Home Tools Page 5

Tools

The latest hacking and hacker tools. Open source offensive and defensive security tools. Browse interactive maps of offensive security tools used by malicious actors and cybercriminals. Check out some live threat maps and malware intelligence databases.

This will be a curated list of mostly open source hacking tools. These can range from Red Teaming offensive security tools to fuzzers and debuggers for malware analysis. We are always looking for new state of the art tools that can be used for security professionals. Please feel free to send us a tool via email or one of our social media accounts.

Magento / Adobe Commerce Remote Code Execution

0
Authored by Charles FOL, jheysel-r7, Heyder, Sergey Temnikov | Site metasploit.com This Metasploit module uses a combination of an arbitrary file read (CVE-2024-34102) and a buffer overflow in glibc (CVE-2024-2961)....

Rittal IoT Interface / CMC III Processing Unit Signature Verification / Session ID

0
Authored by Johannes Kruchem | Site sec-consult.com Rittal IoT Interface and CMC III Processing Unit versions prior to 6.21.00.2 suffer from improper signature verification and predictable session identifier vulnerabilities. advisories |...

Dolibarr 20.0.1 SQL Injection

0
Authored by nu11secur1ty Dolibarr version 20.0.1 suffers from a remote SQL injection vulnerability. Change Mirror Download ## Titles: dolibarr 20.0.1 Multiple security token SQLi## Author: nu11secur1ty## Date: 10/15/2024## Vendor: https://www.dolibarr.org/## Software: https://www.dolibarr.org/downloads.php##...

ABB Cylon Aspect 3.08.00 sslCertAjax.php Remote Command Execution

0
Authored by LiquidWorm | Site zeroscience.mk ABB Cylon Aspect version 3.08.00 suffers from an authenticated OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands...

ABB Cylon Aspect 3.08.01 mapConfigurationDownload.php Configuration Download

0
Authored by LiquidWorm | Site zeroscience.mk ABB Cylon Aspect version 3.08.01 suffers from an unauthenticated configuration download vulnerability. This can be exploited to download the SQLite DB that contains the...

BYOB Unauthenticated Remote Code Execution

0
Authored by Valentin Lobstein, chebuya | Site metasploit.com This Metasploit module exploits two vulnerabilities in the BYOB (Build Your Own Botnet) web GUI. It leverages an unauthenticated arbitrary file write...

ABB Cylon Aspect 3.08.00 yumSettings.php Command Injection

0
Authored by LiquidWorm | Site zeroscience.mk ABB Cylon Aspect version 3.08.00 suffers from an authenticated OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands...

Gibbon School Platform 26.0.00 Code Injection

0
Authored by indoushka Gibbon School Platform version 26.0.00 suffers from a PHP code injection vulnerability. Change Mirror Download =============================================================================================================================================| # Title : Gibbon School Platform 26.0.00 Code Injection...

GL.iNet 4.4.3 Code Injection

0
Authored by indoushka GL.iNet version 4.4.3 suffers from authentication bypass and code injection vulnerabilities. Change Mirror Download =============================================================================================================================================| # Title : GL.iNet network 4.4.3 Code Injection Vulnerability ...

Kafka UI 0.7.1 Code Injection

0
Authored by indoushka Kafka UI version 0.7.1 suffers from a remote code injection vulnerability. Change Mirror Download =============================================================================================================================================| # Title : Kafka UI 0.7.1 Code Injection Vulnerability ...