CVE-2023-38035 – Arbitrary Command Execution As The Root user On Ivanti Sentry

0
Ivanti has just put out a warning about CVE-2023-38035. The vulnerability has been added to CISA KEV and is called an authentication bypass in...

WELA (Windows Event Log Analyzer)

0
Windows Event Log Analyzer wants to be the Swiss Army knife of Windows event logs. At the moment, WELA's best feature is that it...

SeccuBus : Easy Automated Vulnerability Scanning, Reporting & Analysis

0
Seccubus automates regular vulnerability scans with various tools and aids security people in the fast analysis of its output, both on the first scan...

WPScan – Checks Vulnerabilities and Spots Security Issues

0
WPScan effectively scans your WordPress website and checks the vulnerabilities within the core version, plugins, themes, etc helping to spot the security issues. Firstly, install WPScan!Installation...

Yersinia for Layer 2 – Vulnerability Analysis & DHCP Starvation Attack

0
Yersinia is a network tool designed to take advantage of some weakness in different network protocols. It pretends to be a solid framework for...

Exploring TheHive: Open-Source Incident Response Platform

0
TheHive is a powerful open-source platform designed for incident response and security operations. It provides a comprehensive suite of tools to help organizations manage...