Sunday, May 19, 2024
EHA
Home Search

vulnerable - search results

If you're not happy with the results, please do another search

PwnAdventure3 – Game Intentionally Vulnerable To Hacks

0
PwnAdventure3: Pwnie Island is a limited-release, first-person, true open-world MMORPG set on a beautiful island where anything could happen. That's because this game is...

DVIA – Damn Vulnerable iOS Application

0
Damn Vulnerable iOS App or DVIA is an iOS application that is damn vulnerable. Its fundamental objective is to give a stage to portable...

XVNA – Extreme Vulnerable Node Application

0
XVNA is an extraordinary vulnerable node application coded in Nodejs(Expressjs)/MongoDB that causes security aficionados to learn application security. It's not advised to have this...

DVHMA – Damn Vulnerable Hybrid Mobile Application

0
Damn Vulnerable Hybrid Mobile App or DVHMA is a hybrid mobile app for Android that deliberately contains vulnerabilities. Its motivation is to empower security...

Cybersecurity Toolkit – Essential Python Tools For Penetration Testing

0
Welcome to the Cybersecurity Toolkit, a collection of essential Python tools designed for penetration testing enthusiasts. In this article, we delve into a range...

CVE-2024-3273 Proof Of Concept (PoC) : Unveiling The Vulnerability In D-Link NAS Devices

0
This repository contains a Proof of Concept (PoC) for CVE-2024-3273, a security vulnerability discovered in D-Link NAS devices. The vulnerability allows attackers to execute...

xzbot – A Strategic Approach To Counter CVE-2024-3094 Through Honeypots And ED448 Patches

0
We delve into the intricacies of xzbot, a tool designed to combat the CVE-2024-3094 vulnerability. By employing a combination of honeypots, custom ED448 patches,...

Hunt For LFI (Local File Inclusion) – Automating The Discovery Of Security Vulnerabilities

0
In the vast expanse of cybersecurity, the Hunt for LFI (Local File Inclusion) stands out as a pivotal tool for ethical hackers and security...

Awesome DevSecOps – A Comprehensive Guide To Resources And Tooling

0
DevSecOps is an extension of the DevOps movement that aims to bring security practices into the development lifecycle through developer-centric security tooling and processes. Contributions welcome. Add links...

CVE-2024-1212 Command Injection Exploit For Kemp LoadMaster : A Comprehensive Guide

0
This Python script is designed as a proof of concept (PoC) to demonstrate an unauthenticated command injection vulnerability in Kemp LoadMaster, identified as CVE-2024-1212. Features...

Recent Posts