Home Tools Page 103

Tools

The latest hacking and hacker tools. Open source offensive and defensive security tools. Browse interactive maps of offensive security tools used by malicious actors and cybercriminals. Check out some live threat maps and malware intelligence databases.

This will be a curated list of mostly open source hacking tools. These can range from Red Teaming offensive security tools to fuzzers and debuggers for malware analysis. We are always looking for new state of the art tools that can be used for security professionals. Please feel free to send us a tool via email or one of our social media accounts.

Online Security Guards Hiring System 1.0 Cross Site Scripting

Authored by AFFAN AHMED Online Security Guards Hiring System version 1.0 suffers from a cross site scripting vulnerability. advisories | CVE-2023-0527 Change Mirror Download #Exploit Title: Online Security Guards Hiring System 1.0 –...

Pydio Cells 4.1.2 Server-Side Request Forgery

Site redteam-pentesting.de Pydio Cells versions 4.1.2 and below suffer from a server-side request forgery vulnerability. advisories | CVE-2023-32750 Change Mirror Download For longer running processes, Pydio Cells allows for the creation ofjobs, which...

Serenity / StartSharp Software File Upload / XSS / User Enumeration / Reusable Tokens

Authored by Fabian Densborn | Site sec-consult.com Serenity and StartSharp Software versions prior to 6.7.1 suffer from file upload to cross site scripting, user enumeration, and reusable password reset token...

Wekan 6.74 Cross Site Scripting

Authored by Heiner Liesegang | Site sec-consult.com Wekan versions 6.74 and below suffer from a persistent cross site scripting vulnerability. advisories | CVE-2023-28485 Change Mirror Download SEC Consult Vulnerability Lab Security Advisory <...

Vaskar Courier 3.2.0 Insecure Settings

Authored by indoushka Vaskar Courier version 3.2.0 appears to leave default credentials installed after installation. Change Mirror Download ================================================================================| # Title : Vaskar Courier Version 3.2.0 Insecure Settings...

Apple Zeed ALL YOUR STYLE CMS 2.0 SQL Injection

Authored by indoushka Apple Zeed ALL YOUR STYLE CMS version 2.0 suffers from a remote SQL injection vulnerability. Change Mirror Download ========================================================================================| # Title : Apple Zeed ALL...

Microsoft GamingServicesNet 12.77.3001.0 Unquoted Service Path

Authored by tmrswrr Microsoft GamingServicesNet version 12.77.3001.0 suffers from an unquoted service path vulnerability. Change Mirror Download # Exploit Title: Microsoft GamingServicesNet 12.77.3001.0 -'GamingServicesNet' Unquoted Service Path# Exploit Author: tmrswrr# Exploit Date:...

Lost And Found Information System 1.0 Broken Access Control / Privilege Escalation

Authored by Akash Pandey Lost and Found Information System version 1.0 allows a staff level user to adjust administrative controls. advisories | CVE-2023-3018 Change Mirror Download Vulnerability: Broken Access ControlAuthor: Akash PandeyCVE: CVE-2023-3018Source:https://www.sourcecodester.com/php/16525/lost-and-found-information-system-using-php-and-mysql-db-source-code-free-download.html*Steps...

WordPress ReviewX 1.6.13 Privilege Escalation

Authored by Lana Codes | Site wordfence.com WordPress ReviewX plugin versions 1.6.13 and below suffer from a privilege escalation vulnerability. advisories | CVE-2023-2833 Change Mirror Download Description: ReviewX <= 1.6.13 – Arbitrary Usermeta...

Pydio Cells 4.1.2 Privilege Escalation

Site redteam-pentesting.de Pydio Cells versions 4.1.2 and below suffer from a privilege escalation vulnerability. It allows users, by default, to create so-called external users in order to share files with...
Error decoding the Instagram API json