Submit your paper, tool, tutorial or security article
IMPORTANT: We accept original content only. Accept-Language: English, Spanish. Papers, tutorials and security article can be as technical as the subject requires, but [...]
2019-11-19T07:12:01+00:00November 18th, 2019|Blog|
IMPORTANT: We accept original content only. Accept-Language: English, Spanish. Papers, tutorials and security article can be as technical as the subject requires, but [...]
2019-11-19T03:21:57+00:00November 6th, 2019|Blog|
PhpSploit is a remote control framework, aiming to provide a stealth interactive shell-like connection over HTTP between client and web server. It is [...]
2019-11-19T03:21:49+00:00November 5th, 2019|Blog|
CVE-2019-9810 is a vulnerability that has been found and exploited at Pwn2Own 2019 by Richard Zhu and Amat Cama. It affects Mozilla's JavaScript [...]
2019-11-19T03:22:41+00:00November 4th, 2019|Blog|
What's this This is an exploit for a bug in php-fpm (CVE-2019-11043). In certain nginx + php-fpm configurations, the bug is possible [...]
2019-11-19T03:22:27+00:00November 3rd, 2019|Blog|
Vulnerability Summary The pg_ctlcluster script in the postgresql-common package in Debian and Ubuntu is vulnerable to a local privilege escalation attack. pg_ctlcluster is [...]
2019-11-19T03:22:33+00:00November 2nd, 2019|Blog|
As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be collected automatically through Shodan, Censys or [...]
2019-11-19T03:21:41+00:00November 1st, 2019|Blog|
You can use this Framework on your website to check the security of your website by finding the vulnerability in your website or [...]
2019-11-19T03:25:10+00:00November 1st, 2019|Blog|
WARNING: SUDO_KILLER is part of the KILLER project. SUDO_KILLER is still under development and there might be some issues, please create an issue [...]
2019-11-19T03:25:44+00:00November 1st, 2019|Blog|
Cisco Smart Install is a plug-and-play configuration and image-management feature that provides zero-touch deployment for new switches. You can ship a switch [...]
2019-11-19T03:28:13+00:00November 1st, 2019|Blog|
WES-NG is a tool based on the output of Windows' systeminfo utility which provides the list of vulnerabilities the OS is vulnerable to, [...]