-
One important topic that has not been covered is the use of security providers and the patching of some of them.
For instance:
- there are various versions of "altered" bouncey-castles delivered wit…
-
[root@localhost ptf]# ./ptf
[*] You can always type ./ptf --no-network-connection to skip the Internet check..
[*] Checking for an Internet connection...
[*] Trying to update myself first.. Then st…
-
Hey, i used it on my main computer with the firewall off, and when I put it on my memory pen and open the file on a other computer that has a firewall on, the application (laZagne) gets deleted by the…
-
Hi, i used v3n0m before, amazing work thanks. But now, i download it from github, follow the install guide, the problems are :
It does not create a Launcher in PATH
It fails at launching when i g…
-
fileout's second parameter is not consistent with the terminal output -- in a sense that `pr_svrty_high` or `pr_svrty_critical` is `NOT ok`. From a pentesters perspective that would be also a plus.
I…
-
Is all I need to buy a Pi Zero W and a micro sd card, to get everything setup easy? How would I setup WiFi, since it is a bit tedious on the normal Pi Zero.
edit: also, on the victim, how would I r…
-
-
## Empire Version
2.0
## OS Information (Linux flavor, Python version)
kali linux rolling - python 2.7
## Expected behavior and description of the error, including any actions taken immediatel…
-
Why you've made the software that make backdoors & malware? What was your motivation?
-
"are in use. Co" -> Co?
I would add that XXE attacks can be due to documents that are uploaded and later processed by the application programmatically (docx, pptx, etc.) and that this is a potentia…