1. mayoufi

    IT & Software Vulnerability Discovery and Analysis for CompTIA Pentest+

    Vulnerability Discovery and Analysis for CompTIA Pentest+ Released 12/2024 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Level: Beginner | Genre: eLearning | Language: English + subtitle | Duration: 54m | Size: 127 MB Identifying vulnerabilities allows you to find potential entry...
  2. btc100k

    BEST OPEN SOURCE WEB VULNERABILITY TOOL SQLMAP

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** password 121 BEST OPEN SOURCE WEB VULNERABILITY TOOL SQLMAP Tutorial
  3. Anonymous24/7

    T-Mobile vulnerability with open ports

    T-Mobile.com Nmap scan report for 45.60.171.103 Host is up (0.13s latency). Not shown: 894 filtered ports PORT STATE SERVICE 11/tcp open systat 21/tcp open ftp 25/tcp open smtp 37/tcp open time 43/tcp open whois 48/tcp open auditd 50/tcp open re-mail-ck 51/tcp open...
  4. howlingrabbit

    SQLRay SQLI VULNERABILITY SCANNER

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  5. miscreant.ghost@gmai

    xRay Web Vulnerability Scanner Advanced v1.9.11

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  6. miscreant.ghost@gmai

    WingMan XSS Vulnerability Scanner Advanced v1.0.6 Full

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  7. 0nelove

    Regresshion - An Openssh Rce Vulnerability: What You Should Know

    Published 7/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 48 KHz Language: English | Size: 229.78 MB | Duration: 13m 4s Get to know how you might be affected by regreSSHion, an OpenSSH vulnerability that allows for remote code execution, and learn what you can do to assess and mitigate the...
  8. overthink799

    SQLi/Dork SQLI Dumper v10.6 Vulnerability Scanner

    Description: A tool to scan and find vulnerable websites. Features: Supports Multi. Online search engine. Automated exploiting and analyzing from a URL list; Automated search for data in a bulk URL list; Automated analyzer for injections points using URL, POST, Cookies, UserLogin or...
  9. databrowser

    TongdaOATool Tongda OA vulnerability exploitation tool V1.6

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** Disclaimer: Please do not conduct illegal testing. Any direct or indirect consequences and losses caused by using this tool are the responsibility of the user himself, and the author...
  10. 0nelove

    Controlling Cybersecurity Risk With Defender Vulnerability Management

    Released 8/2024 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Skill Level: Intermediate | Genre: eLearning | Language: English + srt | Duration: 1h 36m | Size: 204 MB In this course, learn best practices for controlling cybersecurity risks with Microsoft Defender Vulnerability...
  11. Hndeeee

    Veeam Authentication bypass vulnerability

    #exploit 1. CVE-2024-26229: Windows 10 LPE vulnerability https://github.com/varwara/CVE-2024-26229 ]-> https://github.com/RalfHacker/CVE-2024-26229-exploit 2. CVE-2024-29849: Veeam Authentication bypass vulnerability...
  12. WeB DrAG0N

    Exploit: SQL Injection Vulnerability in Boelter Blue System Management

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  13. Boku Wa Tobi

    Combo Tools Acunetix Web Vulnerability Scanner v13.0.2002 for Linux x64

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  14. Boku Wa Tobi

    Multi/Others Acunetix Web Vulnerability Scanner 12.0.19051514 Full Crack

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** Acunetix Web Interface The AcuMonitor Service is fully integrated with Acunetix and is enabled for all the targets configured in Acunetix. 1.Install Acunetix 2. stop acunetx in services.msc...
  15. diiiick

    Multi vulnerability scanner php

    Link: https://github.com/CyberCommands/WebScanner *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  16. diiiick

    Admin Panel Finder Of Any Website

    Link: https://github.com/ShubhamTuts/Admin-Panel-Finder-Of-Any-Website *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  17. r00tx69

    (DUMP) Vulnerability + Data - Brazilian website

    Link vulnerable to SQL Injection: https://assinecorreio.rac.com.br/compra.php?id=5 Users DB - Encrypted :( +------------------------------+----------------------------------+ | usuarioLogin | usuarioSenha |...
  18. conmalevn

    Suggestion This Linux vulnerability is special

    Lỗ hổng Linux này đặc biệt ở chỗ nó xảy ra không phải do nhà phát triển chống lại mã đã mắc lỗi mà do kẻ tấn công lừa đảo duy trì quyền tấn công mã và sau đó sử dụng một số khó khăn. để ẩn tập tin. Tôi không thành thạo về mã cấp thấp nên sẽ không thảo luận các vấn đề kỹ thuật như cách kẻ tấn...
  19. tronny

