CVE-2021-34473
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31196, CVE-2021-31206.
https://cve.reconshell.com/cve/CVE-2021-34473
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31196, CVE-2021-31206.
https://cve.reconshell.com/cve/CVE-2021-34473
CVE-2021-34469
Microsoft Office Security Feature Bypass Vulnerability
https://cve.reconshell.com/cve/CVE-2021-34469
Microsoft Office Security Feature Bypass Vulnerability
https://cve.reconshell.com/cve/CVE-2021-34469
cerbrutus - Network brute force tool written in Python
#cerbrutus #Network #python #BruteForce
https://reconshell.com/cerbrutus-network-brute-force-tool-written-in-python/
#cerbrutus #Network #python #BruteForce
https://reconshell.com/cerbrutus-network-brute-force-tool-written-in-python/
PostgreSQL User-defined Data Types
#PostgreSQL #SQL #DataTypes #MySQL #PGSQL #PSQL
https://reconshell.com/postgresql-user-defined-data-types/
#PostgreSQL #SQL #DataTypes #MySQL #PGSQL #PSQL
https://reconshell.com/postgresql-user-defined-data-types/
Penetration Testing Tools, ML and Linux Tutorials
PostgreSQL User-defined Data Types - Penetration Testing Tools, ML and Linux Tutorials
Summary: in this tutorial, you will learn how to create PostgreSQL user-defined data type using CREATE DOMAIN and CREATE TYPE statements.
Common Vulnerabilities and Exposures
Start your journey With free Vulnerability Search engine
https://cve.reconshell.com/
Start your journey With free Vulnerability Search engine
https://cve.reconshell.com/
DNSStager - Hide your payload in DNS
#XOR #Shellcode #payload #DNS #DNSStager
https://reconshell.com/dnsstager-hide-your-payload-in-dns/
#XOR #Shellcode #payload #DNS #DNSStager
https://reconshell.com/dnsstager-hide-your-payload-in-dns/
Penetration Testing Tools, ML and Linux Tutorials
DNSStager - Hide your payload in DNS - Penetration Testing Tools, ML and Linux Tutorials
DNSStager is an open-source project based on Python used to hide and transfer your payload using DNS.
cloudsploit - Cloud Security Posture Management
#cloudsploit #CloudSecurit #AWS #Azure
https://reconshell.com/cloudsploit-cloud-security-posture-management/
#cloudsploit #CloudSecurit #AWS #Azure
https://reconshell.com/cloudsploit-cloud-security-posture-management/
Penetration Testing Tools, ML and Linux Tutorials
cloudsploit - Cloud Security Posture Management - Penetration Testing Tools, ML and Linux Tutorials
CloudSploit by Aqua is an open-source project designed to allow detection of security risks in cloud infrastructure accounts, including: Amazon Web Services
Cannon - post exploitation framework fully developed using python3
#PostExploitation #python3 #ReverseShell
https://reconshell.com/cannon-post-exploitation-framework-fully-developed-using-python3/
#PostExploitation #python3 #ReverseShell
https://reconshell.com/cannon-post-exploitation-framework-fully-developed-using-python3/
Penetration Testing Tools, ML and Linux Tutorials
Cannon - post exploitation framework fully developed using python3 - Penetration Testing Tools, ML and Linux Tutorials
Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined modules, harvest reverse
How to Check Open Ports in Your Linux System
#Nmap #Netcat #Linux #LinuxGeeks
https://reconshell.com/how-to-check-open-ports-in-your-linux-system/
#Nmap #Netcat #Linux #LinuxGeeks
https://reconshell.com/how-to-check-open-ports-in-your-linux-system/
Penetration Testing Tools, ML and Linux Tutorials
How to Check Open Ports in Your Linux System - Penetration Testing Tools, ML and Linux Tutorials
As a Linux system administrator, to transmit data from server to server having a good command over the TCP (Transmission Control Protocol) protocols is very
Wazuh - The Open Source Security Platform
#IntrusionDetection #Vulnerability #IncidentResponse #ContainersSecurity
#CloudSecurity #SecurityEvents #Wazuh
https://reconshell.com/wazuh-the-open-source-security-platform/
#IntrusionDetection #Vulnerability #IncidentResponse #ContainersSecurity
#CloudSecurity #SecurityEvents #Wazuh
https://reconshell.com/wazuh-the-open-source-security-platform/
Tomcter - Bruteforce Apache Tomcat Manager Login
#Tomcter #Bruteforce #Apache #Tomcat
https://reconshell.com/tomcter-bruteforce-apache-tomcat-manager-login/
#Tomcter #Bruteforce #Apache #Tomcat
https://reconshell.com/tomcter-bruteforce-apache-tomcat-manager-login/
Penetration Testing Tools, ML and Linux Tutorials
Tomcter - Bruteforce Apache Tomcat Manager Login - Penetration Testing Tools, ML and Linux Tutorials
Tomcter is a python tool developed to bruteforce Apache Tomcat manager login with Apache Tomcat default credentials.
