[sc name=”ad_1″] UAC-A-Mola is a tool that allows security researchers to investigate new UAC bypasses, in addition to detecting and exploiting...
Search Results For - Vulnerable
[sc name=”ad_1″] uniFuzzer is a fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer. Currently it supports fuzzing 32-bits LSB...
[sc name=”ad_1″] tarnish is a static-analysis tool to aid researchers in security reviews of Chrome extensions. It automates much of the regular...
[sc name=”ad_1″] Syhunt Community is a web and now mobile application security scanner. Syhunt is able to scan any kind of application source code...
[sc name=”ad_1″] A File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool. FDsploit menu: $ python fdsploit.py -h...
[sc name=”ad_1″] The popular SSH client program PuTTY has released the latest version of its software that includes security patches for 8 high...
[sc name=”ad_1″] Security researchers have uncovered a new variant of the infamous Mirai Internet of Things botnet, this time targeting embedded...
[sc name=”ad_1″] Libssh2, a popular open source client-side C library implementing the SSHv2 protocol, has released the latest version of its...
[sc name=”ad_1″] Various cyber criminal groups and individual hackers are still exploiting a recently patched critical code execution vulnerability...
[sc name=”ad_1″] If you are a Counter-Strike gamer, then beware, because 39% of all existing Counter-Strike 1.6 game servers available online are...