• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

vulnerabilities

  1. protectaccount

    Udemy Threats, Attacks, and Vulnerabilities for CompTIA Security +

    This course focuses on Domain 1 of the CompTIA Security+ 601 certification exam, which covers threats, attacks, and vulnerabilities in cybersecurity. Participants will gain comprehensive knowledge of various types of threats, attack vectors, and vulnerabilities that pose risks to information...
  2. luckyuser

    File Upload Abuse

    Link: https://rodelllemit.medium.com/web-app-pentesting-test-cases-for-file-upload-9b5734a0a144 *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  3. luckyuser

    Pentester Tools: Recon and vulnerabilities

    Link: https://pentest-tools.com/ *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  4. DORITO1900

    IT & Software Mastering Server-Side Request Forgery (SSRF) Vulnerabilities

    Link: Mastering Server-Side Request Forgery (SSRF) Vulnerabilities Language : ENGLISH Size : 1.6 GB Download link https://mega.nz/file/mYcQiYhY#o09--OXjLGsGDYJ1M1d9P-SqCSilNyyoQPpruT2o4rg
  5. vicky87

    Combo Tools Discover hidden assets and vulnerabilities

    ADD AN IMAGE HERE! [Not adding an image will result in removal] Then remove these lines. Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  6. zerodark

    Multi/Others Doc Macro Exploit 2025 capitalizing on vulnerabilities

    Doc Macro Exploit 2025 Doc Macro Exploit 2025 In 2025, the Doc Macro Exploit 2025 emerged as a significant cybersecurity threat, capitalizing on vulnerabilities in Microsoft Office documents to deliver malicious payloads. This sophisticated exploit framework leverages macro-based attacks...
  7. B

    Discover Vulnerabilities with SBR SMTP Scanner 2024

    4 Shared Mirrored Mega Nz Media Fire What is SBR SMTP Scanner 2024? SBR SMTP Scanner 2024 is a network scanning tool specifically designed to: Detect open SMTP servers (ports 25, 465, 587). Identify misconfigured email relays (open relays). Test for vulnerabilities in mail server software...
  8. EarlHickey

    SS7 Vulnerabilities Attacks: Get Phone Location, Listen & Stop Phone From Getting Calls

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  9. baladia

    Udemy Introduction to LLM Vulnerabilities

    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Skill Level: Intermediate | Genre: eLearning | Language: English + srt | Duration: 1h 25m | Size: 232 MB As large language models (LLMs) revolutionize the AI landscape, it's becoming crucial to understand and address the unique security...
  10. ashimuzirimumwanyi

    SQLi/Dork SQL Injection: How Hackers Exploit Vulnerabilities

    ADD AN IMAGE HERE! [Not adding an image will result in removal] Then remove these lines. Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the...
  11. 596687

    EBook/Course Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities

    Link: https://www.mediafire.com/file/04or2l9l1vt0lam/Vickie_Li_-_Bug_Bounty_Bootcamp__The_Guide_to_Finding_and_Reporting_Web_Vulnerabilities-No_Starch_Press_%25282021%2529%2528Z-Lib.io%2529.epub/file *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum...
  12. BattsssHack

    Brute Python Code to Find Vulnerabilities on Chase Bank

    import requests from bs4 import BeautifulSoup from urllib.parse import urljoin # URL of the website base_url = 'https://www.chase.com/' # Make a GET request to the website response = requests.get(base_url) # Check for SQL injection vulnerabilities def check_sql_injection(url): # Test URLs...
  13. heynaib

    NucleiFuzzer |Automation Tool For Detecting Vulnerabilities In Web App

    NucleiFuzzer = Nuclei + Paramspider 3 NucleiFuzzer is an automation tool that combines ParamSpider and Nuclei to enhance web application security testing. It uses ParamSpider to identify potential entry points and Nuclei's templates to scan for vulnerabilities. NucleiFuzzer streamlines the...
  14. carxproveteran

    Hacker's Toolkit:Black Hat Go pro (Practice Tests only) 2024

    Hacker's Toolkit:Black Hat Go pro (Practice Tests only) 2024 Master Go for Ethical Hacking with Practice Tests to exploit vulnerabilities, and defend systems, Ready Scripts to Hacks What you'll learn Master Go Programming with Practice Test's for Ethical Hacking: Learn Go for hacking, covering...
  15. jameshaarden58

    Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities

    Bug Bounty Bootcampteaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You'll also learn how to navigate bug bounty programs set up by companies to reward security professionals for finding...
  16. tronny

    Udemy - Mastering Authentication Vulnerabilities - Ultimate Course

    Udemy - Mastering Authentication Vulnerabilities - Ultimate Course 8-2023, by David Bombal & Rana Khalil *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  17. K

    Course/Tutorial 🌴Drone Hacking- Exploitation and Vulnerabilities🌴

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  18. mayoufi

    CompTIA Security+ (SY0-701) Cert Prep: 2 Threats, Vulnerabilities

    Duration: 2h 48m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 354 MB Level: Intermediate | Genre: eLearning | Language: English The CompTIA Security+ exam is an excellent entry point for a career in information security. The latest version, SY0-701, expands coverage on cloud security...
  19. N

