0

John McAfee Found Liable For 2012 Death Of Belize Neighbor




0

Wapiti Web Application Vulnerability Scanner 3.0.2

Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities.




0

Bing.com Hostname / IP Enumerator 1.0

This tool enumerates hostnames from Bing.com for an IP address. Bing.com is Microsoft's search engine which has an IP: search parameter. Written in Bash for Linux. Requires wget.




0

TestSSL 3.0rc6

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.




0

WebSploit Framework 4.0.1

WebSploit is an advanced man-in-the-middle framework.




0

Lulzbuster 1.0.0

Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.




0

TestSSL 3.0

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.




0

Lulzbuster 1.1.0

Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.




0

Lulzbuster 1.2.0

Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.




0

Wapiti Web Application Vulnerability Scanner 3.0.3

Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities.




0

Linux/x86 Reverse Shell NULL Free 127.0.0.1:4444 Shellcode

91 bytes small Linux/x86 reverse shell NULL free 127.0.0.1:4444 shellcode.




0

10Strike LANState 9.32 Host Check hostname Buffer Overflow

10Strike LANState version 9.32 on x86 Host Check hostname SEH buffer overflow exploit.




0

Apple Security Advisory 2016-03-21-7

Apple Security Advisory 2016-03-21-7 - OS X Server 5.1 is now available and addresses RC4 crypto weaknesses, file access, and information disclosure vulnerabilities.




0

Ubuntu Security Notice USN-3901-1

Ubuntu Security Notice 3901-1 - Jann Horn discovered that the userfaultd implementation in the Linux kernel did not properly restrict access to certain ioctls. A local attacker could use this possibly to modify files. It was discovered that the crypto subsystem of the Linux kernel leaked uninitialized memory to user space in some situations. A local attacker could use this to expose sensitive information. Various other issues were also addressed.




0

No cON Name 2019 Call For Papers

The No cON Name 2019 call for papers has been announced. It will be held in Barcelona, Spain, from November 14th and 15th, 2019.




0

BSidesLisbon 2019 Call For Papers

BSidesLisbon 2019 has announced its call for papers. It will be held November 28th and 29th at Auditorio FMD-UL.




0

ZeroNights 2019 Call For Papers

The ZeroNights 2019 Call For Papers has been announced. It will be held in Saint-Petersburg, Russia November 12th through the 13th, 2019.




0

RootedCON 2020 Call For Papers

RootedCON is a technology congress that will be held in Madrid (Spain) March 5th through the 7th, 2020. With an estimated seating from 2,000 and 2,500 people, is the most relevant specialized congress that is held in the country, and one of the most relevant in Europe, with attendee profiles ranging from students, Law Enforcement Agencies to professionals in the technology and information security market and, even, just passionate people.




0

c0c0n 2020 Call For Papers

The c0c0n 2020 Middle East call for papers has been announced. It will take place June 15th through the 18th, 2020 at the St. Regis in Abu Dhabi.




0

BSidesLjubljana 2020 Call For Papers

B-Sides Ljubljana will be held April 4th, 2020 in Ljubljana, Slovenia.




0

Positive Hack Days 10 Call For Papers

Call For Papers for Positive Hack Days 10 which will take place in Moscow, Russia May 13th through the 14th, 2020.




0

LeHACK 2020 Call For Papers

LeHACK 2020 is a yearly rendezvous where hackers and aficionados are meeting with both technical and non-technical talks and workshops about hacking. It is a great place to discover, to learn, to teach and be taught in the magical city of Paris. LeHACK 2020 will be held in La Cite des Sciences et de l'Industire in Paris, France from June 26th through the 27th, 2020.




0

REVULN 20x1 Call For Papers

REVULN 20x1 is an international conference taking place the April 28th through the 30th, 2020 in Metro Manila (Philippines) at the RED Hotel Cubao.




0

REVULN 20x2 Call For Papers

REVULN 20x2 is an international conference taking place the June 25th through the 26th, 2020 in St. Paul's Bay (Malta) at the Hotel Santana.




0

Bsides Brussels 2020 Call For Papers

BSides Brussels is a security conference in Brussels, Belgium, with talks, workshops and villages. The goal is to strengthen the exchange of knowledge, cooperation, communication, and integration between the different actors active in the IT security industry. We are pleased to announce that the first edition of BSides Brussels will be held on May 28th, 2020.




0

Linux x86_x64 sys_creat("ajit", 0755) Shellcode

53 bytes small Linux/x86_x64 sys_creat("ajit", 0755) shellcode.




0

Google Chrome 80 JSCreate Side-Effect Type Confusion

This Metasploit module exploits an issue in Google Chrome version 80.0.3987.87 (64 bit). The exploit corrupts the length of a float array (float_rel), which can then be used for out of bounds read and write on adjacent memory. The relative read and write is then used to modify a UInt64Array (uint64_aarw) which is used for read and writing from absolute memory. The exploit then uses WebAssembly in order to allocate a region of RWX memory, which is then replaced with the payload shellcode. The payload is executed within the sandboxed renderer process, so the browser must be run with the --no-sandbox option for the payload to work correctly.




0

All Phones In India To Be Equipped With Panic Buttons From 2017








0

Pachev FTP Server 1.0 Path Traversal

Pachev FTP Server version 1.0 suffers from a path traversal vulnerability.




0

Lotus Core CMS 1.0.1 Local File Inclusion

Lotus Core CMS version 1.0.1 suffers from a local file inclusion vulnerability.




0

FIBARO System Home Center 5.021 Remote File Inclusion / XSS

FIBARO System Home Center version 5.021 suffers from cross site scripting and remote file inclusion vulnerabilities.




0

Zen Load Balancer 3.10.1 Directory Traversal

Zen Load Balancer version 3.10.1 suffers from a directory traversal vulnerability. This finding was originally discovered by Cody Sixteen.




0

TVT NVMS 1000 Directory Traversal

TVT NVMS 1000 suffers from a directory traversal vulnerability.








0

Kentico CMS 12.0.14 Remote Command Execution

This Metasploit module exploits a vulnerability in the Kentico CMS platform versions 12.0.14 and earlier. Remote command execution is possible via unauthenticated XML requests to the Staging Service SyncServer.asmx interface ProcessSynchronizationTaskData method stagingTaskData parameter. XML input is passed to an insecure .NET deserialize call which allows for remote command execution.




0

UPLoad 7.0 Insecure Cookie Handling

UPLoad version 7.0 suffers from an insecure cookie handling vulnerability.




0

Ac4p.com Gallery 1.0 Cross Site Scripting / Shell Upload / Bypass / Disclosure

Ac4p.com Gallery version 1.0 suffers from cross site scripting, phpinfo disclosure, shell upload, and insecure cookie handling vulnerabilities.