A collection of web pages vulnerable to SQL injection flaws and more: conf/ - operating system configuration files used by deployment.sh ...

A collection of web pages vulnerable to SQL injection flaws and more: conf/ - operating system configuration files used by deployment.sh ...
Splinter The Rat es una RAT (Remote Administration Tool). Este tipo de herramientas normalmente nos permite tomar el control de un bot (si...
This project is designed to run on Embedded ARM platforms (specifically v6 and RaspberryPi but I'm working on more). It provides users w...
Wapiti allows you to audit the security of your web applications. It performs "black-box" scans, i.e. it does not study the source...
ike-scan discovers IKE hosts and can also fingerprint them using the retransmission backoff pattern. ike-scan can perform the following fun...
Exploit Pack is an open source GPLv3 licensed bundle of scripts ( known as exploits ) with an easy to use GUI and a SID IDE. It’s built on J...
OWASP GoatDroid is a fully functional and self-contained training environment for educating developers and testers on Android security. Goat...
Para consola: vnstat : se ejecuta como servicio o mediante tareas programadas, su ventaja es que es útil para controlar en tiempo real el ...
EXPLOIT DETAILS OS: Orbis Console: PlayStation 4 Type: Privilege Escalation/Buffer Overflow (allows to run assigned code) Created on: 25 No...