    Scama/Letter Vulnerabilities of IBM 1/1/2024

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  20. N

    Scama/Letter Vulnerabilities of IBM 1/1/2024

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  21. N

    Scama/Letter Vulnerabilities of IBM 1/1/2024

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  22. N

    Scama/Letter Vulnerabilities of IBM 1/1/2024

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  23. N

    Scama/Letter Vulnerabilities of IBM 1/1/2024

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  24. N

    Scama/Letter Vulnerabilities of IBM 1/1/2024

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  25. N

    Scama/Letter Vulnerabilities of IBM 1/1/2024

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  26. N

    Scama/Letter Vulnerabilities of IBM 1/1/2024

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  27. N

    Scama/Letter Vulnerabilities of IBM 1/1/2024

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  28. N

    Scama/Letter Vulnerabilities of IBM 1/1/2024

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  29. xrahitel

    microsoft management console (mmc) vulnerabilities

    microsoft-management-console-mmc-vulnerabilities
  30. skazt

    Facebook Vulnerabilities 23/08/2023

    CVE-2023-45239 CVE-2023-44487 CVE-2023-30792 CVE-2023-30470
  31. skazt

    Facebook Vulnerabilities 20/11/2021

    CVE-2021-24031 CVE-2021-24030 CVE-2021-24029 CVE-2021-24028 CVE-2021-24025
  32. skazt

    Facebook Vulnerabilities 13/11/2021

    CVE-2021-24036 CVE-2021-24033 CVE-2021-24032
  33. skazt

    Facebook Vulnerabilities 07/11/2021

    CVE-2021-24045 CVE-2021-24044 CVE-2021-24040 CVE-2021-24037
  34. skazt

    Facebook Vulnerabilities 03/11/2021-22

    CVE-2022-4899 CVE-2021-39207 CVE-2021-24218 CVE-2021-24217
  35. skazt

    Facebook Vulnerabilities 29/10/2023

    CVE-2022-35289 CVE-2022-32234 CVE-2022-27810
  36. skazt

    Facebook Vulnerabilities 26/10/2022

    CVE-2022-40138 CVE-2022-36938 CVE-2022-36937
  37. skazt

    Facebook Vulnerabilities 21/09/2023

    CVE-2023-23557 CVE-2023-23556 CVE-2023-5654
  38. skazt

    Facebook Vulnerabilities 12/09/2023

    CVE-2023-24833 CVE-2023-24832 CVE-2023-23759
  39. skazt

    Facebook Vulnerabilities 30/08/2023

    CVE-2023-28753 CVE-2023-28081 CVE-2023-25933
  40. tronny

    Udemy - OWASP Mobile Top 10 - Vulnerabilities to Avoid 11-2023

    Udemy - OWASP Mobile Top 10 - Vulnerabilities to Avoid 11-2023, by Pack Of Coders - POC *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  41. tronny

    Udemy - OWASP Top 10 - Protecting Against Threats and Vulnerabilities

    Udemy - OWASP Top 10 - Protecting Against Threats and Vulnerabilities 11-2023, by Kareem Ullah *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  42. Emu4774

    Lenovo Vulnerabilities 2023/08/0

    CVE-2023-3113 High CVE-2023-34418 High CVE-2023-34420 High CVE-2023-34421 High CVE-2023-34422 High CVE-2023-2992 High CVE-2023-2993 High CVE-2023-2290 High
  43. Emu4774

    Apple Vulnerabilities 2023/07/23

    CVE-2023-38136 Low CVE-2023-32734 Low CVE-2023-35983 Medium CVE-2023-35983 High CVE-2023-38580 High CVE-2023-38572 High
  44. Emu4774

    Ubuntu Vulnerabilities

    CVE-2023-45284 CVE-2023-5678 CVE-2023-47272
  45. Emu4774

    Red Hat Vulnerabilities 2023/08/04

    CVE-2023-3180 High CVE-2023-3255 Medium
  46. Emu4774

    Samsung Vulnerabilities 2023/08/01

    CVE-2022-40529 Critical CVE-2022-33257 Critical CVE-2023-21250 Critical
  47. Emu4774

    DELL Vulnerabilities 2023/08/01

    CVE-2023-25539 Critical CVE-2023-25153 Critical CVE-2023-25173 Critical CVE-2023-25165 Critical CVE-2023-23914 Critical CVE-2023-23915 Critical
  48. Emu4774

    Vulnerabilities DELL 2023/07/28

    Usefull CVE-2022-24415, CVE-2022-24416, CVE-2022-24419, CVE-2022-24420, CVE-2022-24421
  49. Emu4774

    Vulnerabilities Tenable 2023/7/28

    CVE-2023-23914, CVE-2019-12900, CVE-2017-16931, CVE-2017-8872, CVE-2017-7376, CVE-2017-7375, CVE-2016-4658, CVE-2016-4448, CVE-2015-8710, CVE-2019-19646, CVE-2019-19317, CVE-2016-5180, CVE-2022-32207, CVE-2022-32221, CVE-2019-11068
  50. Emu4774

    Vulnerabilities UBUNTU 7/17/2023

    CVE-2023-38350 Medium pnp4nagios CVE-2023-38349 Medium pnp4nagiosCVE-2023-38336 Medium netkit-rsh CVE-2023-38325 Medium python-cryptographyCVE-2023-38199 Medium modsecurity-crs CVE-2023-37464 Medium cjoseCVE-2023-28362 Medium rails CVE-2021-31294 Medium redisCVE-2017-20165 Medium node-debug...
Top Bottom