Webmin version 1.920 remote root exploit
FortiOS 5.6.7 / 6.0.4 Credential Disclosure
FortiOS versions 5.6.3 through 5.6.7 and 6.0.0 through 6.0.4 suffer from a credential disclosure vulnerability. Exploit code is below;
Processor Vulnerability – Spectre
Spectre breaks the isolation between different applications. It allows an attacker to trick error-free programs, which follow best practices, into[…]
Processor Vulnerability – Meltdown
Meltdown breaks the most fundamental isolation between user applications and the operating system. This attack allows a program to access[…]
krack attack scripts released
krack attack is a pseudonym for key reinstallation attacks. Krack attack uses a vulnerability in WPA2 (Wi-Fi Protected Access II[…]
Cyberprobe open source real time monitoring SIEM
The Cyberprobe project is an open-source distributed architecture for real-time monitoring of networks against attack. The software consists of two[…]
ThreatPinchLookup, threat intelligence extension for Chrome
ThreatPinchLookup supplies threat intelligence information on hover tool tips. Creates on hover tooltips for every website for IPv4, MD5, SHA2,[…]
Inspector.py privilege escalation utility
The Inspector is a handy privilege escalation utility. Features; -can find processes with root privilege -find exploits for your kernel[…]
torcrack: ssh brute force over TOR
torcrack is a penetration testing utility which tries to crack SSH passwords multi-threaded and over TOR network. argparse, PyFiglet, PySocks,[…]
rapid7/ metasploitable3 – a VM for metasploit.
Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities. It is[…]