223 skills found · Page 3 of 8
kaifcodec / Apk Patchxapk-patchx a command-line tool that makes APK manipulation & frida-gadget injection fast, automated, modular, and developer-friendly.
0xf4n9x / CVE 2022 46169CVE-2022-46169 Cacti remote_agent.php Unauthenticated Command Injection.
verylazytech / CVE 2024 10914POC - CVE-2024–10914- Command Injection Vulnerability in `name` parameter for D-Link NAS
bmdyy / TestrTESTR - A Vulnerable Python Web-App to practice XSS and Command Injection
afang5472 / TP Link WDR Router Command Injection POCCVE-2019-6487. A command injection vulnerability in TP-Link WDR5620 Series up to verion 3.
Wh1terat / AQRootG3Enable telnet via qrcode command injection for Aqara G3 hub
V33RU / CommandInWiFi ZeroclickCommandInWiFi: Exploiting SSID Storage in WiFi Scanning for Command Injection
wildkindcc / CVE 2018 9276CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)
gildasio / WshlientA simple tool to interact with web shells and command injection vulnerabilities
horizon3ai / CVE 2024 23108CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection
wannazid / XWanAddress brute-forcing for quota injection via VMess, Trojan, and VLESS. Command-line based utilizing Xray core.
infodox / Web Exploitation EngineGeneric Command Exploitation Engine for exploiting web application command-injection bugs,.
jbaines-r7 / Victorian MachineryProof of concept exploit for CVE-2022-30525 (Zxyel firewall command injection)
Gamingwithlogout / HacksByLogoutIts a automatic PAYLOAD injector tools for kali linux powered by LogOut AKA Ethical Hacker. ##First os all make install of all the files required during this process . you can directly do it by installation script i.e. install.sh on the main folder. Run ./install.sh OR install the following packages 1. metasploit-framework 2. Android Debug Bridge(ADB) 3. Fastboot 4. colorama for python 5. Python3 Be sure to setup or place the HacksByLogout folder on root directory of system and not to touch or edit any files or it may cause you to stop working. Steps You need to follow!!!! (1) Just enter your IP of device. Note: you can check your ip using ifconfig command in terminal. (2) Enter the port : Note: I usually recommend using 8080, 4444, 5555 or any 4 digit number as a port since it is very necessary, you need to use the port . (3) turn on usb debugging on your device and plug it for 10 seconds. Time depend upon your internet connection and system power. (4) After the injection , it will automatic open msf console so that it will be easy for you. (5) type the commands given to you on opened terminal. After exploit just tap or launch the installed PAYLOAD for single time and you will be connected. MAKING PAYLOAD SECURE!!! after connection just type the following command and hit enter. hide_app_icon this let you to hide your PAYLOAD and make it undetectable by user. use help command to list the things you can do. Copyright@HacksByLogOut
ihebski / CVE 2024 3400CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect
Nicolas-Arsenault / Havoc C2 RCE 2024Abusing SSRF to deliver an authenticated command injection payload
git5loxosec / RMETAshellrMETAshell takes a shell command and an image, video or text file as input. It then injects the command into the file using metadata comments. After injection, it generates a one-liner execution method for retrieving and executing the injected command from a remote location.
YasserREED / NoBlindiNoBlindi is a command-line tool for exploiting blind NoSQL injection vulnerabilities to recover passwords in web applications.
hudacbr / Webpwn3rwebpwn3r ======== WebPwn3r - Web Applications Security Scanner. By Ebrahim Hegazy - @Zigoo0 Thanks: @lnxg33k, @dia2diab @Aelhemily, @okamalo Please send all your feedback and suggestions to: zigoo.blog['at']@gmail.com How to use: 1- python scan.py 2- The tool will ask you if you want to scan URL or List of urls? 1- Enter number 1 to scan a URL 2- Enter number 2 to scan list of URL's 3- URL should be a full link with a parameters .e.g http://localhost/rand/news.php?com=val&id=11&page=24&text=zigoo same thing with the list of links. Demo Video: https://www.youtube.com/watch?v=B6kDUk-ehOE In it’s Current Public [Demo] version, WebPwn3r got below Features: 1- Scan a URL or List of URL’s 2- Detect and Exploit Remote Code Injection Vulnerabilities. 3- ~ ~ ~ Remote Command Execution Vulnerabilities. 4- ~ ~ ~ SQL Injection Vulnerabilities. 5- ~ ~ ~ Typical XSS Vulnerabilities. 6- Detect WebKnight WAF. 7- Improved Payloads to bypass Security Filters/WAF’s. 8- Finger-Print the backend Technologies. More details: http://www.sec-down.com/wordpress/?p=373
zeronine9 / Blind SPOTBlind spot is a python tool for blind injection vulnerabilities , SQLi time based , Command injection , code injection , SSTI