Vulnerability Analysis

io_uring_LPE-CVE-2023-2598 : Analysis Of The Conquering Memory Exploit

We dissect the exploit's mechanisms, shedding light on how it manipulates memory through io_uring. By delving into the technical nuances,…

9 months ago

Splunk RCE – PoC: In-Depth Analysis and Exploitation Methodology

This article delves into a critical vulnerability in Splunk, identified as CVE-2023-46214. It provides a detailed analysis and a Proof…

12 months ago

Nessusploitable – Targeting Exploitable Nessus Vulnerabilities

Do you need to filter Nessus scan results and zero in on exploitable vulnerabilities? When you're on a penetration test…

1 year ago

ADCSKiller – An ADCS Exploitation Automation Tool

ADCSKiller is a Python-based tool designed to automate the process of discovering and exploiting Active Directory Certificate Services (ADCS) vulnerabilities.…

1 year ago

CVE-2023-38035 – Arbitrary Command Execution As The Root user On Ivanti Sentry

Ivanti has just put out a warning about CVE-2023-38035. The vulnerability has been added to CISA KEV and is called…

1 year ago

WELA (Windows Event Log Analyzer)

Windows Event Log Analyzer wants to be the Swiss Army knife of Windows event logs. At the moment, WELA's best…

1 year ago

SeccuBus : Easy Automated Vulnerability Scanning, Reporting & Analysis

Seccubus automates regular vulnerability scans with various tools and aids security people in the fast analysis of its output, both…

5 years ago

WPScan – Checks Vulnerabilities and Spots Security Issues

WPScan effectively scans your WordPress website and checks the vulnerabilities within the core version, plugins, themes, etc helping to spot the…

6 years ago

Yersinia for Layer 2 – Vulnerability Analysis & DHCP Starvation Attack

Yersinia is a network tool designed to take advantage of some weakness in different network protocols. It pretends to be…

6 years ago

Exploring TheHive: Open-Source Incident Response Platform

TheHive is a powerful open-source platform designed for incident response and security operations. It provides a comprehensive suite of tools…

7 years ago