Sunday, December 8, 2019
Home Tags Vulnerability

Tag: vulnerability

Must Need

First Look at Kali Linux 2.0

A rebirth of a penetration testing distribution – Kali Linux 2.0 Codename: Kali Sana On August 11th, Kali Linux Version 2.0 was released. It was...
Router Exploit Shovel : Automated Application Generation for Stack Overflow Types on Wireless Routers

Router Exploit Shovel : Automated Application Generation for Stack Overflow Types...

Router Exploit Shovel is an automated application generation for stack overflow types on wireless Routers. It is an automated application generation tool...
Instagram-Py

Instagram-Py – Python Script To Brute Force Attack

Instagram-Py is a straightforward python script to perform brute force attack against Instagram , this script can sidestep login restricting on wrong passwords ,...
Exploit

Exploit CVE-2017-6079 – Blind Command Injection In Edgewater Edgemarc Devices Exploit

This exploit was developed based on the technical description by depthsecurity https://depthsecurity.com/blog/cve-2017-6079-blind-command-injection-in-edgewater-edgemarc-devices The HTTP web-management application on Edgewater Networks Edgemarc appliances has a hidden page that...
PowerUpSQL

PowerUpSQL Tool kit to Audit SQL Server for Weak Configuration Auditing,...

PowerUpSQL includes functions that support SQL Server discovery, weak configuration auditing, privilege escalation on the scale, and post exploitation actions such as OS command...
ct-exposer

ct-exposer : An OSINT Tool That Discovers Sub-Domains By Searching Certificate...

ct-exposer will query the CT logs for a given domain, and then try to do DNS lookups for the domains to see which ones...
Firmware Analysis Toolkit : To Emulate Firmware And Analyse It For Security Vulnerabilities

Firmware Analysis Toolkit : To Emulate Firmware And Analyse It For...

Firmware analysis toolkit is a toolkit to emulate firmware and analyse it for security vulnerabilities. FAT is a toolkit built in order...