Aggregator
CVE-2023-51647 | Steinbeis Allegra 7.5.0 Build 29 saveInlineEdit path traversal (ZDI-24-108)
CVE-2023-51643 | Steinbeis Allegra 7.5.0 Build 29 uploadFile path traversal (ZDI-24-103)
CVE-2023-51645 | Steinbeis Allegra 7.5.0 Build 29 unzipFile path traversal (ZDI-24-101)
CVE-2023-51644 | Steinbeis Allegra 7.5.0 Build 29 SiteConfigAction access control (ZDI-24-102)
CVE-2013-3535 | Themelogik CMSLogik 1.2.0/1.2.1 item_link cross site scripting (Exploit 121303 / EDB-24959)
Hooka: Shellcode loader generator with multiples features
Hooka Hooka is able to generate shellcode loaders with multiple capabilities. It is also based on other tools like BokuLoader, Freeze or Shhhloader, and it tries to implement more evasion features. Why in Golang? Why not? Feature This...
The post Hooka: Shellcode loader generator with multiples features appeared first on Penetration Testing Tools.
WEF: WiFi Exploitation Framework
WEF – WiFi Exploitation Framework This project started over 2021 as a personal tool to easily audit networks without writing long commands or setting all values one by one, in order to automate the...
The post WEF: WiFi Exploitation Framework appeared first on Penetration Testing Tools.
how to deal with https?
WhacAMole: Live memory analysis tool
WhacAMole WhacAMole is a program that analyzes processes in memory in an integral way, detecting and alerting of anomalies related to the malware and presenting and saving in files all the relevant information for...
The post WhacAMole: Live memory analysis tool appeared first on Penetration Testing Tools.
美军网络战略与网络战术脱节的三大核心问题
美军网络战略与网络战术脱节的三大核心问题
Dental Practice Pays State in Alleged Data Breach 'Cover Up'
An Indiana dental practice agreed to pay the state $350,000 and implement a long list of data security improvements following an alleged 2020 ransomware breach "cover up" that came to light when state regulators investigated a patient complaint about unfulfilled requests for dental X-rays.
Microsoft, Ping, Okta Dominate Access Management Gartner MQ
Advances in customer identity around better user experience, strong authentication, and centralized identity processes have driven rapid growth in the access management market. The space by grew 17.6% to $5.85 billion in 2023 as organizations increasing look to replace homegrown CIAM solutions.
US CISA Issues Final Cyber Rules for Restricted Bulk Data
The Cybersecurity and Infrastructure Security Agency is issuing final rules to safeguard U.S. sensitive data from potential Chinese intrusions, requiring Americans involved in restricted transactions with Chinese entities to adopt stringent cybersecurity measures.
Japanese Businesses Hit By a Surge In DDoS Attacks
A spate of distributed denial-of-service attacks during the end-of-year holiday season disrupted operations at multiple Japanese organizations, including the country's largest airline, wireless carrier and prominent banks. The effect of the attacks has been temporary.