Cross site scripting which is commonly known as XSS, is a very simple vulnerability found in Web Applications, XSS allows the attacker to RUN a malicious code on the website. NOTE: Please read the following: This piece of content was written to educate you on the security aspects of the information, and not to teach you […]
We would like to share with you a list of Google Dorks, to find XSS Vulnerable Websites. Check them out below: !xss inurl:com_feedpostold/feedpost.php?url= !xss inurl:/products/orkutclone/scrapbook.php?id= !xss inurl:/products/classified/headersearch.php?sid= !xss inurl:/poll/default.asp?catid= !xss inurl:/search_results.php?search=Search&k= !xss /preaspjobboard//Employee/emp_login.asp?msg1= !xss pages/match_report.php?mid= pages/match_report.php?mid= !xss /notice.php?msg= /notice.php?msg= !xss /gen_confirm.php?errmsg= /gen_confirm.php?errmsg= !xss /index.php?option=com_easygb&Itemid= !xss /2wayvideochat/index.php?r= !xss /view.php?PID= /view.php?PID= !xss /Property-Cpanel.html?pid= /Property-Cpanel.html?pid= !xss /showproperty.php?id= /showproperty.php?id= […]
This ATM Malware is sold on the Dark Web for about $5000 (payment in Bitcoin). It was posted by a Russian hacker, or group of hackers. Its operators claim that Cutlet Maker can work on any Wincor Nixdorf ATM, and all that’s needed is access to the ATM’s USB port. Screenshots: A more detailed article […]
Demo: For more information visit: https://www.krackattacks.com/ Additional information from PNP Tutorials: KRACK Attacks paper is live. Apparently it was leaked. You can check it out here.
Multi-platform transparent client-side encryption of your files in the cloud. Cryptomator provides transparent, client-side encryption for your cloud. Protect your documents from unauthorized access. Cryptomator is free and open source software, so you can rest assured there are no backdoors. Cryptomator encrypts file contents and names using AES. Your passphrase is protected against bruteforcing attempts […]
Shadow is a unique discrete-event network simulator that runs real applications like Tor and Bitcoin, and distributed systems of thousands of nodes on a single machine. Shadow combines the accuracy of emulation with the efficiency and control of simulation, achieving the best of both approaches. Shadow was developed because there was a recognized need for […]