CVE-2021-31213
Visual Studio Code Remote Containers Extension Remote Code Execution Vulnerability
https://cve.reconshell.com/cve/CVE-2021-31213
Visual Studio Code Remote Containers Extension Remote Code Execution Vulnerability
https://cve.reconshell.com/cve/CVE-2021-31213
mubeng - An incredibly fast proxy checker & IP rotator
#proxy #mubeng #BurpSuite #OWASP #ZAP #ProxyChain
https://reconshell.com/mubeng-an-incredibly-fast-proxy-checker-ip-rotator/
#proxy #mubeng #BurpSuite #OWASP #ZAP #ProxyChain
https://reconshell.com/mubeng-an-incredibly-fast-proxy-checker-ip-rotator/
Penetration Testing Tools, ML and Linux Tutorials
mubeng - An incredibly fast proxy checker & IP rotator - Penetration Testing Tools, ML and Linux Tutorials
mubeng has 2 core functionality:
CVE-2021-21656
Jenkins Xcode integration Plugin 2.0.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
https://cve.reconshell.com/cve/CVE-2021-21656
Jenkins Xcode integration Plugin 2.0.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
https://cve.reconshell.com/cve/CVE-2021-21656
File upload vulnerability scanner and exploitation tool
#Fuxploider #vulnerability #scanner #ExploitationTool
https://reconshell.com/fuxploider-file-upload-vulnerability-scanner-and-exploitation-tool/
#Fuxploider #vulnerability #scanner #ExploitationTool
https://reconshell.com/fuxploider-file-upload-vulnerability-scanner-and-exploitation-tool/
Penetration Testing Tools, ML and Linux Tutorials
fuxploider - File upload vulnerability scanner and exploitation tool - Penetration Testing Tools, ML and Linux Tutorials
Fuxploider is an open source penetration testing tool that automates the process of detecting and exploiting file upload forms flaws. This tool is able to
Managing PostgreSQL Views
#postgresql #SQL #PSQL #PostgreSQLViews
https://reconshell.com/managing-postgresql-views/
#postgresql #SQL #PSQL #PostgreSQLViews
https://reconshell.com/managing-postgresql-views/
Penetration Testing Tools, ML and Linux Tutorials
Managing PostgreSQL Views - Penetration Testing Tools, ML and Linux Tutorials
Summary: in this tutorial, you will learn about views and how to manage views in PostgreSQL.
mitaka – A browser extension for OSINT search
#OSINT #mitaka
https://reconshell.com/mitaka-a-browser-extension-for-osint-search/
#OSINT #mitaka
https://reconshell.com/mitaka-a-browser-extension-for-osint-search/
Best Raspberry Pi Blogs For The Pi Geeks
#RaspberryPi #Pi #PiGeeks #Raspberry
https://reconshell.com/best-raspberry-pi-blogs-for-the-pi-geeks/
#RaspberryPi #Pi #PiGeeks #Raspberry
https://reconshell.com/best-raspberry-pi-blogs-for-the-pi-geeks/
Penetration Testing Tools, ML and Linux Tutorials
Best Raspberry Pi Blogs For The Pi Geeks - Penetration Testing Tools, ML and Linux Tutorials
If you are a Raspberry Pi Geek, then this article about the Raspberry Pi blogs is sure to take the nerves out of you. It is often that you get stuck with a
Scavenger - Crawler searching for credential leaks on paste sites
#Scavenger #OSINT #Crawler #SQLdumps
https://reconshell.com/scavenger-crawler-searching-for-credential-leaks-on-paste-sites/
#Scavenger #OSINT #Crawler #SQLdumps
https://reconshell.com/scavenger-crawler-searching-for-credential-leaks-on-paste-sites/
Penetration Testing Tools, ML and Linux Tutorials
Scavenger - Crawler searching for credential leaks on paste sites - Penetration Testing Tools, ML and Linux Tutorials
Just the code of my OSINT bot searching for sensitive data leaks on paste sites.
