Webmin version 1.920 remote root exploit
FortiOS 5.6.7 / 6.0.4 Credential Disclosure
FortiOS versions 5.6.3 through 5.6.7 and 6.0.0 through 6.0.4 suffer from a credential disclosure vulnerability. Exploit code is below;
Processor Vulnerability – Spectre
Spectre breaks the isolation between different applications. It allows an attacker to trick error-free programs, which follow best practices, into…
Processor Vulnerability – Meltdown
Meltdown breaks the most fundamental isolation between user applications and the operating system. This attack allows a program to access…
krack attack scripts released
krack attack is a pseudonym for key reinstallation attacks. Krack attack uses a vulnerability in WPA2 (Wi-Fi Protected Access II…
Cyberprobe open source real time monitoring SIEM
The Cyberprobe project is an open-source distributed architecture for real-time monitoring of networks against attack. The software consists of two…
ThreatPinchLookup, threat intelligence extension for Chrome
ThreatPinchLookup supplies threat intelligence information on hover tool tips. Creates on hover tooltips for every website for IPv4, MD5, SHA2,…
Inspector.py privilege escalation utility
The Inspector is a handy privilege escalation utility. Features; -can find processes with root privilege -find exploits for your kernel…
torcrack: ssh brute force over TOR
torcrack is a penetration testing utility which tries to crack SSH passwords multi-threaded and over TOR network. argparse, PyFiglet, PySocks,…
rapid7/ metasploitable3 – a VM for metasploit.
Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities. It is…