• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

spoofing

  1. dEEpEst

    Crypter 🧬 Stego Injector – Hide Payload in Images [ SEMIFUD 1/36]

    🧬 Stego Injector – Red Channel Steganography Dropper & Executable Cloaker Stego Injector is a Red Team tool that allows you to inject any .exe payload into a PNG image using red-channel steganography and export a final executable disguised as a `.png`. This PoC is ideal for education...
  2. itsMe

    Sniffing and Spoofing with Kali Linux

    Description Having access to an internal network can provide a wealth of information, if you know how to look for it. This course will teach you Sniffing and Spoofing techniques using Ettercap and TCPDump. Once a foothold is established within a network, the next logical step is to try and...
  3. Exploits Spoofing signatures in Office

    Hidden content
  4. 1

    Exploits Open-Xchange OX App Suite Content Spoofing / Cross Site Scripting

    Open-Xchange OX App Suite suffers from a content spoofing, cross site scripting, and information disclosure vulnerabilities. Versions affected vary depending on the vulnerability. View the full article
  5. 1

    Exploits Go Cryptography Libraries Cleartext Message Spoofing

    During a short security test, SEC Consult found a severe security vulnerability in the clearsign package of supplementary Go cryptography libraries. View the full article
  6. 1

    Exploits systemd Seat Verification Active Session Spoofing

    systemd suffers from a lack of seat verification in the PAM module and in turn permits the spoofing of an active session to polkit. View the full article
  7. 1

    Exploits Xiaomi Mi Browser / Mint Browser URL Spoofing

    Xiaomi Mi Browser version 10.5.6-g and Mint Browser version 1.5.3 suffer from a URL spoofing vulnerability. View the full article
  8. 1

    Exploits Microsoft Windows .Reg File / Dialog Box Message Spoofing

    The Windows registry editor allows specially crafted .reg filenames to spoof the default registry dialog warning box presented to an end user. This can potentially trick unsavvy users into choosing the wrong selection shown on the dialog box. Furthermore, we can deny the registry editor its...
  9. 1

    Exploits WordPress WooCommerce GloBee Payment Gateway 1.1.1 Bypass / Spoofing

    WordPress WooCommerce plugin with GloBee cryptocurrency payment gateway versions 1.1.1 and below suffer from payment bypass and unauthorized order status spoofing vulnerabilities. View the full article
  10. dEEpEst

    E-mail spoofing

    WARNING!  This tutorial is only intended for educational purposes. It is strictly forbidden to use the tutorial and the information in this tutorial for other (illegal) purposes.It is only allowed to use and / or apply the information from this tutorial if all parties involved have given...
Back
Top