Submit your paper, tool, tutorial or security article
IMPORTANT: We accept original content only. Accept-Language: English, Spanish. Papers, tutorials and security article can be as technical as the [...]
Stealth post exploitation framework
PhpSploit is a remote control framework, aiming to provide a stealth interactive shell-like connection over HTTP between client and web [...]
Exploit for CVE-2019-9810 Firefox on Windows 64 bits
CVE-2019-9810 is a vulnerability that has been found and exploited at Pwn2Own 2019 by Richard Zhu and Amat Cama. It [...]
Exploit for CVE-2019-11043
What's this This is an exploit for a bug in php-fpm (CVE-2019-11043). In certain nginx + php-fpm configurations, the bug is possible to trigger from the outside. This means [...]
Debian – Ubuntu Privilege Escalation
Vulnerability Summary The pg_ctlcluster script in the postgresql-common package in Debian and Ubuntu is vulnerable to a [...]
Automated Mass Exploiter
As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be [...]
Optiva Framework Web Application Scanner
You can use this Framework on your website to check the security of your website by finding [...]
Sudo Killer
WARNING: SUDO_KILLER is part of the KILLER project. SUDO_KILLER is still under development and there might be some issues, please [...]
SIET Smart Install Exploitation Tool
Cisco Smart Install is a plug-and-play configuration and image-management feature that provides zero-touch deployment for new switches. You can [...]
Windows Exploit Suggester
WES-NG is a tool based on the output of Windows' systeminfo utility which provides the list of vulnerabilities the OS [...]