• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

authentication

  1. dEEpEst

    Phyton Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in order to run

    Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in order to run a full investigation against a customer’s Azure Active Directory (AzureAD), Azure, and M365 environments. Untitled Goose Tool gathers additional...
  2. itsMe

    Android Android App Development with Laravel Authentication

    Kotlin and Laravel Authentication concepts Description In this course, we are going to learn how to develop an Android App that can allow users to Register, Login and Logout where the APIs come from the Laravel Application. Laravel is a PHP Framework that follows the MVC (Model View...
  3. itsMe

    Hacking Multifactor Authentication

    Protect your organization from scandalously easy-to-hack MFA security “solutions” Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use...
  4. itsMe

    WP WP 2FA Premium v2.3.0- Two-factor authentication for WordPress

    The #1 user-rated 2FA WordPress plugin Join thousands of WordPress site owners – use WP 2FA to add an extra layer of security to your websites login pages. A powerful two-factor authentication WordPress plugin that’s easy to use! Improve the security of your WordPress website’s authentication...
  5. itsMe

    C/C++ Evil-Twin - Learn how to set up a fake authentication web page on a fake WiFi network

    Hidden content
  6. itsMe

    Phyton HWID Authentication

    Protects your program from unauthorized users using their HWIDS Information You can easily understand how to use this HWID authentication system and add it to python projects. Example: You can add the HWID Authentication to a paid program and unauthorized users won't be able to use the...
  7. itsMe

    OhMyQR - Hijack Services That Relies On QR Code Authentication

    QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications that rely on the “Login with QR code” feature as a secure way to login into accounts. In a nutshell, the victim scans the attacker’s QR code which...
  8. 1

    Exploits eIDAS-Node 2.3 Authentication Bypass

    eIDAS-Node versions 2.3 and below suffer from an authentication bypass vulnerability. View the full article
  9. 1

    Exploits Carel pCOWeb HVAC Modbus Interface Authentication Bypass

    The Carel pCOWeb card exposes a Modbus interface to the network. By design, Modbus does not provide authentication, allowing to control the affected system. Version A 1.4.11 - B 1.4.2 is affected. View the full article
  10. 1

    Exploits Infosysta Jira 1.6.13_J8 Project List Authentication Bypass

    Infosysta Jira version 1.6.13_J8 suffers from an authentication bypass vulnerability that allows you to see project lists. View the full article
  11. 1

    Exploits Infosysta Jira 1.6.13_J8 Push Notification Authentication Bypass

    Infosysta Jira version 1.6.13_J8 suffers from an authentication bypass vulnerability that allows you to see push notifications for a given user. View the full article
  12. 1

    Exploits Part-DB 0.4 Authentication Bypass

    Part-DB version 0.4 suffers from an authentication bypass vulnerability. View the full article
  13. 1

    Exploits Sangoma SBC 2.3.23-119-GA Authentication Bypass

    A remotely exploitable vulnerability exists in the 2.3.23-119-GA version of Sangoma SBC that would allow an unauthenticated user to bypass authentication and login as a non-existent user but with complete access to the dashboard including additional privileged user creation capabilities. View...
  14. 1

    Exploits ThinVNC 1.0b1 Authentication Bypass

    ThinVNC version 1.0b1 suffers from an authentication bypass vulnerability. View the full article
  15. 1

    Exploits CyberArk Password Vault 10.6 Authentication Bypass

    CyberArk Password Vault version 10.6 suffers from an authentication bypass vulnerability. View the full article
  16. 1

    Exploits TP-Link TL-WR1043ND 2 Authentication Bypass

    TP-Link TL-WR1043ND 2 suffers from an authentication bypass vulnerability. View the full article
  17. 1

    Exploits PBS Professional 19.2.3 Authentication Bypass

    PBS Professional versions 19.2.3 and below suffer from an authentication bypass vulnerability. View the full article
  18. 1

    Exploits Zabbix 4.4 Authentication Bypass

    Zabbix versions 4.4 and below authentication bypass demo proof of concept exploit. View the full article
  19. 1

    Exploits Zabbix 4.2 Authentication Bypass

    Zabbix version 4.2 suffers from an authentication bypass vulnerability. View the full article
  20. 1

    Exploits College-Management-System 1.2 Authentication Bypass

    College-Management-System version 1.2 suffers from an authentication bypass vulnerability. View the full article
Back
Top