Home Tools Page 456

Tools

The latest hacking and hacker tools. Open source offensive and defensive security tools. Browse interactive maps of offensive security tools used by malicious actors and cybercriminals. Check out some live threat maps and malware intelligence databases.

This will be a curated list of mostly open source hacking tools. These can range from Red Teaming offensive security tools to fuzzers and debuggers for malware analysis. We are always looking for new state of the art tools that can be used for security professionals. Please feel free to send us a tool via email or one of our social media accounts.

Visual Studio Code Execution

0
Authored by h00die | Site metasploit.com This Metasploit module creates a vsix file which can be installed in Visual Studio Code as an extension. At activation/install, the extension will execute...

Elber Signum DVB-S/S2 IRD For Radio Networks 1.999 Insecure Direct Object Reference

0
Authored by LiquidWorm | Site zeroscience.mk Elber Signum DVB-S/S2 IRD for Radio Networks version 1.999 suffers from an unauthenticated device configuration and client-side hidden functionality disclosure vulnerability. Change Mirror Download Elber Signum...

Ray OS 2.6.3 Command Injection

0
Authored by Fire_Wolf The Ray Project dashboard contains a CPU profiling page, and the format parameter is not validated before being inserted into a system command executed in a shell,...

Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 Authentication Bypass

0
Authored by LiquidWorm | Site zeroscience.mk Elber Cleber/3 Broadcast Multi-Purpose Platform version 1.0.0 suffers from an authentication bypass vulnerability through a direct and unauthorized access to the password management functionality....

Nginx 1.25.5 Host Header Validation

0
Authored by dhteam Nginx versions 1.25.5 and below appear to have a host header filtering validation bug that could possibly be used for malice. Change Mirror Download # Nginx =< 1.25.5 $host...

Apache Solr Backup/Restore API Remote Code Execution

Authored by jheysel-r7, l3yx | Site metasploit.com Apache Solr versions 6.0.0 through 8.11.2 and versions 9.0.0 up to 9.4.1 are affected by an unrestricted file upload vulnerability which can result...

Elber Wayber Analog/Digital Audio STL 4.00 Insecure Direct Object Reference

0
Authored by LiquidWorm | Site zeroscience.mk Elber Wayber Analog/Digital Audio STL version 4.00 suffers from an unauthenticated device configuration and client-side hidden functionality disclosure vulnerability. Change Mirror Download Elber Wayber Analog/Digital Audio...

Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link Authentication Bypass

0
Authored by LiquidWorm | Site zeroscience.mk Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link suffers from an authentication bypass vulnerability through a direct and unauthorized access to the password management functionality....

Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 Insecure Direct Object Reference

0
Authored by LiquidWorm | Site zeroscience.mk Elber Cleber/3 Broadcast Multi-Purpose Platform version 1.0.0 suffers from an unauthenticated device configuration and client-side hidden functionality disclosure vulnerability. Change Mirror Download Elber Cleber/3 Broadcast Multi-Purpose...

Elber Signum DVB-S/S2 IRD For Radio Networks 1.999 Authentication Bypass

0
Authored by LiquidWorm | Site zeroscience.mk Elber Signum DVB-S/S2 IRD for Radio Networks version 1.999 suffers from an authentication bypass vulnerability through a direct and unauthorized access to the password...
Error decoding the Instagram API json