MikroTik RouterOS CVE Vulnerabilities
-
Updated
Oct 5, 2024 - Python
MikroTik RouterOS CVE Vulnerabilities
Threat Management is recognized by enterprises, governments and law enforcement agencies worldwide as the market leader in threat intelligence and expertise gained on the frontlines of cyber security. To make every organization confidently ready for cyber threats, Threat Management scales its intelligence and expertise through the Threat Managem…
WebVulnScan is a Python-based tool designed for conducting vulnerability assessments on web applications using the powerful capabilities of Nmap. It provides two primary scanning options to cater to different needs: stealthy and aggressive scans.
Change applications UI labels by hook SetDlgItemTextW(...) in user32.dll.
This website demonstrates SQL injection vulnerabilities by simulating weak database security and minimal input validation. It shows how attackers can exploit these flaws, underscoring the need for secure coding practices.
This repository includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
DevTools is a network and security testing tool. Key features: subdomain discovery, port scanning, and vulnerability testing. New features: Reverse DNS Lookup, DNS Zone Transfer Testing, Open Redirect Testing, Command Injection Testing, and CVE Exploit Checker.
Tool to scan for domains having .git repos exposed publically
Python module to query the VARIoT IoT vulnerabilities and exploits databases
Hook GetLocalTime(...) in kernelbase.dll for manipulate system time steps.
Hook DnsQueryEX to control domains resolving in any application using dnsapi.dll
BugBounty platform for IsetCom Event!
Prevents usage of unsafe ObjectInputStream in Minecraft mods
SSH server vulnerability and security scanner with Operous
In this course, I build an understanding of the wide range of assets organizations must protect. Explored many of the most common security controls used to protect valuable assets from risk. Also discovered the variety of ways assets are vulnerable to threats by adopting an attacker mindset.
Python模拟SCADA工业控制系统和Modbus协议通信,并对PLC进行漏洞分析和安全检测
Writeups on my TryHackMe adventures!
Datasets for evaluating smart contract security analysis tools ( continuously updating... )
Add a description, image, and links to the vunerability topic page so that developers can more easily learn about it.
To associate your repository with the vunerability topic, visit your repo's landing page and select "manage topics."