    SignalLabs - Vulnerability Research & Fuzzing 2022, by Christopher Vella

    SignalLabs - Vulnerability Research & Fuzzing 2022, by Christopher Vella *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  20. jackaw

    RainLoop WebMail Vulnerability

    An unpatched high-severity security flaw has been disclosed in the open-source RainLoop web-based email client that could be weaponized to siphon emails from victims’ inboxes. Tracked as CVE-2022-29360, the flaw relates to a stored cross-site-scripting vulnerability impacting the latest version...
  21. carxproveteran

    Vulnerability Identification In Cyber Security Course

    Vulnerability Identification In Cyber Security Course Beginners guide to learn Vulnerability Identification In Cyber Security. What you'll learn Pen Test Matrics Management of a PenTest Information Gathering Vulnerability Identification Vulnerability Verification *** Hidden text: You do not...
  22. Cl/4y

    Method/Tut Sirius | Best General Purpose Vulnerability Scanner

    Sirius | First Truly Open-Source General Purpose Vulnerability Scanner Sirius Scan Sirius is the first truly open-source general purpose vulnerability scanner. Today, the information security community remains the best and most expedient source for cybersecurity intelligence. The community...
  23. SK0007

    Earn Money with Fun! Find Vulnerability in Random Sites

    This article I will tell you about how I make money from sites that do not have a Bug bounty program, because I think this is very interesting to discuss, from the beginning I found the site to being paid by the site owner as a thank you for reporting a vulnerability. In the last few months I...
  24. franzzen

    🔥5 free Vulnerability Scanners

    ⚡️Nuclei 📜Nuclei is a scanner designed to probe modern applications, infrastructure, cloud settings, and networks, assisting in identifying and correcting vulnerabilities. 🔗https://github.com/projectdiscovery/nuclei 🪓Nikto 📜Nikto is a web server scanning tool that conducts in-depth tests on...
  25. franzzen

    💉SQL Injection Vulnerability Scanner Tool's

    All safely from github 🔹SQLMap 🔗https://github.com/sqlmapproject/sqlmap 🔹jSQL Injection 🔗https://github.com/ron190/jsql-injection 🔹BBQSQL 🔗https://github.com/Neohapsis/bbqsql 🔹NoSQLMap 🔗 https://github.com/codingo/NoSQLMap 🔹Whitewidow...
  26. aolmer12

    Sites for finding vulnerables

    1 - Sploius is an amazing site that utilize multi exploit db's at once to search for vulnerabilities . https://sploitus.com/ 2 - kitploit exploit search feature is really amazing to check for exploits, vulns and hacking tool https://exploit.kitploit.com/ 3 - The OG of exploit's exploitdb it is...
  27. killua97

    Lynda - Ethical Hacking: Vulnerability Analysis

    In order to assess—and ultimately, decrease—an organization’s risk, IT security professionals must first evaluate and reduce existing vulnerabilities. If you’re working to strengthen network security at your organization, it’s essential to have a solid grasp of the processes, methodologies, and...
  28. carxproveteran

    Master Course : Cybersecurity Vulnerability Management 2.0

    Master Course : Cybersecurity Vulnerability Management 2.0 Cybersecurity, Vulnerability Management, Patch Management, Security Onion, Qualys, Tenable, Rapid7, OpenVAS, Automation What you'll learn Understand the fundamental concepts of Vulnerability Management. Conduct effective Vulnerability...
  29. tronny

    SANS - SEC460 - Enterprise Threat and Vulnerability Assessment

    SANS - SEC460 - Enterprise Threat and Vulnerability Assessment *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  30. tronny

    Udemy - Network & Vulnerability Scan Nmap & Nessus

    Udemy - Network & Vulnerability Scan Nmap & Nessus, by Muharrem AYDIN *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  31. JakeLogan

    Best Web Vulnerability Scanners

    🔺Netsparker Application Security Scanner — Application security scanner to automatically find security flaws. 🔺 Burp - Pro — Application security scanner to automatically find security flaws. 🔺Nikto — Noisybut fast black box web server and web application vulnerability scanner. 🔺Arachni —...
  32. hilltimoth

    Private Learn Vulnerability Analysis in Kali Linux with SysGod!!

