Automated All-in-One OS Command Injection Exploitation Tool
-
Updated
Feb 28, 2026 - Python
Automated All-in-One OS Command Injection Exploitation Tool
Local File Inclusion discovery and exploitation tool
Egyscan The Best web vulnerability scanner; it's a multifaceted security powerhouse designed to fortify your web applications against malicious threats. Let's delve into the tasks and functions that make Egyscan an indispensable tool in your security arsenal:
Waymap is a fast and optimized web vulnerability scanner built for penetration testers. It helps in identifying vulnerabilities by testing against various payloads.
Exploit for CVE-2022–25765 (pdfkit) - Command Injection
Perform with Massive Command Injection (Chamilo)
CVE-2018-19537
Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215
The largest hacking program with new tools CVE-2023-PoC for the year 2023 It contains all the attack and exploitation tools for testing websites, as well as a graphical interface to facilitate its use for beginners
Blind RCE fuzzer
PoC Script for CVE-2022-36267: Exploits an unauthenticated remote command injection vulnerability in Airspan AirSpot 5410 antenna.
A PoC exploit for CVE-2019-15107 - Webmin Remote Code Execution
Proof of concept for the command injection vulnerability affecting the ZTE MF286R router, including an RCE exploit.
The manage engine mass loader for CVE-2022-47966
CVE-2020-8958: Authenticated RCE exploit for NetLink HG323
PoC Script for CVE-2022-36553: Exploits an unauthenticated remote command injection vulnerability in Hytec Inter HWL-2511-SS device.
Implementation of A Web Fuzzer for Detecting XSS, Command and SQL Injection Vulnerabilities in Websites
Exploit toolkit for old ip cameras. Inspired by Black Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood Hacker
Exploit Code, notes, and resources to accompany PortSwiggers' WebAcademy Labs.
Enterprise-grade WebSocket security scanner with Smart Payload Evolution, real-time MitM interceptor, and 22 integrated web pentesting tools. Built for penetration testers, bug bounty hunters, and red teams.
Add a description, image, and links to the command-injection topic page so that developers can more easily learn about it.
To associate your repository with the command-injection topic, visit your repo's landing page and select "manage topics."