Yoast plugin race condition vulnerability CVE-2018-19370

WordPress is the most popular CMS for website development.  It is easy to develop website and used different functionality through different Plugins. In this...

Process Spawn Control | How to monitor the malware

Process Spawn Control is a Powershell tool which aims to help in the process analysis of malware. It is suspended newly launched processes and...

Instagram security bug exposed passwords

Facebook has been hit with another security bug which exposed passwords of Instagram users. This security bug affected those users who accessed Instagram’s ‘Download...

Open Advantech WebAccess Devices

Advantech is providing IoT software company. It is providing HMI, Web access platform, and HTML-5 based user interface. Therefore, I keep research on the devices. After...

Android Backdoor Crypter & Creator With Automatic IP Poisener – Androspy

Androspy is an open source tool for generating backdoor payload for android. It generates Crypter & Creator with Automatic IP Poisoner. Requirement for this tool keytool jarsigner ...
video

Oracle WebLogic JSP File Upload Vulnerability CVE-2018-2894

  CVE-2018-2894, Orcle file upload vulnerability by attackers against consumers and against our honeynet since July 19, 2018. CVE-2018-2894 consists of 2 arbitrary file upload vulnerabilities, one targeting...

Dirhunt – Find web directories without Bruteforce

  Dirhunt tool only for education purpose only. The author takes NO responsibility and/or liability for how you choose to use any of the tools/source code/any files...

Latest news