Jump to content

Kev

Active Members
  • Content Count

    430
  • Joined

  • Days Won

    19

Everything posted by Kev

  1. Color attribute https://playfairdata.com/3-ways-make-handsome-highlight-tables-tableau/
  2. This exploit leverages a file write vulnerability in the print spooler service which will restart if stopped. Because the service cannot be stopped long enough to remove the dll, there is no way to remove the dll once it is loaded by the service. Essentially, on default settings, this module adds a permanent elevated backdoor. ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core/post/windows/powershell' class MetasploitModule < Msf::Exploit::Local Rank = ExcellentRanking
  3. Double Patterns in cazul in care nu este gainar si nu poate face flash
  4. Whitepaper called UFW - A Beginners Guide to Linux Firewall. The white paper is intended to provide information about a Linux firewall using a simple tool called UFW. It provides complete information on the tool and various ways through which users can create their own firewall rules to protects their assets. Download wget https://packetstormsecurity.com/files/download/160970/ufw-beginnersguide.pdf Source
  5. Kev

    COVID-19

    De ce vaccin si nu antidot?
  6. Cisco RV110W version 1.2.1.7 vpn_account denial of service proof of concept exploit. # Exploit Title: Cisco RV110W 1.2.1.7 - 'vpn_account' Denial of Service (PoC) # Exploit Author: Shizhi He # Vendor Homepage: https://www.cisco.com/ # Software Link: https://software.cisco.com/download/home/283879340/type/282487380/release/1.2.1.7 # Version: V1.2.1.7 # Tested on: RV110W V1.2.1.7 # CVE : CVE-2021-1167 # References: # https://github.com/pwnninja/cisco/blob/main/vpn_client_stackoverflow.md # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUn
  7. The ContentFilterExclusionList has been removed in macOS 11.2 beta 2. Image: Markus Spiske Apple has removed a controversial feature from the macOS operating system that allowed 53 of Apple's own apps to bypass third-party firewalls, security tools, and VPN apps installed by users for their protection. Known as the ContentFilterExclusionList, the list was included in macOS 11, also known as Big Sur. The exclusion list included some of Apple's biggest apps, like the App Store, Maps, and iCloud, and was physically located on disk at: /
  8. poate te ajuta si ceva de genul https://www.emag.ro/stabilizator-automat-de-tensiune-cu-servo-motor-1000va-well-avr-srv-constant1000-wl/pd/D5MMZWBBM/
  9. Kev

    infrabot

    infrabot.io - easily control your infrastructure with Telegram bot infrabot is a system service which allows you to create your own commandlets to control your infrastructure using Telegram Bot Documentation Get started with infrabot, learn how to configure infrabot for your organization config.json and with Infrabot UI Configurator. Getting Started Configure Bot Config file Overview GUI Tool Infrabot Service Demo Setup Prerequisites Install .NET Core 5.0.0
  10. GKE Auditor A tool to detect a set of common Google Kubernetes Engine misconfigurations. Aimed to help security and development teams streamline configuration parts of their processes, and save time looking for generic bugs and vulnerabilities. The tool consists of individual modules called Detectors, each scanning for a specific vulnerability. This is not an officially supported Google product. Dependencies JDK 11 or later Maven Google Cloud SDK kubectl To install the dependencies on Debian, run: instal
  11. Se face spread de mult prin stick. Nu am citit articolul complet.
  12. ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HTTP::Wordpress include Msf::Exploit::FileDropper def initialize(info = {}) super(update_info(info, 'Name' => 'WordPress wpDiscuz Unauthen File Upload Vulnerability', 'Description' => %q{ This module exploits an arbitrary file upload in the WordPress wpDiscuz plugin
  13. An audit is underway into the Judiciary's Case Management/Electronic Case Files system. The United States Judiciary has announced an audit into its systems, following concerns its case file system has been compromised. In making the announcement, the Judiciary said the Administrative Office of the US Courts was working with the Department of Homeland Security on a security audit relating to vulnerabilities in the Judiciary's Case Management/Electronic Case Files system (CM/ECF) that greatly risk compromising highly sensitive non-public documents, particularly sea
  14. Node.js: use-after-free in TLSWrap Node v14.11.0 (Current) is vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure: // stream_base-inl.h WriteWrap* req_wrap = CreateWriteWrap(req_wrap_obj); err = DoWrite(req_wrap, bufs, count, send_handle); bool async = err == 0; if (!async) { req_wrap
  15. The “People Nearby” feature in the secure messaging app can be abused to unmask a user’s precise location, a researcher said. A feature that allows Telegram users to see who’s nearby can be misused to pinpoint your exact distance to other users – by spoofing one’s latitude and longitude. According to bug-hunter Ahmed Hassan, the “People Nearby” feature could allow an attacker to triangulate the location of unsuspecting Telegram users. The feature is disabled by default, but as Hassan pointed out, “Users who enable this feature are not aware they are basically publishing
  16. https://github.com/samwize/python-email-crawler 10 ani. La multi ani!
  17. ce poze sa iti mai dau? http://letmegooglethat.com/?q=2.0+2.5"+Hard+drive+enclosure+Gembird http://letmegooglethat.com/?q=WD1600AAJS-00L7A0%2C+DCM+HANNHTJCH%2C+Western+Digital+160GB+SATA+3.5+harde+schijf
  18. Amazon's Ring doorbells have been compromised in some swatting attacks Hackers have livestreamed police raids on innocent households after hijacking their victims' smart home devices and making a hoax call to the authorities, the FBI has warned. It said offenders had even spoken to responding officers via the hacked kit. It marks the latest escalation of a crime known as "swatting", in which offenders fool armed police or other emergency responders to go to a target's residence. The FBI said there were "deadly" risks. A fake call abou
  19. L-am facut in vară cu Dan Negru
  20. Salut, recent am instalat un plug-in pe o platforma Wordpress, primesc urmatoarea eroare: Warning: Use of undefined constant wp_head - assumed 'wp_head' (this will throw an Error in a future version of PHP) in /srv/disk15/3697334/www/.../.../wp-content/.../happynewyear.php on line 65 full code: <?php /* Plugin Name: Happy New Year Plugin URI: https://www.melihguney.com/wordpress-happy-new-year-plugin.html Description: This plugin will create a good skin in your wordpress blog. Version: 5.0 Author: Melih Guney Author URI: https://www.melihguney.com/ License:
  21. Kev

    Auto poster forum

    ZennoPoster Mental Power /sau http://www.humanemulator.info/ off: benny mai traiesti?
  22. Nu stiu ce tot ai cu mine, dar in felul acesta presupun ca dupa razbvoi se mananc gogosile. Esti anti-social nene, si crede-ma ca am mai multi prieteni.... (te-am scos de la ignore) in fine ON-AIR: AMD sunt printre cele mai bune, jucam Call Of Duty pe un 3.5 Pentium III
×
×
  • Create New...