Difference between Full stack developer and Software developer
#FullStackDeveloper #StackDeveloper #Developer
https://reconshell.com/difference-between-full-stack-developer-and-software-developer/
#FullStackDeveloper #StackDeveloper #Developer
https://reconshell.com/difference-between-full-stack-developer-and-software-developer/
Penetration Testing Tools, ML and Linux Tutorials
Difference between Full stack developer and Software developer - Penetration Testing Tools, ML and Linux Tutorials
Should I become a software developer or a full stack developer? This is the most frequent question that comes to the mind of every student? To know the
CVE-2021-33514
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application
https://cve.reconshell.com/cve/CVE-2021-33514
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application
https://cve.reconshell.com/cve/CVE-2021-33514
msldap - LDAP library for auditing MS AD
#kerberos #LDAP #AD #KERBEROS #SOCKS5
https://reconshell.com/msldap-ldap-library-for-auditing-ms-ad/
#kerberos #LDAP #AD #KERBEROS #SOCKS5
https://reconshell.com/msldap-ldap-library-for-auditing-ms-ad/
Penetration Testing Tools, ML and Linux Tutorials
msldap - LDAP library for auditing MS AD - Penetration Testing Tools, ML and Linux Tutorials
LDAP library for MS AD
OffensivePH - Post Exploitation Tool
#PostExploitation #OffensivePH #Exploitation
#Hacking #shellcode #Hacker
https://reconshell.com/offensiveph-post-exploitation-tool/
#PostExploitation #OffensivePH #Exploitation
#Hacking #shellcode #Hacker
https://reconshell.com/offensiveph-post-exploitation-tool/
Important Docker Commands for Software Developers
#Docker #virtualization #Commands #SoftwareDevelopers #DevOps
https://reconshell.com/important-docker-commands-for-software-developers/
#Docker #virtualization #Commands #SoftwareDevelopers #DevOps
https://reconshell.com/important-docker-commands-for-software-developers/
Penetration Testing Tools, ML and Linux Tutorials
Important Docker Commands for Software Developers - Penetration Testing Tools, ML and Linux Tutorials
Docker has taken the world by storm since its inception in 2013. If you’re an experienced programmer crafting innovation using modern-day stacks, chance are
IPED Digital Forensic Tool
#Forensic #ForensicTool #IPED #DigitalForensic
https://reconshell.com/iped-digital-forensic-tool/
#Forensic #ForensicTool #IPED #DigitalForensic
https://reconshell.com/iped-digital-forensic-tool/
Penetration Testing Tools, ML and Linux Tutorials
IPED Digital Forensic Tool - Penetration Testing Tools, ML and Linux Tutorials
IPED Digital Forensic Tool. It is an open source software that can be used to process and analyze digital evidence, often seized at crime scenes by law
Best Linux Commands Cheat Sheet For Linux Admin
#Linux #Bash #Shell #Unix #LinuxCheatSheet
https://reconshell.com/best-linux-commands-cheat-sheet-for-linux-admin/
#Linux #Bash #Shell #Unix #LinuxCheatSheet
https://reconshell.com/best-linux-commands-cheat-sheet-for-linux-admin/
Penetration Testing Tools, ML and Linux Tutorials
Best Linux Commands Cheat Sheet For Linux Admin - Penetration Testing Tools, ML and Linux Tutorials
There are thousands of Linux commands available for performing any task via the command-line interface. It’s challenging for Linux users to remember or
PwnLnX - Advanced python reverse shell for hacking
#Python #ReverseShell #Hacking #Payload #backdoor
https://reconshell.com/pwnlnx-advanced-python-reverse-shell-for-hacking/
#Python #ReverseShell #Hacking #Payload #backdoor
https://reconshell.com/pwnlnx-advanced-python-reverse-shell-for-hacking/
Common Vulnerabilities and Exposures
Start your journey With free Vulnerability Search engine
See More : https://cve.reconshell.com/
Start your journey With free Vulnerability Search engine
See More : https://cve.reconshell.com/
PoisonApple – macOS persistence tool
#CyberThreat #macOSsecurity #ThreatHunters #macOS
https://reconshell.com/poisonapple-macos-persistence-tool/
#CyberThreat #macOSsecurity #ThreatHunters #macOS
https://reconshell.com/poisonapple-macos-persistence-tool/
HostOnion - Host A Hidden Service on TOR
#HostOnion #TOR #Darkweb #Termux #Shell
https://reconshell.com/hostonion-host-a-hidden-service-on-tor/
#HostOnion #TOR #Darkweb #Termux #Shell
https://reconshell.com/hostonion-host-a-hidden-service-on-tor/