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  33. PepeBogdano

    SQLi/Dork ⭐ CRACKED⭐✅ ANARCHY PANEL RAT 4.7 ✅ ⚡

    Download: https://mega.nz/file/AIkiTKyK#oM4oCsFRiWujMgp36AGXWZab7TpQu6ljx5F2KDmxaF4 *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  34. PepeBogdano

    SQLi/Dork ⭐️ BEST OPEN SOURCE WEB VULNERABILITY TOOLS [2022] ⭐️

    Grabber Grabber is a web application scanner which can detect many security vulnerabilities in web applications. It performs scans and tells where the vulnerability exists. It can detect the following vulnerabilities: Cross-site scripting SQL injection Ajax testing File inclusion JS source...
  35. chuwakas

    SQLi/Dork SQLi Vulnerability Scanner 1.0

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  36. gimbardino

    It’s Confirmed: Metabase Critical Vulnerability Found Exploited!

    https://thecyberexpress.com/metabase-critical-vulnerability-exploited/
  37. Xicoderx

    MIX Cross-Site Scripting Vulnerability in Google Translate (Bounty $3133.70)

    How did I earn $3133.70 from Google? Video PoC XSS Google Translate (Proof of Concept) Cross-Site Scripting ( XSS ) on Google's translate.google.com domain . At 2 am with the winter weather in Hanoi, when everyone is asleep, I am still engrossed in my daily work, after finishing work, it...
  38. 0dayhacker

    The new Vulnerability on microsoft office word file.docx

    CVE-2021-40444 Usage Ensure to run setup.sh first as you will need few directories. Once you have run the script, you should be able to run gen.py with the example given: # Usage python3 gen.py -d document/Sample.docx -p payload/payload.dll -i "http://10.10.10.10" -t html/template.html -c...
  39. carxproveteran

    Udemy - The Vulnerability Analysis Course

    The Vulnerability Analysis Course Learn & understand Vulnerability Ethical Hacking course. What you'll learn Information gathering Vulnerability analysis SQL mapping Information assurance model Introducing metasploit in kali linux Hashes and passwords Classic and modern encryption *** Hidden...
  40. 0dayhacker

    Multi/Others WordPress Stop Spammers Plugin - log XSS

    WordPress Plugin Stop Spammers 2021.8 - log Reflected Cross-site Scripting (XSS) # Vendor Homepage: https://wordpress.org/plugins/stop-spammer-registrations-plugin/ # Software Link: https://downloads.wordpress.org/plugin/stop-spammer-registrations-plugin.zip # Version: <= 2021.8 # Tested on...
  41. 0dayhacker

    Multi/Others Ulicms-create admin user via mass assignment Vulnerability

    Ulicms 2023.1 - create admin user via mass assignment #Application: Ulicms #Version: 2023.1-sniffing-vicuna #Bugs: create admin user via mass assignment #Technology: PHP #Vendor URL: https://en.ulicms.de/ #Software Link...
  42. 0dayhacker

    SQLi/Dork SQLiteManager 1.2.0 / 1.2.4 - Blind SQL Injection Vulnerability

    Risk: [Security Risk High] 0day-ID-33164 Category: web applications Platform: php 1. Description SQLiteManager 1.20 allows SQL injection via the /sqlitemanager/main.php dbsel parameter. NOTE: This product is discontinued...
  43. !Xcrxk

    Recon-X | Advanced Reconnaissance Tool

    Recon-X is the ultimate tool to conveniently carry out the reconnaissance of your target and discover its attacking surface. The tool itself comes with two options for installation. First is the API mode, that is based on hackertarget API making it light and efficient and can be used for the...
  44. mwahiidhidayat

    SMTP Shell CP WP 27290 Last sites vulnerability for mass exploit.

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  45. mwahiidhidayat

    SMTP Shell CP WP 1000 Eighth sites vulnerability for mass exploit.

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  46. mwahiidhidayat

    SMTP Shell CP WP 1000 Seventh sites vulnerability for mass exploit.

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  47. mwahiidhidayat

    SMTP Shell CP WP 1000 Sixth sites vulnerability for mass exploit.

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  48. mwahiidhidayat

    SMTP Shell CP WP 1000 Fifth sites vulnerability for mass exploit.

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  49. mwahiidhidayat

    SMTP Shell CP WP 1000 Fourth sites vulnerability for mass exploit.

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  50. mwahiidhidayat

    SMTP Shell CP WP 1000 Third sites vulnerability for mass exploit.

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Top Bottom