Aggregator
Play
Play
Play
CVE-2016-9632 | Tatsuya Kinoshita w3m up to 0.5.3-32 memory corruption (ID 43 / Nessus ID 95650)
Play
CVE-2007-2824 | AlstraSoft E-Friends 4.21 paypal.php pack sql injection (EDB-3956 / XFDB-34400)
Microsoft rolls out Office LTSC 2024 for Windows and Mac
最是良辰美景时,人人共此团圆夜
A Personally Identifiable Cyber Jihadist Domain Portfolio
A Personally Identifiable Cyber Jihadist Domain Portfolio
CVE-2004-0251 | rxgoogle.cgi 1.0 query cross site scripting (EDB-23647 / XFDB-15043)
Point Product vs. CDN for Bot Protection: Striking the Right Balance
WHAD: Wireless HAcking Devices
What is WHAD? The cybersecurity community has published a lot of wireless hacking tools based on various hardware platforms and custom communication protocols specifically designed to work with associated software. This leads to hackers...
The post WHAD: Wireless HAcking Devices appeared first on Penetration Testing Tools.
betterscan: code analysis & automation platform
betterscan-ce It is a Code and Infrastructure (IaC) and Cloud-native Scanning/SAST/Static Analysis/Linting solution using many tools/Scanners with One Report. You can also add any tool to it. Currently, it supports many languages and tech...
The post betterscan: code analysis & automation platform appeared first on Penetration Testing Tools.
The Intersection Between a Snowden Slide and a Supposedly Malicious MD5
The Intersection Between a Snowden Slide and a Supposedly Malicious MD5
logdata-anomaly-miner: parses log data and allows to define analysis pipelines for anomaly detection
logdata-anomaly-miner This tool parses log data and allows to definition of analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and the lowest possible permissions to make it...
The post logdata-anomaly-miner: parses log data and allows to define analysis pipelines for anomaly detection appeared first on Penetration Testing Tools.