Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   Exploits   /   Page 62
VDiscover - A tool to predict vulnerability discovery of binary only programs.

VDiscover – A tool to predict vulnerability discovery of binary only programs.

May 26, 2015
Terry
Exploits, Fuzzer/Fuzzing, Penetration Test

VDiscover is a tool designed to train a vulnerability detection predictor. Given a vulnerability discovery procedure and a large enough number of training testcases, it…

Read Article →
Explanation Smashing the Stack - How to Hacking into a Vulnerable Server.

Explanation Smashing the Stack – How to Hacking into a Vulnerable Server.

May 25, 2015
ahm3ds
Exploits

In this project, we took advantage of a buffer overflow attack in order to gain access to a vulnerable server. This attack, in brief, involves…

Read Article →
Linux backdoor implementation written in Python.

Linux backdoor implementation written in Python.

May 25, 2015
Mr.Trojans
Encryption, Exploits

A backdoor is perceived as a negative vulnerability because it allows an attacker to obtain access to a victim’s machine without proper credentials. However, a…

Read Article →
scepwn-ng : A winexe/psexec wrapper to use sce and a msfvenom generated payload on a target system.

scepwn-ng : A winexe/psexec wrapper to use sce and a msfvenom generated payload on a target system.

May 25, 2015
w0rm32
Code Scripting, Exploits

scepwn-ng is a wrapper script for launching winexe/psexec at a target, which then runs shellcode exec from a samba share with a msf generated reverse…

Read Article →
Lightaidra - IRC-based mass router scanner & exploiter.

Lightaidra – IRC-based mass router scanner & exploiter.

May 24, 2015
pak-tani
Exploits, Scanner

Lightidra is a mass-tool commanded by irc that allows scanning and exploiting routers for make BOTNET (in rx-bot style), in addition to this, with aidra…

Read Article →
kbdlogd - A simple keylogger that uses /dev/input/* device as source.

kbdlogd – A simple keylogger that uses /dev/input/* device as source.

May 22, 2015
0x0ptimus
Exploits

kbdlogd is a case study purpose daemon to capture stream data from the keyboard, that uses a /dev/input/* kbd device. It needs the root privileges…

Read Article →
Updates MITMf v-0.9.7 : Framework for Man-In-The-Middle attacks.

Updates MITMf v-0.9.7 : Framework for Man-In-The-Middle attacks.

May 22, 2015
0x0mar
Encryption, Exploits, Framework, Networking, Penetration Test

Changelog MITMf v0.9.7 : – Config file now updated on the fly – Addition of the ScreenShotter and Ferret-NG plugins – Responder code re-written – Addition…

Read Article →
pambd - small and fast solution to create a undetectable backdoor through the PAM module.

pambd – small and fast solution to create a undetectable backdoor through the PAM module.

May 21, 2015
Terry
Exploits

This trick shows you how to create a PAM module backdoor that allows to execute an user login with your own custom password. If you…

Read Article →
← Previous 1 … 61 62 63 … 91 Next →

Copyright © 2019

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools