{"payload":{"pageCount":2,"repositories":[{"type":"Public","name":"CVE-2024-36991","owner":"Cappricio-Securities","isFork":false,"description":"Path traversal vulnerability in Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10 that allows reading sensitive files.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-10T09:42:37.897Z"}},{"type":"Public","name":"PayloadAllTheThings","owner":"Cappricio-Securities","isFork":false,"description":"This repository contains all the payloads","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-10T09:36:04.706Z"}},{"type":"Public","name":"ghostrecon","owner":"Cappricio-Securities","isFork":false,"description":"gh0str3con is a All in one cloud based web Recon tool.","allTopics":["recon","bugbounty","bugbounty-tool","webrecon"],"primaryLanguage":{"name":"EJS","color":"#a91e50"},"pullRequestCount":1,"issueCount":0,"starsCount":19,"forksCount":6,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-08T14:58:30.060Z"}},{"type":"Public","name":"CVE-2012-5321","owner":"Cappricio-Securities","isFork":false,"description":"TikiWiki CMS Groupware v8.3 - Open Redirect","allTopics":["open-redirect","open-redirect-poc","open-redirect-scanner","cve-2012-5321","cve-2012-5321-scanner","cve-2012-5321-poc"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-07T14:27:44.883Z"}},{"type":"Public","name":"CVE-2024-5947","owner":"Cappricio-Securities","isFork":false,"description":"Deep Sea Electronics DSE855 - Authentication Bypass","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":"MIT License","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-07T14:10:50.812Z"}},{"type":"Public","name":"camjacking","owner":"Cappricio-Securities","isFork":false,"description":"CamJacking is a tool designed for use in human penetration testing tool. It is intended to simulate potential security threats by testing the negligence of people, and is used to identify weaknesses in an organization's security infrastructure.","allTopics":["ethicalhacking","webcam-hacking","webcamhack"],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":1,"starsCount":16,"forksCount":4,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-26T16:21:21.059Z"}},{"type":"Public","name":"CVE-2024-0352","owner":"Cappricio-Securities","isFork":false,"description":"Likeshop < 2.5.7.20210311 - Arbitrary File Upload","allTopics":["rce","vulnerability","pentesting","cve","wapt","cve-2024-0352"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T11:04:04.737Z"}},{"type":"Public","name":"CVE-2024-0195","owner":"Cappricio-Securities","isFork":false,"description":"SpiderFlow Crawler Platform - Remote Code Execution","allTopics":["rce","pentesting","cve","wapt","cve-2024-0195","spiderflow"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T10:55:10.078Z"}},{"type":"Public","name":"CVE-2022-21500","owner":"Cappricio-Securities","isFork":false,"description":"Oracle E-Business Suite <=12.2 - Authentication Bypass","allTopics":["oracle","ebs","pentesting","cve","wpt","cve-2022-21500"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T10:50:28.745Z"}},{"type":"Public","name":"CVE-2009-0347","owner":"Cappricio-Securities","isFork":false,"description":"Autonomy Ultraseek - Open Redirect","allTopics":["open-redirect","autonomy-ultraseek-open-redirect","open-redirect-poc","open-redirect-scanner","cve-2009-0347","cve-2009-0347-scanner","cve-2009-0347-poc","cve-2009-0347-exploit"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T10:46:40.174Z"}},{"type":"Public","name":"CVE-2024-27956","owner":"Cappricio-Securities","isFork":false,"description":"WordPress Automatic Plugin <= 3.92.0 - SQL Injection","allTopics":["wordpress","sqli","sql-injection","wp-scan","cve-2024-27956","cve-2024-27956-poc","cve-2024-27956-scanner","cve-2024-27956-exploit","wp-sqli"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T10:43:34.317Z"}},{"type":"Public","name":"aem-xss","owner":"Cappricio-Securities","isFork":false,"description":"Adobe