• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

monitoring

  1. dEEpEst

    Azure Solutions Architect Expert (AZ-303 & AZ-304) 20GB 2025

    Azure Solutions Architect Expert (AZ-303 & AZ-304) As a leading cloud provider, Azure is a critical component of the IT portfolio for many companies, governments, and organizations. Architecting solutions that run optimally in Azure requires a deep working knowledge of a wide range of resources...
  2. dEEpEst

    Identifying Attacks and Breaches

    Web Server Log Analysis: Identifying Attacks and Breaches Table of Contents Introduction Understanding Web Server Logs Apache Logs Nginx Logs Cloudflare Logs Common Attack Patterns in Logs Brute Force Attacks SQL Injection Attempts Cross-Site Scripting (XSS) Directory Traversal & LFI/RFI...
  3. dEEpEst

    Reverse Engineering x64dbg plugin to bypass Themida 3.x Anti-Debugger / VM / Monitoring programs checks (64bits only)

    x64dbg plugin to bypass Themida 3.x Anti-Debugger / VM / Monitoring programs checks (64bits only) Hidden content
  4. itsMe

    Tacticalrmm - A remote monitoring & management tool, built with Django, Vue and Go.

    Tactical RMM is a remote monitoring & management tool for Windows computers, built with Django and Vue. It uses an agent written in golang and integrates with MeshCentral Features     Teamviewer-like remote desktop control     Real-time remote shell     Remote file browser (download and...
  5. dEEpEst

    Network Security Monitoring (NSM) With Security Onion

    Network Security Monitoring (NSM) With Security Onion *Network security monitoring is a skill that is at the core of the broad set of skills security professionals can master to prevent, detect, and respond to attacks which are so common today. Download Link : Hidden content
  6. dEEpEst

    RAT XploitSPY [Android Monitoring / Spying Tool]

    Hidden content A cloud based Android Spying or Monitoring Tool, powered by NodeJS Features GPS Logging Microphone Recording View Contacts SMS Logs Send SMS Call Logs View Installed Apps View Stub Permissions Live Clipboard Logging Live Notification Logging...
  7. 1

    Exploits AUO SunVeillance Monitoring System 1.1.9e SQL Injection

    AUO SunVeillance Monitoring System version 1.1.9e suffers from a remote SQL injection vulnerability. View the full article
  8. 1

    Exploits AUO SunVeillance Monitoring System 1.1.9e Incorrect Access Control

    AUO SunVeillance Monitoring System version 1.1.9e suffers from an incorrect access control vulnerability. View the full article
  9. 1

    Exploits Pronestor Health Monitoring Privilege Escalation

    Pronestor Health Monitoring versions prior to 8.1.12.0 suffer from a local privilege escalation vulnerability due to weak file permissions. View the full article
  10. 1

    Exploits Device Monitoring Studio 8.10.00.8925 Denial Of Service

    Device Monitoring Studio version 8.10.00.8925 denial of service proof of concept exploit. View the full article
  11. 1

    Exploits School Attendance Monitoring System 1.0 SQL Injection

    School Attendance Monitoring System version 1.0 suffers from a remote SQL injection vulnerability. View the full article
  12. 1

    Exploits School Attendance Monitoring System 1.0 Shell Upload

    School Attendance Monitoring System version 1.0 suffers from a remote shell upload vulnerability. View the full article
  13. 1

    Exploits School Attendance Monitoring System 1.0 Cross Site Request Forgery

    School Attendance Monitoring System version 1.0 suffers from a cross site request forgery vulnerability. View the full article
  14. 1

    Exploits School Equipment Monitoring System 1.0 SQL Injection

    School Equipment Monitoring System version 1.0 suffers from a remote SQL injection vulnerability. View the full article
  15. 1

    Exploits ServersCheck Monitoring Software 14.3.3 SQL Injection

    ServersCheck Monitoring Software versions up through 14.3.3 suffer from a remote SQL injection vulnerability. View the full article
  16. 1

    Exploits ServersCheck Monitoring Software 14.3.3 Cross Site Scripting

    ServersCheck Monitoring Software versions up through 14.3.3 suffer from a cross site scripting vulnerability. View the full article
  17. 1

    Exploits ServersCheck Monitoring Software 14.3.3 Arbitrary File Write / DoS

    ServersCheck Monitoring Software versions up through suffer from arbitrary file write and denial of service vulnerabilities. View the full article
Back
Top