Aggregator
CVE-2016-1803 | Apple Mac OS X up to 10.11.4 CoreCapture null pointer dereference (HT206567 / EDB-39925)
CVE-2017-3078 | Adobe Flash Player up to 25.0.0.171 ATF Parser memory corruption (APSB17-17 / EDB-42249)
CVE-2015-4630 | koha up to 3.14.15/3.16.11/3.18.9/3.20.0 members/memberentry.pl addshelf cross-site request forgery (EDB-37389)
CVE-2009-4814 | Wolfram webMathematica 2.3/3.0 cross site scripting (EDB-33438 / XFDB-55008)
CVE-2010-1744 | Alibabaclone B2B Gold Script product.html id sql injection (EDB-12460 / XFDB-58265)
Logsensor: discover login panels, and POST Form SQLi Scanning
Logsensor A Powerful Sensor Tool to discover login panels, and POST Form SQLi Scanning Features login panel Scanning for multiple hosts Proxy compatibility (http, https) Login panel scanning is done in multiprocessing Installation git...
The post Logsensor: discover login panels, and POST Form SQLi Scanning appeared first on Penetration Testing Tools.
EvilSlackbot: A Slack bot phishing framework for Red Teaming exercises
EvilSlackbot A Slack Attack Framework for conducting Red Team and phishing exercises within Slack workspaces. Background Thousands of organizations utilize Slack to help their employees communicate, collaborate, and interact. Many of these Slack workspaces...
The post EvilSlackbot: A Slack bot phishing framework for Red Teaming exercises appeared first on Penetration Testing Tools.
My dad blocked me from the WiFi after 10, How can I bypass it? PC Windows 11
OpenGFW: flexible, open-source implementation of Great Firewall on Linux
OpenGFW OpenGFW is a flexible, easy-to-use, open-source implementation of GFW on Linux that’s in many ways more powerful than the real thing. It’s cyber sovereignty you can have on a home router. Features Full IP/TCP...
The post OpenGFW: flexible, open-source implementation of Great Firewall on Linux appeared first on Penetration Testing Tools.