collection of jQuery XSS Payloads☆71Updated 2 years ago
- CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC☆118Updated last year
- ☆73Updated 3 months ago
- ☆21Updated 2 years ago
- A Python tool to resolve domains to IPs, fetch related CVEs, and display open ports☆15Updated 6 months ago
- A burp suite extension that reviews backup, old, temporary and unreferenced files on web server for sensitive information (OWASP WSTG-CON…☆162Updated last year
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization☆42Updated last year
- ☆68Updated 2 years ago
- Web API for nuclei and subfinder will help you automate your entire security testing workflow since you can host it anywhere and make it …☆61Updated 2 years ago
- A collection of useful lists for Penetration Testing & Bug Bounty - Content Discovery, Payloads, Variables, Sandbox Escaping, etc☆103Updated 4 months ago
- Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing☆147Updated 4 months ago
- Bypass Cloudflare getting real ip address bruteforcing ipv4 ranges☆85Updated 3 years ago
- A Burp Suite extension to extract datas from source code while browsing.☆158Updated last year
- phpMyAdmin XSS☆116Updated 8 months ago
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆75Updated last year
- Go script for bypassing 403 forbidden☆157Updated 3 years ago