Experience Manager Childlist Selector - Cross-Site Scripting","allTopics":["xss","xss-exploitation","xss-detection","cross-site-scripting","xss-exploit","xss-attack","aem-xss","aem-xss-scanner","adobe-experience-manager-childlist","adobe-experience-manager-childlist-xss"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T10:39:20.263Z"}},{"type":"Public","name":"CVE-2022-21371","owner":"Cappricio-Securities","isFork":false,"description":"Oracle WebLogic Server (LFI)","allTopics":["bugbounty","lfi","lfi-exploitation","local-file-inclusion","lfi-vulnerability","bugbounty-tool","lfi-detection","lfi-exploiter","bugbounty-tools","lfi-scanner","oracle-weblogic-server","cve-2022-21371","cve-2022-21371-scanner","cve-2022-21371-poc","oracle-weblogic-server-lfi"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T10:35:28.363Z"}},{"type":"Public","name":"cgi-printenv","owner":"Cappricio-Securities","isFork":false,"description":"CGI Print ENV leaking ","allTopics":["bugbounty","bugbounty-tool","bugbounty-tools","cgi-print-env-leaking","cgi-printenv","env-leaking"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T10:31:09.687Z"}},{"type":"Public","name":"sound4-directory-listing","owner":"Cappricio-Securities","isFork":false,"description":"SOUND4 Impact/Pulse/First/Eco <=2.x - Information Disclosure","allTopics":["bugbounty","directory-listing","information-disclosure","bugbounty-tool","bugbounty-tools","sound4-directory-listing","sound4"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T10:27:59.986Z"}},{"type":"Public","name":"CVE-2024-0235","owner":"Cappricio-Securities","isFork":false,"description":"EventON (Free < 2.2.8, Premium < 4.5.5) - Information Disclosure","allTopics":["bugbounty","wordpress-scanner","wpscan","information-disclosure","bugbounty-tool","bugbounty-tools","cve-2024-0235","cve-2024-0235-scanner","cve-2024-0235-poc","cve-2024-0235-exploit","eventon-scanner"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T10:19:35.818Z"}},{"type":"Public","name":"CVE-2024-4956","owner":"Cappricio-Securities","isFork":false,"description":"Sonatype Nexus Repository Manager 3 (LFI)","allTopics":["bugbounty","lfi","lfi-exploitation","local-file-inclusion","bugbounty-tool","lfi-detection","lfi-exploit","lfi-exploiter","bugbounty-tools","lfi-scanner","cve-2024-4956","sonatype-nexus-repository-manager-3","cve-2024-4956-scanner","cve-2024-4956-poc","cve-2024-4956-exploit"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T10:14:58.435Z"}},{"type":"Public","name":"CVE-2019-12616","owner":"Cappricio-Securities","isFork":false,"description":"phpMyAdmin <4.9.0 - Cross-Site Request Forgery","allTopics":["csrf","csrf-scanner","bugbounty-tools","cve-2019-12616","phpmyadmin-scanner","phpmyadmin-exploit","cve-2019-12616-poc","cve-2019-12616-scanner"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T10:10:24.022Z"}},{"type":"Public","name":"behat-config-leaks","owner":"Cappricio-Securities","isFork":false,"description":"BeHat Configuration file leaking","allTopics":["exploit","behat","poc","bugbounty","bugbounty-tool","bugbounty-tools","behat-config","behat-config-leaking","behat-config-finder","behat-config-scanner","behat-config-leaks"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T10:06:43.443Z"}},{"type":"Public","name":"CVE-2024-24919","owner":"Cappricio-Securities","isFork":false,"description":"Check Point Security Gateway (LFI)","allTopics":["lfi","information-disclosure","path-traversal","cve-2024-24919","cve-2024-24919-scanner","cve-2024-24919-poc","cve-2024-24919-exploit","cve-2024-24919-lfi","check-point-security-gateway"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T10:02:59.825Z"}},{"type":"Public","name":"appspec-yaml-leaks","owner":"Cappricio-Securities","isFork":false,"description":"Appspec