TeamsUserEnum - User enumeration with Microsoft Teams API
#Microsoft #Enumeration #Teams #TeamsUserEnum
https://reconshell.com/teamsuserenum-user-enumeration-with-microsoft-teams-api/
#Microsoft #Enumeration #Teams #TeamsUserEnum
https://reconshell.com/teamsuserenum-user-enumeration-with-microsoft-teams-api/
Penetration Testing Tools, ML and Linux Tutorials
TeamsUserEnum - User enumeration with Microsoft Teams API - Penetration Testing Tools, ML and Linux Tutorials
Sometimes user enumeration could be sometimes useful during the reconnaissance of an assessment. This tool will determine if an email is registered on teams
Common Vulnerabilities and Exposures
Start your journey With free Vulnerability Search engine
https://cve.reconshell.com/
Start your journey With free Vulnerability Search engine
https://cve.reconshell.com/
Dystopia - Low to medium multi threaded Ubuntu Core honeypot coded in Python
#Ubuntu #honeypot #Python #Dystopia
https://reconshell.com/dystopia-low-to-medium-multi-threaded-ubuntu-core-honeypot-coded-in-python/
#Ubuntu #honeypot #Python #Dystopia
https://reconshell.com/dystopia-low-to-medium-multi-threaded-ubuntu-core-honeypot-coded-in-python/
Penetration Testing Tools, ML and Linux Tutorials
dystopia - Low to medium multi threaded Ubuntu Core honeypot coded in Python - Penetration Testing Tools, ML and Linux Tutorials
You can add support to new commands by editing the file "commands.json". The format is command:outputfor eg
Nebula - Cloud C2 Framework
#PenetrationTesting #DevOps #C2 #AWS #Kubernetes #Azure
#Cloud #Enumeration #Exploit #ReverseShell
https://reconshell.com/nebula-cloud-c2-framework/
#PenetrationTesting #DevOps #C2 #AWS #Kubernetes #Azure
#Cloud #Enumeration #Exploit #ReverseShell
https://reconshell.com/nebula-cloud-c2-framework/
Penetration Testing Tools, ML and Linux Tutorials
Nebula - Cloud C2 Framework - Penetration Testing Tools, ML and Linux Tutorials
Cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still working to allow testing other
ppmap - scanner/exploitation tool written in GO
#ExploitationTool #XSS #Scanner #ppmap #Golang
https://reconshell.com/ppmap-scanner-exploitation-tool-written-in-go/
#ExploitationTool #XSS #Scanner #ppmap #Golang
https://reconshell.com/ppmap-scanner-exploitation-tool-written-in-go/
Penetration Testing Tools, ML and Linux Tutorials
ppmap - scanner/exploitation tool written in GO - Penetration Testing Tools, ML and Linux Tutorials
For mass scanning:cat url.txt | ./ppmap where url.txt contains all url(s) in column.
hive-metasploit Connector between Hive and Metasploit
#vulnerabilities #MetasploitFramework #msf #Hive #Metasploit
https://reconshell.com/hive-metasploit-connector-between-hive-and-metasploit/
#vulnerabilities #MetasploitFramework #msf #Hive #Metasploit
https://reconshell.com/hive-metasploit-connector-between-hive-and-metasploit/
Penetration Testing Tools, ML and Linux Tutorials
hive-metasploit Connector between Hive and Metasploit - Penetration Testing Tools, ML and Linux Tutorials
hive-metasploit is a python library for:
kube-bench is tool that checks whether Kubernetes is deployed securely
#k8s #YAML #KubeBench #KubernetesSecurity #cisSecurity #Kubernetes
https://reconshell.com/kube-bench-is-tool-that-checks-whether-kubernetes-is-deployed-securely/
#k8s #YAML #KubeBench #KubernetesSecurity #cisSecurity #Kubernetes
https://reconshell.com/kube-bench-is-tool-that-checks-whether-kubernetes-is-deployed-securely/
Penetration Testing Tools, ML and Linux Tutorials
kube-bench is tool that checks whether Kubernetes is deployed securely - Penetration Testing Tools, ML and Linux Tutorials
Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark
CVE-2020-4974
IBM Jazz Foundation products are vulnerable to server side request forgery (SSRF).
https://cve.reconshell.com/cve/CVE-2020-4974
IBM Jazz Foundation products are vulnerable to server side request forgery (SSRF).
https://cve.reconshell.com/cve/CVE-2020-4974
IGopher : Golang smart bot for Instagram DM
#IGopher #Golang #InstagramBot
https://reconshell.com/igopher-golang-smart-bot-for-instagram-dm/
#IGopher #Golang #InstagramBot
https://reconshell.com/igopher-golang-smart-bot-for-instagram-dm/
Penetration Testing Tools, ML and Linux Tutorials
IGopher : Golang smart bot for Instagram DM - Penetration Testing Tools, ML and Linux Tutorials
This project is under active development, there may be bugs or missing features. If you have any problem or would like to see a feature implemented, please,