Comunidad Pen7esting
3.58K subscribers
510 photos
40 videos
142 files
5.08K links
Download Telegram
openvpn-install

Script para una fácil configuración de openvpn
El script descarga y configura openvpn, también puede agregar / eliminar clientes y eliminar el propio openvpn

https://github.com/angristan/openvpn-install

Autor: https://stanislas.blog/
====================
Si encuentra software interesante, compártalo con la comunidad: @SCAyL_bot
Lo anterior es una vulnerabilidad de Windows 10
#exploit
PoCs for exploiting CVE-2021-21847,
CVE-2021-21853, CVE-2021-21845,
CVE-2021-21846, CVE-2021-21844
CVE-2021-21839:
https://github.com/AlAIAL90/CVE-2021-21847
https://github.com/AlAIAL90/CVE-2021-21853
https://github.com/AlAIAL90/CVE-2021-21845
https://github.com/AlAIAL90/CVE-2021-21846
https://github.com/AlAIAL90/CVE-2021-21844
https://github.com/AlAIAL90/CVE-2021-21839
// Multiple exploitable integer overflow vulnerabilities exist within the MPEG-4 decoding functionality of the GPAC Project
Irlanda impone a WhatsApp una multa histórica de 266 millones de dólares por violación de la privacidad de datos
#exploit
CVE-2021-1588:
A vulnerability in the MPLS Operation, Administration, and Maintenance (OAM) feature of Cisco NX-OS Software
https://github.com/AlAIAL90/CVE-2021-1588
]-> A vulnerability in the implementation of the system login block-for command for Cisco NX-OS Software
https://github.com/AlAIAL90/CVE-2021-1590
]-> A vulnerability in the EtherChannel port subscription logic of Cisco Nexus 9500 Series Switches 
https://github.com/AlAIAL90/CVE-2021-1591
[webapps] Patient Appointment Scheduler System 1.0 - Unauthenticated File Upload & Remote Code Execution (RCE)
Patient Appointment Scheduler System 1.0 - Unauthenticated File Upload & Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50264
Comunidad Pen7esting pinned «Al parecer tomaron mi script y lo han mejorado. https://github.com/Anonimo501/SambaRelay»
#exploit
CVE-2021-33909 - Sequoia PoC
https://github.com/ChrisTheCoolHut/CVE-2021-33909
// fs/seq_file.c in the Linux kernel 3.16 - 5.13 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user