-
Hi,
the following RPC call is used on a webpage running GWT 2.5.1:
```
7|0|12|https://example.com/|{HASH}|net.customware.gwt.dispatch.client.standard.StandardDispatchService|execute|net.customware.g…
ghost updated
7 years ago
-
> Resources:
- https://www.forbes.com/sites/ericbasu/2013/10/13/what-is-a-penetration-test-and-why-would-i-need-one-for-my-company/#79871ce918a0
- https://www.cloudflare.com/learning/security/glossa…
-
Implement privilege checks similar to:
https://github.com/RhinoSecurityLabs/Security-Research/blob/master/tools/aws-pentest-tools/aws_escalate.py
https://rhinosecuritylabs.com/aws/aws-privilege-esca…
-
## Context 🤝
Hi everyone (particularly to @arpitn30)!
I'm an appsec engineer that in my undergraduate studies I had worked with `nipper-ng` for auditing network devices. In my Final Degree Pro…
-
I know this is really bad practise, but currently I'm pentesting an API which is sending the JWT as a simple get parameter. JWT_Tool does not support this case.
Maybe it can/should be added for such …
-
It would be nice to be able to use compromised targets as proxies to allow pivoting into a target's network. This feature would greatly improve the utility of the tool and enable it to be used as a fl…
-
Hi guys,
Thank you for your work, this tool could be very great.
I have some suggestions to improve it.
- To not run all tools automatically (ex: nikto, etc.). Propose an option to the user to do…
-
Link to the tool: https://... (minimum 1 required):
[link] https://github.com/Miiden/EyeSpy [/link]
List of tags separated by comma: tag1,tag2,tag3... (required):
[tags] CCTV,ip-cameras,pentest…
-
## Actual behavior
Vulnerabilities are linked to a project and are either created manually from scratch or imported from tools integration.
## Expected behavior
Having a vulnerability databas…
-
### Describe the feature
## **Main issue:**
It's a fact, `Nuxt` / `Vue app` are leaking all application URL(s) on hydration because the full router is shipped to the client (this is by design for t…