• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

bypass

  1. 1

    Exploits Trend Micro Deep Discovery Inspector Percent Encoding IDS Bypass

    Trend Micro Deep Discovery Inspector suffers from a percent encoding IDS bypass vulnerability. View the full article
  2. itsMe

    Bypass Google Protect on SpyMax by Assdsiwi

    Hidden content
  3. itsMe

    WhatWaf v1.5.4 Detect & bypass web application firewalls and protection systems

    WhatWaf is an advanced firewall detection tool whose goal is to give you the idea of “There’s a WAF?”. WhatWaf works by detecting a firewall on a web application and attempting to detect a bypass (or two) for said firewall, on the specified target. Features     Ability to run on a single URL...
  4. 1

    Exploits Huawei HG530 Reboot / Restore Authentication Bypass

    Huawei HG530 suffers from unauthenticated remote reboot and restore vulnerabilities. View the full article
  5. 1

    Exploits CentOS Control Web Panel 0.9.8.836 Authentication Bypass

    CentOS Control Web Panel version 0.9.8.836 suffers from an authentication bypass vulnerability. View the full article
  6. 1

    Exploits Citrix SD-WAN Appliance 10.2.2 Authentication Bypass / Remote Command Execution

    Citrix SD-WAN Appliance version 10.2.2 suffers from authentication bypass and remote command execution vulnerabilities. View the full article
  7. 1

    Exploits Netgear WiFi Router JWNR2010v5 / R6080 Authentication Bypass

    Netgear WiFi router versions JWNR2010v5 and R6080 suffer from authentication bypass vulnerabilities. View the full article
  8. 1

    Exploits WordPress Like Button 1.6.0 Authentication Bypass

    WordPress Like Button plugin version 1.6.0 suffers from an authentication bypass vulnerability. View the full article
  9. 1

    Exploits Windows Escalate UAC Protection Bypass Via SilentCleanup

    There's a task in Windows Task Scheduler called "SilentCleanup" which, while it's executed as Users, automatically runs with elevated privileges. When it runs, it executes the file %windir%\system32\cleanmgr.exe. Since it runs as Users, and we can control user's environment variables, %windir%...
  10. itsMe

    WhatWaf v1.5 Detect & bypass web application firewalls and protection systems

    WhatWaf is an advanced firewall detection tool whose goal is to give you the idea of “There’s a WAF?”. WhatWaf works by detecting a firewall on a web application and attempting to detect a bypass (or two) for said firewall, on the specified target. Features     Ability to run on a single URL...
  11. dEEpEst

    Ruby Script Bypass CloudFlare

    Hidden content
  12. 1

    Exploits ABB IDAL HTTP Server Authentication Bypass

    The IDAL HTTP server CGI interface contains a URL, which allows an unauthenticated attacker to bypass authentication and gain access to privileged functions. In the IDAL CGI interface, there is a URL (/cgi/loginDefaultUser), which will create a session in an authenticated state and return the...
  13. 1

    Exploits Microsoft Windows UAC Protection Bypass

    This script is a proof of concept to bypass the Microsoft Windows User Access Control (UAC) via SluiFileHandlerHijackLPE. View the full article
  14. 1

    Exploits RedwoodHQ 2.5.5 Authentication Bypass

    RedwoodHQ version 2.5.5 suffers from an authentication bypass vulnerability. View the full article
  15. 1

    Exploits Tzumi Electronics Klic Lock Authentication Bypass

    Tzumi Electronics Klic Lock version 1.0.9 allows for attackers to access resources via capture-replay. View the full article
  16. F B I

    IBombShell- PoC Warrior + Bypass UAC + Pass the hash

    Hidden content
  17. 1

    Exploits MacOS X 10.14.5 Gatekeeper Bypass

    MacOS X versions 10.14.5 and below suffer from a Gatekeeper bypass vulnerability. View the full article
  18. 1

    Exploits RSA NetWitness Authorization Bypass

    RSA NetWitness versions prior to 10.6.6.1 and 11.2.1.1 suffer from an issue where an unauthorized attacker can access an administrative resource that may contain plain text credentials to a 3rd party system. View the full article
  19. 1

    Exploits Telenor.com.pk SMS 2-Factor Bypass

    Telenor.com.pk appears to allow an attacker set an arbitrary phone number for receiving an SMS for the second factor of authentication. View the full article
  20. itsMe

    Universal Bypass

    Universal Bypass Don't waste your time with compliance. Universal Bypass has bypasses for sites which make you wait (Adf.ly, Adfoc.us, Shorte.st, etc.), sites which make you do something (sub2unlock.com, etc.) and even trackers (Bit.ly, Goo.gl, T.co, etc.). Plus, you can write custom bypasses...
Back
Top