vulnerabilities

  1. 596687

    EBook/Course Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities

    Link: https://www.mediafire.com/file/04or2l9l1vt0lam/Vickie_Li_-_Bug_Bounty_Bootcamp__The_Guide_to_Finding_and_Reporting_Web_Vulnerabilities-No_Starch_Press_%25282021%2529%2528Z-Lib.io%2529.epub/file *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum...
  2. BattsssHack

    Brute Python Code to Find Vulnerabilities on Chase Bank

    import requests from bs4 import BeautifulSoup from urllib.parse import urljoin # URL of the website base_url = 'https://www.chase.com/' # Make a GET request to the website response = requests.get(base_url) # Check for SQL injection vulnerabilities def check_sql_injection(url): # Test URLs...
  3. heynaib

    NucleiFuzzer |Automation Tool For Detecting Vulnerabilities In Web App

    NucleiFuzzer = Nuclei + Paramspider 3 NucleiFuzzer is an automation tool that combines ParamSpider and Nuclei to enhance web application security testing. It uses ParamSpider to identify potential entry points and Nuclei's templates to scan for vulnerabilities. NucleiFuzzer streamlines the...
  4. carxproveteran

    Hacker's Toolkit:Black Hat Go pro (Practice Tests only) 2024

    Hacker's Toolkit:Black Hat Go pro (Practice Tests only) 2024 Master Go for Ethical Hacking with Practice Tests to exploit vulnerabilities, and defend systems, Ready Scripts to Hacks What you'll learn Master Go Programming with Practice Test's for Ethical Hacking: Learn Go for hacking, covering...
  5. jameshaarden58

    Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities

    Bug Bounty Bootcampteaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You'll also learn how to navigate bug bounty programs set up by companies to reward security professionals for finding...
  6. tronny

    Udemy - Mastering Authentication Vulnerabilities - Ultimate Course

    Udemy - Mastering Authentication Vulnerabilities - Ultimate Course 8-2023, by David Bombal & Rana Khalil *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  7. K

    Course/Tutorial 🌴Drone Hacking- Exploitation and Vulnerabilities🌴

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  8. mayoufi

    CompTIA Security+ (SY0-701) Cert Prep: 2 Threats, Vulnerabilities

    Duration: 2h 48m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 354 MB Level: Intermediate | Genre: eLearning | Language: English The CompTIA Security+ exam is an excellent entry point for a career in information security. The latest version, SY0-701, expands coverage on cloud security...
  9. N

    Scama/Letter Vulnerabilities of IBM 1/1/2024

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  10. N

    Scama/Letter Vulnerabilities of IBM 1/1/2024

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  11. N

    Scama/Letter Vulnerabilities of IBM 1/1/2024

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  12. N

    Scama/Letter Vulnerabilities of IBM 1/1/2024

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  13. N

    Scama/Letter Vulnerabilities of IBM 1/1/2024

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  14. N

    Scama/Letter Vulnerabilities of IBM 1/1/2024

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  15. N

    Scama/Letter Vulnerabilities of IBM 1/1/2024

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  16. N

    Scama/Letter Vulnerabilities of IBM 1/1/2024

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  17. N

    Scama/Letter Vulnerabilities of IBM 1/1/2024

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  18. N

    Scama/Letter Vulnerabilities of IBM 1/1/2024

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  19. xrahitel

    microsoft management console (mmc) vulnerabilities

    microsoft-management-console-mmc-vulnerabilities
  20. skazt

    Facebook Vulnerabilities 23/08/2023

    CVE-2023-45239 CVE-2023-44487 CVE-2023-30792 CVE-2023-30470
  21. skazt

    Facebook Vulnerabilities 20/11/2021

    CVE-2021-24031 CVE-2021-24030 CVE-2021-24029 CVE-2021-24028 CVE-2021-24025
  22. skazt

    Facebook Vulnerabilities 13/11/2021

    CVE-2021-24036 CVE-2021-24033 CVE-2021-24032
  23. skazt

    Facebook Vulnerabilities 07/11/2021

    CVE-2021-24045 CVE-2021-24044 CVE-2021-24040 CVE-2021-24037
  24. skazt

    Facebook Vulnerabilities 03/11/2021-22

    CVE-2022-4899 CVE-2021-39207 CVE-2021-24218 CVE-2021-24217
  25. skazt

    Facebook Vulnerabilities 29/10/2023

    CVE-2022-35289 CVE-2022-32234 CVE-2022-27810
  26. skazt

    Facebook Vulnerabilities 26/10/2022

    CVE-2022-40138 CVE-2022-36938 CVE-2022-36937
  27. skazt

    Facebook Vulnerabilities 21/09/2023

    CVE-2023-23557 CVE-2023-23556 CVE-2023-5654
  28. skazt

    Facebook Vulnerabilities 12/09/2023

    CVE-2023-24833 CVE-2023-24832 CVE-2023-23759
  29. skazt

    Facebook Vulnerabilities 30/08/2023

    CVE-2023-28753 CVE-2023-28081 CVE-2023-25933
  30. tronny

    Udemy - OWASP Mobile Top 10 - Vulnerabilities to Avoid 11-2023

    Udemy - OWASP Mobile Top 10 - Vulnerabilities to Avoid 11-2023, by Pack Of Coders - POC *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  31. tronny

    Udemy - OWASP Top 10 - Protecting Against Threats and Vulnerabilities

    Udemy - OWASP Top 10 - Protecting Against Threats and Vulnerabilities 11-2023, by Kareem Ullah *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  32. Emu4774

