-
So not sure how accurate the exploits are that the Exploit Finder finds online but i highly doubt the exploits it found are are all the working exploits.
I'm just curious if you can give some feedback…
-
I scanned a Linux system and found port 21 3306 587 22 and etc open with the service inspector. However, when I go to the exploit finder, it shows nothing. I'm using the latest nightly version on a Ne…
-
After I run service inspector successfully I move on to exploit finder. The host is selected when I run it it crashes and then displays a warning to select a valid target. The host was listed and sele…
da13m updated
8 years ago
-
##DEVICE:
Oneplus2
##OS version:
oxygenOS 2.5.8 / Android 6.0.1
##cSploit version:
1.6.5
##busybox (installed or not):
##Rooted with supersu?
yes
##logcat (filter it!):
> 05-08…
-
When I hit the start button in exploit finder it never switches to the stop image. Also, once the exploit finder has finished searching, then it switches to the stop image.
-
**Is your feature request related to a problem? Please describe.**
No
**Describe the solution you'd like**
In French residential systems – all using either Mifare Classic / SAK88 Mifare Classic …
-
DEVICE:redmi 4
OS version:7.1.2
**cSploit version:** v 1.6.5
**busybox** *(installed or not):* installed
**Rooted with supersu?** #Yes
**logcat** *(filter it!):*
[How-to gui…
-
### ExploitFinder Bug
I have tryed to exploit from my mobile device a Mac OS X Mashine vulnerable to a remote code execution attack. Then I've started my exploit (configurated automatically) and I've…
ghost updated
7 years ago
-
https://github.com/lflare/cve-2024-6387-poc
Affected versions of OpenSSH range from 8.5p1 to 9.8p1
Severity: critical.
-
Traceback (most recent call last):
File "d:\HackProgram\Pompem\pompem.py", line 48, in
main()
File "d:\HackProgram\Pompem\pompem.py", line 44, in main
exploit_finder.run()
File "d:…