• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

vulnerability

  1. itsMe

    Scanner-and-Patcher: Web Vulnerability Scanner and Patcher

    This tool is very helpful for finding vulnerabilities present in Web Applications. A web application scanner explores a web application by crawling through its web pages and examines it for security vulnerabilities, which involves the generation of malicious inputs and evaluation of the...
  2. dEEpEst

    Article: The Importance of Vulnerability Management and Patching for a Strong Security Posture

    The Importance of Vulnerability Management and Patching for a Strong Security Posture Learn why regular vulnerability assessments and timely patching are essential to maintaining a strong security posture. Get tips on managing software and hardware vulnerabilities effectively. The Importance...
  3. dEEpEst

    Uses ChatGPT API and Python-Nmap module to use the GPT3 model to create vulnerability reports based on Nmap scan data.

    This is a Proof Of Concept application that demostrates how AI can be used to generate accurate results for vulnerability analysis and also allows further utilization of the already super useful ChatGPT. The profile is the type of scan that will be executed by the nmap subprocess. The Ip or...
  4. S

    Tools Checke email vulnerablity

    This tool has the following features: - Domain email spoofability checker: The tool will automatically check if a domain is email spoofable or not. This can help you identify potential vulnerabilities in your email system. - Single and multiple domain input: You can input a single domain or...
  5. itsMe

    CVE Vulnerability Information Downloader

    Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from vulnerability scanners like OpenVAS can be enriched with this information to prioritize remediation. The repository also contains a PowerBI template to...
  6. Exploits vulnerability (CVE-2022-44666)

      Hidden content  
  7. M

    CVE-2023-21674 A Windows ALPC vulnerability

    This isn't cutting edge news(Jan 10 2023) but it's still relevant A vulnerability in Windows' Advanced Local Procedure Call (ALPC) Exploitation of this vulnerability can lead to a browser sandbox escape and scope change allowing an attacker to gain SYSTEM privileges 
  8. itsMe

    Wapiti 3.1.5 - Web-application vulnerability scanner

    Wapiti works as a “black-box” vulnerability scanner, that means it won’t study the source code of web applications but will work like a fuzzer, scanning the pages of the deployed web application, extracting links and forms and attacking the scripts, sending payloads and looking for error...
  9. itsMe

    Wapiti 3.1.4 - web-application vulnerability scanner

    Wapiti works as a “black-box” vulnerability scanner, that means it won’t study the source code of web applications but will work like a fuzzer, scanning the pages of the deployed web application, extracting links and forms and attacking the scripts, sending payloads and looking for error...
  10. itsMe

    xRay Web Vulnerability Scanner Advanced v1.9.3

    Zero False Positives, Without Affecting Business Each loophole has undergone real experimental evidence, using refined semantic analysis + innovative detection technology to ensure that the loophole is real and effective, to avoid massive misreporting affecting the business judgment, and to...
  11. itsMe

    C/C++ TrojanSourceFinder v1.1.3 - detect “Trojan Source” vulnerability in source code

    TrojanSourceFinder helps developers detect "Trojan Source" vulnerability in source code. Trojan Source vulnerability allows an attacker to make malicious code appear innocent. In general, the attacker tries to lure by passing his code off as a comment (visually). It is a serious threat because...
  12. itsMe

    Wapiti 3.1.2 - web-application vulnerability scanner

    Wapiti works as a “black-box” vulnerability scanner, that means it won’t study the source code of web applications but will work like a fuzzer, scanning the pages of the deployed web application, extracting links and forms and attacking the scripts, sending payloads and looking for error...
  13. LSDeep

    ORhunter - Open Redirect Vulnerability Scanner

    Hidden content Hidden content
  14. itsMe

    Wprecon v2.4.4 - vulnerability recognition tool in CMS WordPress

    WPrecon (WordPress Recon) Wprecon (WordPress Recon), is a vulnerability recognition tool in CMS WordPress, 100% developed in Go. Features      Detection WAF      Fuzzing Backup Files      Fuzzing Passwords     Random User-Agent      Plugin(s) Enumerator      Theme(s) Enumerator      Scripts...
  15. itsMe

    WSVuls - Website Vulnerability Scanner

    WSVuls - Website Vulnerability Scanner Detect Issues (Outdated Server Software And Insecure HTTP Headers) What's WSVuls? WSVuls is a simple and powerful command line tool for Linux, Windows and macOS. It's designed for developers/testers and for those workers in IT who want to test...
  16. itsMe

    Request smuggler: Http request smuggling vulnerability scanner

    Based on the amazing research by James Kettle. The tool can help to find servers that may be vulnerable to request smuggling vulnerability. Hidden content
  17. itsMe

    Wpscan v3.8.21 - black box WordPress vulnerability scanner

    WPScan is a black box WordPress vulnerability scanner. Changelog v3.8.21     Minor         Improved plugin version detection via changelog section in the Readme – Ref #1692         Fixed deprecation warnings – Ref #1709 Hidden content
  18. itsMe

    Wapiti 3.1 - web-application vulnerability scanner

    Wapiti works as a “black-box” vulnerability scanner, that means it won’t study the source code of web applications but will work like a fuzzer, scanning the pages of the deployed web application, extracting links and forms and attacking the scripts, sending payloads and looking for error...
  19. itsMe

    Wprecon v2.3.2 - vulnerability recognition tool in CMS WordPress

    WPrecon (WordPress Recon) Wprecon (WordPress Recon), is a vulnerability recognition tool in CMS WordPress, 100% developed in Go. Features      Detection WAF      Fuzzing Backup Files      Fuzzing Passwords     Random User-Agent      Plugin(s) Enumerator      Theme(s) Enumerator      Scripts...
  20. itsMe

    TrojanSourceFinder v1.1.1 - Help Find Trojan Source Vulnerability In Code

    TrojanSourceFinder helps developers detect "Trojan Source" vulnerability in source code. Trojan Source vulnerability allows an attacker to make malicious code appear innocent. In general, the attacker tries to lure by passing his code off as a comment (visually). It is a serious threat because...
Back
Top