Instagram
Linkedin
Twitter
Kali Linux Tutorials
Cybersecurity
Apple
Geeks
Linux
Bash Scripting
Applications
More
Search
Kali Linux Tutorials
Kali Linux Tutorials
Cybersecurity
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Cyber security
SMM : From Social Media To System Management Mode
Applications
MCP Server For Obsidian : Enhancing AI Integration
Hacking Tools
wa-tunnel – TCP Tunneling Through Whatsapp
Applications
Deepfake Apps : How They Function And Their Applications
Apple
Hacking Tools
JBDev : A Tool For Jailbreak And TrollStore Development
Apple
Nyxian : A Low-Level Scripting Language For iOS
Apple
AppStore Troller : Overcoming iOS Compatibility Barriers For App Downloads
Hacking Tools
IPATool : A Comprehensive Guide To Managing iOS Apps
Apple
Trigon : A Revolutionary Kernel Exploit For iOS
Geeks
Linux
Bash Scripting
How to Bash Append to File: A Simple Guide for Beginners
Bash Scripting
Mastering the Bash Case Statement with Simple Examples
Bash Scripting
How to Check if a File Exists in Bash – Simply Explained
Bash Scripting
Bash Arrays Explained Simply: Beginner’s Guide with Examples
Bash Scripting
Bash For Loop Examples Explained Simply for Beginners
All
Bash Scripting
Applications
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Hacking Tools
Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs
Applications
MCP Server For Obsidian : Enhancing AI Integration
Applications
Deepfake Apps : How They Function And Their Applications
Apple
AppStore Troller : Overcoming iOS Compatibility Barriers For App Downloads
More
Android Security
Apple
Applications
Blog
Cyber security
Database Assessment
Exploitation Tools
Forensics
Hacking Tools
Information Gathering
Kali Linux
Linux
Malware
OSINT
Password Attacks
Pentesting Tools
Phishing
Post Exploitation
Security Hacker
Sniffing/Spoofing
software
Stress Testing
TECH
Tech today
Tutorials
VPN
Vulnerability Analysis
Web Application Security
Windows
Wireless Attacks
Latest
Latest
Featured posts
Most popular
7 days popular
By review score
Random
SeamlessPass: Using Kerberos Tickets to Access Microsoft 365
Varshini
-
August 20, 2025
0
JBDev : A Tool For Jailbreak And TrollStore Development
Varshini
-
April 1, 2025
0
Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs
Varshini
-
April 1, 2025
0
Hacking Tools
Home
Hacking Tools
Page 16
Hacking Tools
SlackEnum – Mastering User Enumeration On Slack
Varshini
-
October 7, 2024
0
Hacking Tools
SharpTerminator – A Guide To Automating AV/EDR Disruption With C# Port
Varshini
-
October 2, 2024
0
Hacking Tools
OXO Scan Orchestration Engine – A Comprehensive Guide To Scalable Security...
Varshini
-
September 30, 2024
0
Hacking Tools
MANSPIDER – Advanced SMB Crawling For Sensitive Data Detection
Varshini
-
September 30, 2024
0
Hacking Tools
EDR-Antivirus-Bypass-To-Gain-Shell-Access
Varshini
-
September 30, 2024
0
Hacking Tools
GShark – A Comprehensive Guide To Sensitive Information Management System Deployment
Varshini
-
September 27, 2024
0
Hacking Tools
zDocker-cobaltstrike : A Comprehensive Guide To Setting Up Cobalt Strike With...
Varshini
-
September 24, 2024
0
Hacking Tools
ConfuserEx2 String Decryptor – A Guide To Deobfuscating .NET Applications
Varshini
-
September 23, 2024
0
Hacking Tools
Capa v7.3.0 – Enhanced Malware Analysis With VMRay Integration, Ghidra Support,...
Varshini
-
September 23, 2024
0
Hacking Tools
MSSprinkler – Enhancing M365 Security Through Advanced Password Testing
Varshini
-
September 23, 2024
0
1
...
15
16
17
...
30
Page 16 of 30
APPLICATIONS
Chista | Open Source Threat Intelligence Framework – Understanding, Predicting, And Defending Against Cyber...
Varshini
-
February 2, 2024
OFFPORT_KILLER : Tool Aims At Automating The Identification Of Potential Service Running
R K
-
October 9, 2020
Commander – Secure Python C2 Framework
Varshini
-
January 29, 2025
AnonX : An Encrypted File Transfer Via AES-256-CBC
R K
-
March 22, 2021
HOT NEWS
CVE-2025-24813-PoC : Apache Tomcat 远程代码执行漏洞批量检测脚本
Varshini
-
March 18, 2025
0
Cyber security
简介 CVE-2025-24813 是一个影响 Apache Tomcat 的远程代码执行(RCE)漏洞,允许攻击者通过发送一个 PUT 请求上传恶意的序列化会话文件,并通过 GET 请求触发反序列化,从而在服务器上执行任意代码。该漏洞已在野外被利用,且其利用条件相对简单,只需 Tomcat 使用文件存储会话且支持部分 PUT 请求即可。 脚本功能 CVE-2025-24813-PoC 脚本主要用于检测 Apache Tomcat 是否存在此漏洞。它支持批量检测和单个检测两种模式。 批量检测:通过指定一个包含目标 URL 列表的文件(如 url.txt),脚本可以并发检测多个目标。使用方式为: bashpython poc.py -l url.txt...