-
os: Kali Linux
Environment : Python3.6
> :~/pentesting/xerosploit# python2 xerosploit.py
Traceback (most recent call last):
File "xerosploit.py", line 26, in
from terminaltables import D…
-
### Feature or Problem Description
When running Apicurio in my enterprise environment, it needs to pass a pentest. They will check that no SSL/TLS versions are used which are considered insecure, s…
-
Hello,
Something weird I've never seen on a test before: I start Responder-ing like normal with `responder.py -I eth0 -Pv` and then several devices on the network end up Responder-spamming me with …
-
Vulnreport is based on a Ruby-stack, and it requires a clean environment to deploy to. A docker image can ease the deployment of the application (as compared to a new VM) along with shared volumes wi…
-
Metta should be able to take a list of ATT&CK T-numbers and execute baseline actions that correspond to those T-numbers.
Why? it could then read in the T numbers assigned to any APT group from: htt…
-
## Description
The following dedicated PenTest AWS VAEC test systems require connectivity (ping and network access to all open ports) to Platform systems/IPs in order to conduct Annual Penetration te…
-
### Is there an existing issue for this?
- [X] I have searched the existing issues
### Community Note
* Please vote on this issue by adding a :thumbsup: [reaction](https://blog.github.com/2016-…
-
Due to the unencrypted nature of Memcached and other mechanisms due to speed, it is necessary to support encryption for everything put there.
Functions to modify:
- GetCache()
- SetCache()
Ho…
-
Assessing the security of internal resources and components hosted within a SCS testbed deployment. This will be done from a Gray-box perspective, which involves a mix of knowledge about the environme…
90n20 updated
6 months ago
-
Link to the tool: https://... (minimum 1 required):
[link] https://github.com/Miiden/EyeSpy [/link]
List of tags separated by comma: tag1,tag2,tag3... (required):
[tags] CCTV,ip-cameras,pentest…