Home Tools Page 353

Tools

The latest hacking and hacker tools. Open source offensive and defensive security tools. Browse interactive maps of offensive security tools used by malicious actors and cybercriminals. Check out some live threat maps and malware intelligence databases.

This will be a curated list of mostly open source hacking tools. These can range from Red Teaming offensive security tools to fuzzers and debuggers for malware analysis. We are always looking for new state of the art tools that can be used for security professionals. Please feel free to send us a tool via email or one of our social media accounts.

Microsoft Internet Explorer Active-X Control Security Bypass

0
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org Microsoft Internet Explorer suffers from an active-x related bypass vulnerability. Microsoft will not address the issue as it is end of life. Change Mirror Download ...

Croogo 3.0.2 Remote Code Execution

0
Authored by Deha Berkin Bir Croogo version 3.0.2 suffers from an authenticated remote code execution vulnerability. Change Mirror Download # Exploit Title: Croogo 3.0.2 - Remote Code Execution (Authenticated)# Date: 05/12/2021# Exploit...

Auerswald COMfortel 1400/2600/3600 IP 2.8F Authentication Bypass

0
Site redteam-pentesting.de RedTeam Pentesting discovered a vulnerability in the web-based configuration management interface of the Auerswald COMfortel 1400 and 2600 IP desktop phones. The vulnerability allows accessing configuration data and...

Auerswald COMpact 8.0B Privilege Escalation

0
Site redteam-pentesting.de RedTeam Pentesting discovered a vulnerability in the web-based management interface of the Auerswald COMpact 5500R PBX which allows low-privileged users to access passwords of administrative user accounts. Affected...

runc / libcontainer Bind Mount Sources Insecure Handling

0
Authored by Google Security Research, Felix Wilhelm The recent commit #9c4440 introduces two vulnerabilities to libcontainer that can be exploited by an attacker with partial control over the bind mount...

Auerswald COMpact 8.0B Arbitrary File Disclosure

0
Site redteam-pentesting.de RedTeam Pentesting discovered a vulnerability in the web-based management interface of the Auerswald COMpact 5500R PBX which allows users with the "sub-admin" privilege to access any files on...

Backdoor.Win32.Vernet.axt Insecure Permissions

0
Authored by malvuln | Site malvuln.com Backdoor.Win32.Vernet.axt malware suffers from an insecure permissions vulnerability. Change Mirror Download Discovery / credits: Malvuln - malvuln.com (c) 2021Original source: https://malvuln.com/advisory/f529d60abbdafccce3dc5e5ffd6cdfa6.txtContact: [email protected]: twitter.com/malvulnThreat: Backdoor.Win32.Vernet.axtVulnerability: Insecure PermissionsDescription:...

Backdoor.Win32.Bionet.10 Authentication Bypass / Code Execution

0
Authored by malvuln | Site malvuln.com Backdoor.Win32.Bionet.10 malware suffers from bypass and code execution vulnerabilities. Change Mirror Download Discovery / credits: Malvuln - malvuln.com (c) 2021Original source: https://malvuln.com/advisory/99b4428521fa9d9da18e0ccd79e5b985.txtContact: [email protected]: twitter.com/malvulnThreat: Backdoor.Win32.Bionet.10Vulnerability: Authentication...

Online Magazine Management System 1.0 SQL Injection

0
Authored by Mohamed Habib Smidi Online Magazine Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass. Change Mirror Download # Exploit Title: Online Magazine Management...

WordPress DZS Zoomsounds 6.45 Arbitrary File Read

0
Authored by Uriel Yochpaz WordPress DZS Zoomsounds plugin version 6.45 suffers from an unauthenticated arbitrary file read vulnerability. advisories | CVE-2021-39316 Change Mirror Download # Exploit Title: WordPress Plugin DZS Zoomsounds 6.45 -...