Home Tools Page 308

Tools

The latest hacking and hacker tools. Open source offensive and defensive security tools. Browse interactive maps of offensive security tools used by malicious actors and cybercriminals. Check out some live threat maps and malware intelligence databases.

This will be a curated list of mostly open source hacking tools. These can range from Red Teaming offensive security tools to fuzzers and debuggers for malware analysis. We are always looking for new state of the art tools that can be used for security professionals. Please feel free to send us a tool via email or one of our social media accounts.

Moodle Admin Shell Upload

0
Authored by h00die, Ozkan Mustafa Akkus | Site metasploit.com This Metasploit module will generate a plugin which can receive a malicious payload request and upload it to a server running...

WordPress Pie Register 3.7.1.4 Privilege Escalation

0
Authored by Lotfi13-DZ WordPress Pie Register plugin versions 3.7.1.4 and below suffer from a privilege escalation vulnerability. Change Mirror Download # Exploit Title: WordPress Plugin Pie Register 3.7.1.4 - Admin Privilege Escalation...

Simple Online College Entrance Exam System 1.0 Account Takeover

0
Authored by Amine Simple Online College Entrance Exam System version 1.0 suffers from an account takeover vulnerability. Change Mirror Download # Exploit Title: Simple Online College Entrance Exam System 1.0 - Account...

Online Enrollment Management System 1.0 SQL Injection

0
Authored by Amine Online Enrollment Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass. Change Mirror Download # Exploit Title: Online Enrollment Management System 1.0...

Online Traffic Offense Management System 1.0 Privilege Escalation

0
Authored by snup Online Traffic Offense Management System version 1.0 suffers from a privilege escalation vulnerability. Change Mirror Download # Exploit Title: Online Traffic Offense Management System 1.0 - Privilage escalation (Unauthenticated)#...

Maian-Cart 3.8 Remote Code Execution

0
Authored by DreyAnd, purpl3 Maian-Cart version 3.8 unauthenticated remote code execution exploit. advisories | CVE-2021-32172 Change Mirror Download # Exploit title: Maian-Cart 3.8 - Remote Code Execution (RCE) (Unauthenticated)# Date: 27.11.2020 19:35# Tested...

Dahua Authentication Bypass

0
Authored by bashis Various Dahua products suffers from multiple authentication bypass vulnerabilities. advisories | CVE-2021-33044, CVE-2021-33045 Change Mirror Download Subject: : Dahua Authentication bypass (CVE-2021-33044, CVE-2021-33045)Attack vector: RemoteAuthentication: Anonymous (no credentials needed)Researcher: bashis...

High Infinity Technology HiKam S6 1.3.26 Spoofing / Broken Authentication

0
Authored by Gerhard Hechenberger, S. Robertz | Site sec-consult.com High Infinity Technology HiKam S6 versions 1.3.26 and below suffer from broken authentication, enumeration, message protocol downgrade, insufficient use of cryptography,...

Google SLO-Generator 2.0.0 Code Execution

0
Authored by Kiran Ghimire Google SLO-Generator versions 2.0.0 and below suffer from a code execution vulnerability. advisories | CVE-2021-22557 Change Mirror Download # Exploit Title: Google SLO-Generator 2.0.0 - Code Execution# Date: 2021-09-28#...

Online DJ Booking Management System 1.0 Cross Site Scripting

0
Authored by Yash Mahajan Online DJ Booking Management System version 1.0 suffers from a cross site scripting vulnerability. Change Mirror Download # Exploit Title: Online DJ Booking Management System 1.0 - 'Multiple'...
Error decoding the Instagram API json