-
Hiya,
I have been working with the tool alot lately and i noticed some things that could improve the tool abit. Hopefully you have some time to implement these features!
When brute forcing SIDs, a m…
-
hi @exploitoverload, appreciate your work.
I couldn't help but wonder, is it possible to mount your configurations (as a channel or something?), instead of replacing my existing configurations?
…
-
How is main file of this? I don't know how to launch main file is named...? Big readme but nothing about this...
-
Hi,
Nice work you guys are doing.
So during some pentests, after finding a vulnerability and exploiting them, supervisors would still request for reports generated by the tool that was used to fi…
-
## Actual behavior
Vulnerabilities are linked to a project and are either created manually from scratch or imported from tools integration.
## Expected behavior
Having a vulnerability databas…
-
![error-invoke-webrequest](https://user-images.githubusercontent.com/37650464/119873806-35aa9900-bf25-11eb-8634-58ee3491a805.png)
Just attended your webinar today " Getting Started in Pentesting Th…
-
Hey, please check and, if you consider them acceptable, add them.
SQL-like syntax tool Steampipe.io + CIS and CVE audits
https://steampipe.io/docs
CloudQuery: SQL-like syntax tool
https://clo…
-
## To register, companies must meet the following criteria:
* Deliver cybersecurity products or services, category definitions can be [found here](categories.md)
* Hold a valid Australian Business…
-
Maybe it's because I'm new to bug bounty hunting/pentesting, but no matter what I do, I seem to get the same ports scanned with no results to show in the report. I have tried the following modules to …
-