what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

WordPress Brute Forcer 2.0
Posted Apr 14, 2015
Authored by Claudio Viviani

This is a python script that performs brute forcing against WordPress installs using a wordlist.

Changes: xml-rpc brute force functionality added.
tags | tool, cracker, python
SHA-256 | 2d97133aba0d51470e503dd301f411312b3310db7a1d1bc94a2801174b8229ca

Related Files

WAGO 750-8212 PFC200 G2 2ETH RS Privilege Escalation
Posted Feb 28, 2022
Authored by Momen Eldawakhly

WAGO 750-8212 PFC200 G2 2ETH RS suffers from a privilege escalation vulnerability.

tags | exploit
advisories | CVE-2021-46388
SHA-256 | be01109a1136b5015b1371e991c44772c948affadfbeb6d826fffcd6d452fad3
Web Application Firewall Bypass Via Bluecoat Device
Posted Feb 17, 2020
Authored by redtimmysec

Whitepaper called Web Application Firewall Bypass via Bluecoat Device.

tags | paper, web
SHA-256 | a7866388d1501e972c85add7da1749c0587312eed8461805b75236def544a63f
Wacom WTabletService 6.6.7-3 Unquoted Service Path
Posted Nov 6, 2019
Authored by Marcos Antonio Leon

Wacom WTabletService version 6.6.7-3 suffers from a WTabletServicePro unquoted service path vulnerability.

tags | exploit
SHA-256 | 23e461d5a58cd52d170f6b39cfe4422a0f612dc15029ca40dc99b38b36f6c94a
WAGO 750-881 01.09.18 Cross Site Scripting
Posted Oct 11, 2018
Authored by SecuNinja

WAGO 750-881 01.09.18 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 02af24fa589b9d35aca68da06c679dc17d0a4573eecd10b9805e1ab78892d885
Weeny Audio Cutter Software 1.5 Content Injection
Posted Feb 24, 2018
Authored by Ajay Gowtham

Weeny Audio Cutter Software version 1.5 suffers from a content injection vulnerability.

tags | advisory
SHA-256 | 53f7cd379147df72f2c98fd29688727773be46310992b4ed3b436766e4119707
Weeny Audio Cutter Software 1.5 Code Injection
Posted Feb 24, 2018
Authored by Ajay Gowtham

Weeny Audio Cutter Software version 1.5 suffers from a code injection vulnerability.

tags | advisory
SHA-256 | fc7fa803ecfb1a49f71355cb7c47a7df5cb9cfbb9b980c2cdd81afea88c2ee37
CRLF Injector
Posted Jul 10, 2017
Authored by Rudra Sarkar

This is a python script for testing CRLF injecting issues.

tags | tool, scanner, python
systems | unix
SHA-256 | 269d0bfcbe035b834d1b3fec15668b84eda71e5789d1c7ce78a66a85d86caf41
Wacom Consumer Service Privilege Escalation
Posted Oct 9, 2016
Authored by Ross Marks

Wacom Consumer Service suffers from an unquoted service path privilege escalation vulnerability.

tags | exploit
SHA-256 | defcd1ded33b5f60c2962798b7f39c71618d759fdfdc38593a6aa07cff627287
w2wiki Cross Site Scripting
Posted Jun 14, 2016
Authored by HaHwul

w2wiki suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 86c82dd7197e6e15f5700fec6e362c652ccf54539af69bad7c9cf2f79426cda7
WAGO IO PLC 758-870 / 750-849 Credential Management / Privilege Separation
Posted Mar 4, 2016
Authored by Karn Ganeshen

WAGO IO PLC versions 758-870 and 750-849 suffer from weak credential management, lack of privilege separation, insecure ftp configuration, and weak filesystem permissions.

tags | exploit, info disclosure
advisories | CVE-2015-6472, CVE-2015-6473
SHA-256 | 265cf836fd5bdb1c9a761033ead4a4c5910c3662908c88aa5076eb097dc54122
PKZip Fuzzing Tool
Posted Nov 14, 2015
Authored by Andrea Sindoni

This is a python script that can be used to fuzz PKZip files.

tags | python, fuzzer
SHA-256 | a2bdb33bcb41c294dc85b483289846e5c47e3a42a7557fc3c7123a4a4f56c006
w3tw0rk / Pitbul IRC Bot Remote Code Execution
Posted Sep 23, 2015
Authored by Jay Turla | Site metasploit.com

This Metasploit module allows remote command execution on the w3tw0rk / Pitbul IRC Bot.

tags | exploit, remote
SHA-256 | a66d2214cda0b74148ccafd0385d0e911312b00a6a8e83f79d778d3df8c97ac7
W3 Total Cache 0.9.4 Cross Site Request Forgery
Posted Dec 12, 2014
Authored by Mazin Ahmed

W3 Total Cache version 0.9.4 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 6b5a5b055312a8b9ac869d31da7a50ad0789008ca253cbb4e6f4c154da8a7063
WordPress Brute Forcer
Posted Oct 16, 2014
Authored by Claudio Viviani

This is a python script that performs brute forcing against WordPress installs using a wordlist.

tags | tool, cracker, python
SHA-256 | 34a1d35b75a5ee427f856e9296a435d61d1a6ff8f950bb5dafd9d5b3cbfb298a
WAF-FLE ModSecurity Console 0.6.4
Posted Jul 27, 2014
Authored by Klaubert Herr | Site waf-fle.org

WAF-FLE is a console for ModSecurity. It allows modsec administrators to view and search events logged by mlogc or mlog2waffle. The dashboard shows a graphical view of events, and when combined with the powerful drill-down filter allows quick searching for relevant events. Events can be viewed in detail, whether sent by one or many sensors.

