• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

infrastructure

  1. dEEpEst

    Azure Solutions Architect Expert (AZ-303 & AZ-304) 20GB 2025

    Azure Solutions Architect Expert (AZ-303 & AZ-304) As a leading cloud provider, Azure is a critical component of the IT portfolio for many companies, governments, and organizations. Architecting solutions that run optimally in Azure requires a deep working knowledge of a wide range of resources...
  2. dEEpEst

    The US Cybersecurity and Infrastructure Protection Agency (CISA) - Launch new tool

    The US Cybersecurity and Infrastructure Protection Agency (CISA) has released an open source incident response tool, which makes it easy to detect signs of malicious activity in Microsoft cloud environments. You can see the tool at this link:
  3. dEEpEst

    The United States Cybersecurity and Infrastructure Security Agency (CISA) has released 'Decider',

    The United States Cybersecurity and Infrastructure Security Agency (CISA) has released 'Decider', an open source tool that helps defenders and security analysts quickly generate MITRE ATT&CK mapping reports.  The MITER ATT&CK framework is a standard for identifying and tracking...
  4. N

    Pentesting VOIP infrastructure (Recommended Ebook)

    Hidden content
  5. itsMe

    Cloudtopolis: Zero Infrastructure Password Cracking

    Cloudtopolis is a tool that facilitates the installation and provisioning of Hashtopolis on the Google Cloud Shell platform, quickly and completely unattended (and also, free!). Together with Google Collaboratory, it allows us to break hashes without the need for dedicated hardware from any...
  6. itsMe

    Axiom - A dynamic infrastructure toolkit for red teamers and bug bounty hunters!

    Project Axiom is a set of utilities for managing a small dynamic infrastructure setup for bug bounty and pentesting. Axiom right now is perfect for teams as small as one person, without costing you much at all to run. And by not much to run at all, I mean, less than 5 bucks a month if you use...
  7. 1

    Exploits Cisco Prime Infrastructure Health Monitor TarArchive Directory Traversal

    This Metasploit module exploits a vulnerability found in Cisco Prime Infrastructure. The issue is that the TarArchive Java class the HA Health Monitor component uses does not check for any directory traversals while unpacking a Tar file, which can be abused by a remote user to leverage the...
  8. 1

    Exploits Cisco Prime Infrastructure Runrshell Privilege Escalation

    This Metasploit modules exploits a vulnerability in Cisco Prime Infrastructure's runrshell binary. The runrshell binary is meant to execute a shell script as root, but can be abused to inject extra commands in the argument, allowing you to execute anything as root. View the full article
  9. 1

    Exploits Cisco Prime Infrastructure Unauthenticated Remote Code Execution

    Cisco Prime Infrastructure (CPI) contains two basic flaws that when exploited allow an unauthenticated attacker to achieve remote code execution. The first flaw is a file upload vulnerability that allows the attacker to upload and execute files as the Apache Tomcat user; the second is a...
  10. 1

    Exploits Cisco Prime Infrastructure Unauthenticated Remote Code Execution

    Cisco Prime Infrastructure (CPI) contains two basic flaws that when exploited allow an unauthenticated attacker to achieve remote code execution. The first flaw is a file upload vulnerability that allows the attacker to upload and execute files as the Apache Tomcat user; the second is a...
  11. 1

    Exploits Trend Micro Virtual Mobile Infrastructure 5.5.1336 Denial Of Service

    Trend Micro Virtual Mobile Infrastructure version 5.5.1336 suffers from a denial of service vulnerability. View the full article
Back
Top