Written in Go, Wholeaked is a tool for file-sharing that enables you to track down the individual responsible in the event of a leak. How? Wholeaked is a tool that receives a file and a list of r...
Several versions of Rock RMS are impacted by vulnerabilities that include arbitrary file uploads, account takeovers, and disclosure of personal information. MD5 | 496349ae2fd93f703a324dcbbd37867...
If you’re keen on reverse engineering and/or analyzing malware on x86 and x64 Windows systems, this assortment of tools might be of interest to you. Upon installation of this toolkit, a folder co...
There are several persistent cross-site scripting vulnerabilities present in version 1.0 of the Product Show Room Site. SHA-256 | a796961a488458cb4bb41f2e00c8a65730ac1bded2e03daff8ea9786a74d591e...
There are various cross-site scripting vulnerabilities present in version 1.0 of the Online Learning Management System. MD5 | 68e69d9e1042cc074baef57a56b42176 # Exploit Title: Online Lear...
Project iKy is a software utility that gathers data from an email and presents the findings in an attractive visual interface. Installation Installation and startup of Redis is necessary. wget...
Broadcom, formerly known as CA Technologies, has issued an alert to customers regarding a potential risk associated with CA Service Catalog. A default configuration setting can lead to a vulnerab...
An arbitrary file upload vulnerability that can be exploited without authentication affects versions 4.5.1 and earlier of the WordPress Fancy Product Designer for WooCommerce plugin. MD5 | a23fb...
H4rpy is an automated WPA/WPA2 PSK attack tool, wrapper of aircrack-ng framework. H4rpy is a tool that facilitates automated cracking of WPA/WPA2 PSK networks through a user-friendly interface. ...
This room aims towards helping everyone learn about the basics of Malware Reverse Engineering. These challenges are aimed towards learning about the “Static Analysis” technique used to analyze the...
A new version of content is available.