Changes: This release fixes many bugs reports by users, for waf-fle e mlog2waffle.
tags | tool
systems | unix
SHA-256 | b3f7747610c52ea609642dfb637bab2b5905b8c8511ebef2f9a36e5615ee1f1c
ZTE, TP-Link, ZynOS, Huawei rom-0 Configuration Decompressor
Posted Jun 11, 2014
Authored by Osanda Malith

This is a python script that decompresses the rom-0 configuration for ZTE, TP-Link, ZynOS, and Huawei.

tags | tool, python
systems | unix
SHA-256 | edbc541d4fd6a39f2011f02eae1cc09eeb4360235f4ccb2da21bb4abd9720abc
WordPress TimThumb Finder 1.0 Beta
Posted May 25, 2014
Authored by Rafay Baloch

This is a python script that scans a webserver for timthumb.php.

tags | tool, scanner, php, python
systems | unix
SHA-256 | c5de670c6b138663f9aa17471dccac1ef63011cac2b9b79114f492b672ae8720
WAF Bypass Methods
Posted Apr 29, 2014
Authored by Deniz Cevik

This whitepaper discusses various web application firewall bypass methodologies. Written in Turkish.

tags | paper, web, bypass
SHA-256 | d04d9dc9ed267c9142d78a1a35f38d8397df4345faa4d26a2221dd442c5ad695
w3af Web Application Attack and Audit Framework 1.6
Posted Mar 31, 2014
Authored by Andres Riancho | Site w3af.sourceforge.net

w3af, is a Web Application Attack and Audit Framework. The w3af core and it's plugins are fully written in python. The project has more than 130 plugins, which check for SQL injection, cross site scripting (xss), local and remote file inclusion and much more.

Changes: Improved performance for scans. Better documentation. Improved quality.
tags | tool, remote, web, local, xss, sql injection, python, file inclusion
SHA-256 | 006731b74f58960a1f3580194979bb988fa52df2bc92f6f36b1ce36ffcdd6003
WAF-FLE ModSecurity Console 0.6.3
Posted Feb 6, 2014
Authored by Klaubert Herr | Site waf-fle.org

WAF-FLE is a console for ModSecurity. It allows modsec administrators to view and search events logged by mlogc or mlog2waffle. The dashboard shows a graphical view of events, and when combined with the powerful drill-down filter allows quick searching for relevant events. Events can be viewed in detail, whether sent by one or many sensors.

Changes: This release fixes many bugs reports by users, for waf-fle e mlog2waffle.
tags | tool
systems | unix
SHA-256 | 53f72777b31a175c81581ddf757c270a2c63f76854484c5076d1ade7558718f0
Bypassing Modern Web Application Firewalls
Posted Dec 14, 2013
Authored by Rafay Baloch

This whitepaper is called Modern Web Application Firewalls Fingerprinting and Bypassing XSS Filters.

tags | paper, web
SHA-256 | 65acaee3edb30787203ec67ebd4b8e85f2ced5170a1f786efb797a9df09856b3
Eaton Network Shutdown Module 3.21 PHP Code Injection
Posted Dec 7, 2013
Authored by Filip Waeytens

Eaton Network Shutdown module versions 3.21 and below suffer from a remote PHP code injection vulnerability. This is a python exploit for a previously disclosed finding.

tags | exploit, remote, php, python
advisories | OSVDB-83199
SHA-256 | b6f02d2307906d45fffd57eaf354dfdd170be53826413e1efdb4d4d58e269c8d
CloudFlare Versus Incapsula: Round 2
Posted Oct 30, 2013
Authored by LiquidWorm, Humberto Cabrera, Stefan Petrushevski | Site zeroscience.mk

This document contains the results of a second comparative penetration test conducted by a team of security specialists at Zero Science Lab against two cloud-based Web Application Firewall (WAF) solutions: Incapsula and Cloudflare. This test was designed to bypass security controls in place, in any possible way, circumventing whatever filters they have. Given the rise in application-level attacks, the goal of the test was to provide IT managers of online businesses with a comparison of these WAFs against real-world threats in simulated real-world conditions.

tags | paper, web
SHA-256 | 049e90fe97f45591ee478a6bbbd1000e75975f5dbc47b2e1e89cfc59d6426fdc
Web 2.0 Security And Privacy 2014 Call For Papers
Posted Oct 30, 2013
Site w2spconf.com

W2SP brings together researchers, practitioners, web programmers, policy makers, and others interested in the latest understanding and advances in the security and privacy of the web, browsers, cloud, mobile and their eco-system. The workshop will take place May 18th, 2014.

tags | paper, web, conference
SHA-256 | 70acc7274bf12747f9c47988852750b4fc23e87d7650e7750274540b904b94e4
Bing LFI / RFI Scanner
Posted May 12, 2013
Authored by miyachung

This is a python script for searching Bing for sites that may have local and remote file inclusion vulnerabilities.

tags | tool, remote, local, scanner, vulnerability, python, file inclusion
systems | unix
SHA-256 | b57e9c6371c8ee26ae27e8621e28c0050585e84a7b11dc144d70b52d742a8976
Page 1 of 4
Back1234Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    13 Files
  • 10
    Aug 10th
    34 Files
  • 11
    Aug 11th
    16 Files
  • 12
    Aug 12th
    5 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    25 Files
  • 16
    Aug 16th
    3 Files
  • 17
    Aug 17th
    6 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close