-
Is this theme (and other theme you created) compatible with the new GNOME 44?
-
## Steps to reproduce
How'd you do it?
1. Setting up metasploitframework on Mac to run in a Docker.
I used this online guide / how-to
https://medium.com/@habibsemouma/setting-up-metasplo…
-
Hello,
we are using this add-on in version 3.3.2 in combination with Vaadin 23.3.27 in our application.
Last week our application was analysed by a pentesting company and they found out that we ar…
-
It has come to my attention that apparently AIMSICD has become even more popular the less it works.
I will say the following not out of disrespect for the many contributors and all the hard labor …
E3V3A updated
6 months ago
-
Some of the self-hosted videos don't seem to work properly in all browsers. *Maybe* this has been fixed lately by converting all videos to h264, but this definetly needs more testing and debugging.
…
-
### Proxyman version? (Ex. Proxyman 1.4.3)
Proxyman 1.4.7
### macOS Version? (Ex. mac 10.14)
macOS 10.15 Beta (19A526h)
### Steps to reproduce
1. Open Proxyman
2. Create request in No…
-
for table event first i want to check isActive of it and then get event_id and branch.
on 'SELECT amount FROM tblevent WHERE branch = @branchValue' i want to check with the event_id because if we c…
-
Hi,
I recently purchased the `NETGEAR Nighthawk AC1900 USB 3.0 Dual Band adapter` to use on my Dell XPS 13 9310.
The adapter performs outstandingly better than the laptop's inbuilt PCIe Intel AX…
-
Would a variant similar to Kali be in scope?
Kali itself seems to rely on a lot of outdated technology, so a security optimized variant could be nice.
I dont know much about the Fedora Security …
-
[homepage]https://github.com/pablosnt/rekono[/homepage]
[tags]pentesting,automation,redteam,osint,enumeration,vulnerabilities,exploits,telegram-bot,defectdojo[/tags]
[short_descr]Execute full pentesti…