Webmin version 1.920 remote root exploit
Vulnerability
Processor Vulnerability – Spectre
Spectre breaks the isolation between different applications. It allows an attacker to trick error-free programs, which follow best practices, into[…]
Processor Vulnerability – Meltdown
Meltdown breaks the most fundamental isolation between user applications and the operating system. This attack allows a program to access[…]
krack attack scripts released
krack attack is a pseudonym for key reinstallation attacks. Krack attack uses a vulnerability in WPA2 (Wi-Fi Protected Access II[…]
ThreatPinchLookup, threat intelligence extension for Chrome
ThreatPinchLookup supplies threat intelligence information on hover tool tips. Creates on hover tooltips for every website for IPv4, MD5, SHA2,[…]
Inspector.py privilege escalation utility
The Inspector is a handy privilege escalation utility. Features; -can find processes with root privilege -find exploits for your kernel[…]
torcrack: ssh brute force over TOR
torcrack is a penetration testing utility which tries to crack SSH passwords multi-threaded and over TOR network. argparse, PyFiglet, PySocks,[…]
rapid7/ metasploitable3 – a VM for metasploit.
Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities. It is[…]
PenQ Pentesting Browser Bundle
PenQ is an open source, Linux-based penetration testing browser bundle we built over Mozilla Firefox. It comes pre-configured with security[…]
Using Vuls Vulnerability Scanner For Linux
Vuls is a vulnerability scanner for Linux, agentless and written in golang. Vuls downloads NVD(National Vulnerability Database) and inserts into[…]