YML and YAML leaks","allTopics":["aws","apikey","sensitive-data-exposure","bugbounty-tools","appspec-yaml-leaks"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T09:56:44.897Z"}},{"type":"Public","name":"CVE-2024-1208","owner":"Cappricio-Securities","isFork":false,"description":"LearnDash LMS < 4.10.3 - Sensitive Information Exposure","allTopics":["bugbounty","bugbounty-tool","bugbounty-tools","cve-2024-1208","cve-2024-1208-poc","cve-2024-1208-scanner","cve-2024-1208-exploit","learndash-lms","learndash-lms-4-10-3-exploit","sensitive-information-exposure"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T09:52:40.783Z"}},{"type":"Public","name":"CVE-2000-0114","owner":"Cappricio-Securities","isFork":false,"description":"Microsoft FrontPage Extensions Check (shtml.dll)","allTopics":["bugbounty","bugbounty-tool","bugbounty-tools","shtml-dll","cve-2000-0114","cve-2000-0114-scanner","cve-2000-0114-poc","cve-2000-0114-tool","cve-2000-0114-exploit","microsoft-frontpage-extensions-check"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T09:48:11.300Z"}},{"type":"Public","name":"shell-history-leaks","owner":"Cappricio-Securities","isFork":false,"description":"This tool is used to find shell history leaking ","allTopics":["bugbounty","bugbounty-tool","sensitive-info","bugbounty-tools","shell-history-leaks","linux-shell-history-leaks"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T09:40:20.520Z"}},{"type":"Public","name":"phpinfo-files-leaks","owner":"Cappricio-Securities","isFork":false,"description":"This tool is used to find php info page","allTopics":["bugbounty","phpinfo","bugbounty-tools","phpinfo-scanner","phpinfo-leaks","phpinfo-files-leaks"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T09:36:18.417Z"}},{"type":"Public","name":"CVE-2022-0165","owner":"Cappricio-Securities","isFork":false,"description":"WordPress Page Builder KingComposer <=2.9.6 - Open Redirect","allTopics":["bugbounty","open-redirect","bugbounty-tools","cve-2022-0165","cve-2022-0165-scanner","cve-2022-0165-poc","wordpress-page-builder-kingcomposer"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T09:29:32.682Z"}},{"type":"Public","name":"CVE-2015-1635","owner":"Cappricio-Securities","isFork":false,"description":"Microsoft Windows 'HTTP.sys' - Remote Code Execution","allTopics":["exploit","poc","rce","rce-exploit","bugbounty-tools","rce-scanner","http-sys","cve-2015-1635","cve-2015-1635-scanner"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T09:23:08.116Z"}},{"type":"Public","name":"CVE-2018-11784","owner":"Cappricio-Securities","isFork":false,"description":"Apache Tomcat - Open Redirect","allTopics":["openredirect","bugbounty-tools","cve-2018-11784","cve-2018-11784-poc","cve-2018-11784-scanner","apache-tomcat-open-redirect"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T09:14:57.749Z"}},{"type":"Public","name":"CVE-2015-7297","owner":"Cappricio-Securities","isFork":false,"description":"Joomla! Core SQL Injection","allTopics":["sql-injection","bugbounty-tools","cve-2015-7297","cve-2015-7297-scanner","cve-2015-7297-sql-injection","joomlacore-sql-injection","joomla-core-sql-injection"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T09:10:09.336Z"}},{"type":"Public","name":"CVE-2023-24044","owner":"Cappricio-Securities","isFork":false,"description":"Plesk Obsidian <=18.0.49 - Open Redirect","allTopics":["openredirect","wapt","plesk-obsidian","cve-2023-24044","cve-2023-24044-scanner","plesk-obsidian-open-redirect"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T09:03:56.917Z"}}],"repositoryCount":52,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Cappricio-Securities repositories"}