Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

HowTo

JSRAT – Secret Command and Control Channel Backdoor to Control Victims Machine Using JavaScript

14 January 2018

JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication …

Tags Backdoors, Channels, Commands, Machines, Secrets

FIREWALK – Active Reconnaissance Network Security Tool

13 January 2018

Firewalk is an active reconnaissance network security tool that attempts to determine what layer 4 protocols a given IP forwarding device …

Tags Active, Network, Network Security, Tools

WINSpect-Powershell based Windows Security Auditing Toolbox

12 January 201812 January 2018

WINSpect is the PowerShell based windows auditing tool to enumerate and identify security weaknesses with windows platform and results …

Tags Auditing, Forensics, Windows Security

Android Application Penetration Testing – Part 11 – Android Checklist

11 January 201811 January 2018

Mobile platforms provide many different services, from authentication, to secure data storage, to secure network communications. Failing to …

Tags Android, Application, Checklist, Google, Mobile Development, Penetration Testing

Cracking WPA/WPA2 Passwords in Minutes with Fluxion

8 January 20188 January 2018

Fluxion repack of LINSET with minor bugs and with added features. It’s compatible with latest Kali Linux, Rolling …

Tags Passwords, Wifi

How to hack Wi-Fi for fun and imprisonment with crypto-mining inject

5 January 20185 January 2018

Thanks to the ridiculous valuation of Bitcoin and other cryptocurrencies, cryptomining code has become a common mechanism for converting …

Tags How, Wi-Fi

SSL/TLS Certificate Revocation is Broken Time for More Reliable Revocation Checking Mechanism

3 January 20183 January 2018

We are moving fast to the encrypted world and the usage of TLS certificates increased dramatically.Security researcher Scott Helme …

Tags Certificates, Cryptography, SSL, SSL/TLS, TLS

OWASP Dependency-Check Maven Plugin: A Must-Have

30 December 201730 December 2017

I have to admit, with a high degree of shame, that I didn’t know about the OWASP dependency check maven plugin. And seems to have been …

Tags OWASP, Plugins

Securing Your Inline SQL Statements From SQL Injection

29 December 201729 December 2017

At the beginning of any coder’s career, they build queries in code using strings. When you build strings in your code instead of on the …

Tags Databases, PHP, Programming, Programming Languages, Secure Coding, SQL, SQL Injection, Web Development

KickThemOut -Tools to Kick Devices out of Your Network and Enjoy all the Bandwidth

26 December 201726 December 2017

KickThemOut -Tools to kick devices out of your network and enjoy all the bandwidth for yourself.It permits you to choose particular or all …

Tags Bandwidth, Devices, Enjoy, Internet, Network

Sublist3r – Tool for Penetration testers to Enumerate Sub-domains

25 December 2017

Sublist3r a python based enumeration tool that enumerates subdomains of the domain using Google, Yahoo, Bing, Baidu, and Ask. It also …

Tags Domains, Tools

Here’s how to hack 40 websites in 7 minutes

25 December 201725 December 2017

Last summer I started learning about information security and hacking. Over the last year I’ve played in various wargames, capture the …

Tags Hacking, News

InSpy – Linkedin Information Gathering tool for Pentesters

23 December 201723 December 2017

The objective of this Information Gathering tool is to extract Linkedin users based on the organization, job description or email …

Tags Information, LinkedIn

DDOS a Website Anonymously by Using Kali Linux Tools

20 December 201719 December 2017

DDOS tools are capable of putting heavy loads on HTTP servers and bring them to their knees by exhausting its resources. What is DDOS …

Tags DDoS attacks, Goldeneye, Linux, OS, Tools, Websites
Older posts
Page1 Page2 … Page5 Next →
Cookie-Free

NVD

  • CVE-2023-25168 – Wings is Pterodactyl’s server control plane. This vulnerability can be used to delete file …9 February 2023
  • CVE-2022-40480 – Nordic Semiconductor, Microchip Technology NRF5340-DK DT100112 was discovered to contain a …8 February 2023
  • CVE-2023-0718 – The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a mis …8 February 2023
  • CVE-2023-24828 – Onedev is a self-hosted Git Server with CI/CD and Kanban. In versions prior to 7.9.12 the …8 February 2023
  • CVE-2022-45192 – An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio ran …8 February 2023
  • CVE-2022-45190 – An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio ran …8 February 2023

EXPLOITS

  • Feehi CMS 2.1.1 – Remote Code Execution (Authenticated)22 November 2022
  • SmartRG Router SR510n 2.6.13 – Remote Code Execution22 November 2022
  • CVAT 2.0 – Server Side Request Forgery18 November 2022
  • MSNSwitch Firmware MNT.2408 – Remote Code Execution18 November 2022
  • Open Web Analytics 1.7.3 – Remote Code Execution18 November 2022
  • IOTransfer V4 – Unquoted Service Path11 November 2022

SECURELIST

  • Web beacons on websites and in e-mail7 February 2023
  • Prilex modification now targeting contactless credit card transactions31 January 2023
  • Come to the dark side: hunting IT professionals on the dark web30 January 2023
  • What your SOC will be facing in 202323 January 2023
  • Roaming Mantis implements new DNS changer in its malicious mobile app in 202219 January 2023
  • What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks18 January 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »