Haklistgen – Turns Any Junk Text Into A Usable Wordlist For Brute-Forcing
Turns any junk text into a usable wordlist for brute-forcing.Installationgo install github.com/hakluke/haklistgen@latest Usage ExamplesScrape all words out of an HTTP...
Turns any junk text into a usable wordlist for brute-forcing.Installationgo install github.com/hakluke/haklistgen@latest Usage ExamplesScrape all words out of an HTTP...
Reconky is a script written in bash to automate the task of recon and information gathering.This Bash Script allows you...
Researcher release PoC exploit code for three iOS zero-day flaws after Apple delayed addressing them and did not credit him....
Cisco fixed three critical flaws impacting IOS XE operating system powering some of its devices, such as routers and wireless...
A user on a popular hacker forum is selling a database that purportedly contains 3.8 billion Clubhouse and Facebook user...
Researchers spotted a new cyberespionage group, dubbed FamousSparrow, that used ProxyLogon exploits to target hotels worldwide. Researchers from ESET discovered a...
Apple has addressed three zero-day vulnerabilities exploited by threat actors in attacks in the wild to take over iPhones and...
A flaw in the Microsoft Exchange Autodiscover feature can be exploited to harvest Windows domain and app credentials. Security researchers...
Summary: A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but...
Summary: A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but...
Summary: Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to impact the application's availability via...
Summary: tftpd_file.c in atftp through 0.7.4 has a buffer overflow because buffer-size handling does not properly consider the combination of...
Summary: A directory traversal vulnerability in Trend Micro Apex One, OfficeScan (versions XG and 11.0), and Worry-Free Business Security (versions...
Summary: On BIG-IP version 16.0.x before 16.0.1.2, 15.1.x before 15.1.3.1, 14.1.x before 14.1.4.3, 13.1.x before 13.1.4.1, and all versions of...
Summary: CVE-2021-30869 is a type confusion vulnerability impacting Apple iOS versions 12.5.4 and earlier, and macOS Catalina security update 2021-005...
Researchers have been able to get hold of 372,072 Windows domain credentials, including 96,671 unique credentials, in slightly over 4...
The term “cache” refers to a storage container. If you’re familiar with the outdoor recreational activity geocaching, you may be...
The Spanish National Police (Policía Nacional) has successfully dismantled an organized crime ring of hundreds of members in a sting...
The email addresses of dozens more Afghans who may be eligible for relocation in the United Kingdom have been exposed...
The British company Cyjax discovered a large-scale attack against employees of state agencies in Russia and neighboring countries. Attackers create...
Chinese cybersecurity researcher has discovered a new strain of malware that spreads via "poisoned" search-engine results. The malware dubbed ‘OSX.ZuRu’...
The Russian Embassy in Washington demanded an explanation from the United States about the cyber attacks that were committed on...
On September 21, Microsoft's security team announced that it has discovered a huge operation that delivers phishing services to cybercrime...
What do cyberthreats, Kubernetes and donuts have in common – except that all three end in “ts”, that is? All...