Skip to navigation Skip to content
Proturk Security Blog

"() { :; }; :(){ :|: & };:"

  • Home
  • About
  • Contact

Vulnerability

Webmin version 1.920 remote root exploit.

Webmin version 1.920 remote root exploit

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest
Continue reading →

Processor Vulnerability – Spectre

Spectre breaks the isolation between different applications. It allows an attacker to trick error-free programs, which follow best practices, into[…]

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest
Continue reading →

Processor Vulnerability – Meltdown

Meltdown breaks the most fundamental isolation between user applications and the operating system. This attack allows a program to access[…]

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest
Continue reading →

krack attack scripts released

krack attack is a pseudonym for key reinstallation attacks. Krack attack uses a vulnerability in WPA2 (Wi-Fi Protected Access II[…]

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest
Continue reading →

ThreatPinchLookup, threat intelligence extension for Chrome

ThreatPinchLookup supplies threat intelligence information on hover tool tips. Creates on hover tooltips for every website for IPv4, MD5, SHA2,[…]

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest
Continue reading →

Inspector.py privilege escalation utility

The Inspector is a handy privilege escalation utility. Features; -can find processes with root privilege -find exploits for your kernel[…]

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest
Continue reading →

torcrack: ssh brute force over TOR

torcrack is a penetration testing utility which tries to crack SSH passwords multi-threaded and over TOR network. argparse, PyFiglet, PySocks,[…]

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest
Continue reading →

rapid7/ metasploitable3 – a VM for metasploit.

Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities. It is[…]

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest
Continue reading →

PenQ Pentesting Browser Bundle

PenQ is an open source, Linux-based penetration testing browser bundle we built over Mozilla Firefox. It comes pre-configured with security[…]

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest
Continue reading →

Using Vuls Vulnerability Scanner For Linux

Vuls is a vulnerability scanner for Linux, agentless and written in golang. Vuls downloads NVD(National Vulnerability Database) and inserts into[…]

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest
Continue reading →
Posts navigation
  • 1
  • 2
  • Next
Recent Posts
  • Webmin version 1.920 remote root exploit.
  • FortiOS 5.6.7 / 6.0.4 Credential Disclosure
  • Processor Vulnerability – Spectre
  • Processor Vulnerability – Meltdown
  • krack attack scripts released
Recent Comments
  • Werner Ziegler on Install OpenVAS 8 on Debian 8 Jessie
  • admin on Install OpenVAS 8 on Debian 8 Jessie
  • Werner Ziegler on Install OpenVAS 8 on Debian 8 Jessie
  • ラズパイ(Raspbian Jessie)に OpenVAS 9 をインストールする on Install OpenVAS 8 on Debian 8 Jessie
  • admin on Install OpenVAS 8 on Debian 8 Jessie
Categories
  • .net
  • administration
  • antivirus
  • block cipher
  • brute force
  • control panel
  • cryptography
  • database
  • DOS
  • encryption
  • fail2ban
  • firewall
  • hacking tools
  • management
  • microsoft
  • monitoring
  • penetration testing
  • privacy
  • programming
  • putty
  • session hijacking
  • siem
  • sql
  • sshguard
  • ssl
  • surveillance
  • tls
  • Uncategorized
  • Vulnerability
Meta
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
Bulut
activist share ajenti antivirus brute force bulletin board centos cwp chacha20 ciphershed community control panel detection dos encrypted information encryption fail2ban firewall gethostbyname GHOST glasswire glibc jessie kloxo martus onerng openpanel openvas peerio phpmyadmin putty puttyrider random generator SEAL security session hijacking snoopsnitch sshguard ssl surveillance tracking truecrypt true random visual studio vulnerability webmin zpanel
January 2021
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Aug    
© Proturk Security Blog 2021 • AdBooster Designed by BoosterWP.
  • Home
  • About
  • Contact