Clone me! Clone or download the project: git clone https://github.com/CosasDePuma/SecurityNotFound.git SecurityNotFound cd SecurityNotFound “Installation” The src/404.php file should be located on...
Researchers discovered a new wave of Mirai Variant that used 13 different exploits to attack various router models and other network devices....
Most Destructive IoT malware Mirai now being delivered as Miori and its spreading via dangerous remote code execution exploits. Mirai malware has...
A Web Dashbord for Nmap XML Report Usage You should use this with docker, just by sending this command: $ mkdir /tmp/webmap...
Auto Root Exploit Tool Author : Nilotpal Biswas Facebook : https://www.facebook.com/nilotpal.biswas.73 Twitter : https://twitter.com/nilotpalhacker USAGE : for kernel version 2.6 all bash...
Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit For faster pen testing for large networks What You Can Do...
Exploit Pack is a well-integrated open source tool for conducting professional penetration tests. As like any other penetration testing tool it requires...
Newly discovered Microsoft office document exploit kit contains a variety of recent exploits and Malware such as Lokibot, Formbook and tracking kit...
roxysploit is a community-supported, open-source and penetration testing suite that supports attacks for numerous scenarios. conducting attacks in the field. Some containing Plugins in...
JexBoss is a tool for testing and exploiting vulnerabilities in JBoss Application Server and others Java Platforms, Frameworks, Applications, etc. Requirements Python...
drinkme is a shellcode test harness. It reads shellcode from stdin and executes it. This allows pentesters to quickly test their payloads...
Hey Guys, In this video i show you how to generate shellcodes and Backdoors using ShellSploit Framework and Kali Linux 2017.2. ShellSploit:...
DAVScan is a quick and lightweight webdav scanner designed to discover hidden files and folders on DAV enabled webservers. The scanner works...
Off-path attack means malicious hackers can be located anywhere on the Internet. An estimated 80 percent of Android phones contain a recently discovered...
Here are 5 of the most dangerous cyber security vulnerabilities that are exploited by hackers All the major government organizations and financial firms...
Exploit Flash Heap Isolation for a chance to “win” $100,000 If you can exploit Adobe’s Heap Isolation mitigation in Flash player version...