    Lenovo Vulnerabilities 2023/08/0

    CVE-2023-3113 High CVE-2023-34418 High CVE-2023-34420 High CVE-2023-34421 High CVE-2023-34422 High CVE-2023-2992 High CVE-2023-2993 High CVE-2023-2290 High
  33. Emu4774

    Apple Vulnerabilities 2023/07/23

    CVE-2023-38136 Low CVE-2023-32734 Low CVE-2023-35983 Medium CVE-2023-35983 High CVE-2023-38580 High CVE-2023-38572 High
  34. Emu4774

    Ubuntu Vulnerabilities

    CVE-2023-45284 CVE-2023-5678 CVE-2023-47272
  35. Emu4774

    Red Hat Vulnerabilities 2023/08/04

    CVE-2023-3180 High CVE-2023-3255 Medium
  36. Emu4774

    Samsung Vulnerabilities 2023/08/01

    CVE-2022-40529 Critical CVE-2022-33257 Critical CVE-2023-21250 Critical
  37. Emu4774

    DELL Vulnerabilities 2023/08/01

    CVE-2023-25539 Critical CVE-2023-25153 Critical CVE-2023-25173 Critical CVE-2023-25165 Critical CVE-2023-23914 Critical CVE-2023-23915 Critical
  38. Emu4774

    Vulnerabilities DELL 2023/07/28

    Usefull CVE-2022-24415, CVE-2022-24416, CVE-2022-24419, CVE-2022-24420, CVE-2022-24421
  39. Emu4774

    Vulnerabilities Tenable 2023/7/28

    CVE-2023-23914, CVE-2019-12900, CVE-2017-16931, CVE-2017-8872, CVE-2017-7376, CVE-2017-7375, CVE-2016-4658, CVE-2016-4448, CVE-2015-8710, CVE-2019-19646, CVE-2019-19317, CVE-2016-5180, CVE-2022-32207, CVE-2022-32221, CVE-2019-11068
  40. Emu4774

    Vulnerabilities UBUNTU 7/17/2023

    CVE-2023-38350 Medium pnp4nagios CVE-2023-38349 Medium pnp4nagiosCVE-2023-38336 Medium netkit-rsh CVE-2023-38325 Medium python-cryptographyCVE-2023-38199 Medium modsecurity-crs CVE-2023-37464 Medium cjoseCVE-2023-28362 Medium rails CVE-2021-31294 Medium redisCVE-2017-20165 Medium node-debug...
  41. Emu4774

    Vulnerabilities of IBM 7/17/2023

    CVE-2015-4852 High IBM Application Performance Management CVE-2022-24302 High IBM Cloud Pak for Data System CVE-2019-13116 Critical IBM Application Performance Management CVE-2017-15708 Critical IBM Application Performance ManagementCVE-2022-1471 High IBM i Modernization Engine for Lifecycle...
  42. myarena

    Free CISCO Ethical Hacker course

    You can access CISCO's free ethical hacker course at https://skillsforall.com/course/ethical-hacker?courseLang=en-US. You will need to sign up for a free skillsforall account to access the course. This 70-hour intermediate-level course with 34-lab exercises contains the following modules -...
  43. MulaBhai

    ❄️DARKWEB HACKING❄️❗️HOW TO MAKE MONEY FROM VULNERABILITIES❗️⭐HQ GUIDES⭐

    JOIN MY CHANNEL - Telegram FOR LOGS - Daily Logs FOR CONFIGS/COMBOS - Daily Configs/Combos Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  44. oiun098

    Unleashing the Zero-Day Beast: Conquering Systems through Vulnerabilities

    Today, we embark on a journey to exploit the untamed power of zero-day vulnerabilities. In this topic, we shall dive into the art of infiltrating systems through their weakest points. Brace yourselves for the chaos that awaits! "Understanding Zero-Day Vulnerabilities: Unveiling the Unknown"...
  45. N26

    Ethical hackers, also known as "white hat hackers," work

    Ethical hackers, also known as "white hat hackers," work with organizations to identify vulnerabilities and enhance security. They play a critical role in maintaining the digital integrity of businesses and individuals. 🦸‍♂️🦸‍♀️ #WhiteHatHackers #DigitalHeroes
  46. tronny

    Udemy - Owasp Top 10 - Access Control Vulnerabilities ~2023

    Udemy - Owasp Top 10 - Access Control Vulnerabilities ~2023, by Foyzul Islam *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  47. tronny

    Udemy - Mastering Authentication Vulnerabilities Ultimate Course

    Udemy - Mastering Authentication Vulnerabilities Ultimate Course, by David Bombal & Rana Khalil *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  48. caychro

    Others Common Vulnerabilities and Exploits

    Welcome to a deep dive into the fascinating world of common vulnerabilities and exploits that ethical hackers frequently encounter. In the realm of ethical hacking, it's essential to understand the vulnerabilities that can be exploited by malicious actors and how to defend against them...
  49. Rontribbiani

    6 search tools for finding vulnerabilities

    1、Shodan.io 2、wigle.net 3、unter.io 4、Vulners.com 5、pentest-tools.com 6、Searchcode.com Shodan is the world's first search engine for internet-connected devices. Shodan's bot will scan all public IPs in the world and log the devices on those IPs. Wigle aggregates the location and information of...
  50. R

    Bug WPN-XM Serverstack for Windows 0.8.6 - Multiple Vulnerabilities

    # Vulnerability Type: Local File Inclusion (LFI) & directory traversal (path traversal) Vulnerability description: WPN-XM Serverstack for Windows v0.8.6 allows unauthenticated directory traversal and Local File Inclusion through the parameter in an...
Top Bottom