Automate login attempts with the Login-Breaker-Pro script. Securely test user credentials for your web application or platform.
-
Updated
Oct 19, 2023 - Python
Automate login attempts with the Login-Breaker-Pro script. Securely test user credentials for your web application or platform.
Docker patches to disable authentication popup modals for Sonarr and Radarr while using external authentication (Authentik, Authelia, etc.)
Security research and vulnerability analysis from HackerOne bug bounty programs. Contains exploitation techniques, proof-of-concept code, and reports for fintech platforms and API gateways. Includes Python/Bash scripts, authentication bypasses, CORS exploits, IDOR vulnerabilities, and API security testing documentation.
A security PoC demonstrating how a public form with an embedded API key can bypass backend authentication, allowing attackers to access protected Express endpoints without credentials.
This repository details an IDOR vulnerability in AbsysNet 2.3.1, which allows a remote attacker to brute-force session IDs via the /cgi-bin/ocap/ endpoint. Successful exploitation can compromise active user sessions, exposing authentication tokens in HTML. The attack is limited to active sessions and is terminated if the user logs out.
A passwordless login system where a user enters their email, the site emails a short-lived redirect link (30 seconds) plus an 8-digit one-time code (OTP).
Perfom With Massive Authentication Bypass In PaperCut MF/NG
foundryvtt admin authentication bypass POC exploit
Apache Superset - Authentication Bypass
Intentionally vulnerable web application for security training. Modular design with SQLi, XSS, auth bypass, and file upload vulnerabilities. Docker containerized for safe, isolated learning environments. FOR EDUCATIONAL USE ONLY.
Reverse engineered ChatGPT client for authentication-free access
PoC for CVE-2025-5777 – Auth Bypass and RCE in Trend Micro Apex Central
Intentionally vulnerable captive portal lab for wireless security training. Demonstrates session hijacking, authentication bypass, and network security vulnerabilities. Docker containerized for safe, isolated learning environments. FOR EDUCATIONAL USE ONLY.
🛡️ Web Penetration Testing is the process of testing websites or web apps for security flaws. 🔍 It helps find vulnerabilities like SQL injection, XSS, and authentication bypass. 🚨 Used to protect data, improve security, and prevent hacking attacks.
Exploits for CVE-2020-9376 and CVE-2020-9377
This repository demonstrates a privilege escalation attack targeting Open5GS's WebUI, exploiting unauthenticated database connections and forged session cookies/JWT tokens. The analysis reveals critical vulnerabilities in authentication mechanisms, offering insights for securing 5G network components.
It is a simple password brute force tool designed for ethical hacking and security testing. Automates the process of selecting passwords for a given user on a website by sending POST requests with different passwords and analyzing the response.
Authentication Bypass PoC for CVE-2025-2825 – Exploiting CrushFTP 10.x
A Python tool for decrypting passwords hashed with the AuthMe SHA256 algorithm. Ideal for penetration testing and security audits on Minecraft servers using the AuthMe authentication plugin.
A PoC exploit for CVE-2024-27198 - JetBrains TeamCity Authentication Bypass
Add a description, image, and links to the authentication-bypass topic page so that developers can more easily learn about it.
To associate your repository with the authentication-bypass topic, visit your repo's landing page and select "manage topics."