Aggregator
Kerbeus-BOF: Beacon Object Files for Kerberos abuse
Kerbeus-BOF Beacon Object Files for Kerberos abuse. This is an implementation of some important features of the Rubeus project, written in C. The project features integration with the C2 frameworks Cobalt Strike and Havoc. Ticket requests and renewals asktgt...
The post Kerbeus-BOF: Beacon Object Files for Kerberos abuse appeared first on Penetration Testing Tools.
Construction companies potentially vulnerable through accounting software, report says
AT&T pays $13 million FCC settlement over 2023 data breach
ggshield: Detect secret in source code, scan your repo for leaks
GitGuardian Shield: protect your secrets with GitGuardian GitGuardian shield (ggshield) is a CLI application that runs in your local environment or in a CI environment to help you detect more than 300 types of secrets,...
The post ggshield: Detect secret in source code, scan your repo for leaks appeared first on Penetration Testing Tools.
CVE-2024-46943 | OpenDaylight Authentication, Authorization and Accounting up to 0.19.3 Peer impersonation
CVE-2024-8779 | SYSCOM Group OMFLOW up to 1.2.1.2 Setting access control
CVE-2024-45694 | D-Link DIR-X5460 A1/DIR-X4860 A1 Web Service stack-based overflow
CVE-2024-46424 | TOTOLINK AC1200 T8 4.1.5cu.861_B20230220 UploadCustomModule File buffer overflow
CVE-2024-46419 | TOTOLINK AC1200 T8 4.1.5cu.861_B20230220 setWizardCfg ssid5g buffer overflow
CVE-2024-46451 | TOTOLINK AC1200 T8 4.1.5cu.861_B20230220 setWiFiAclRules desc buffer overflow
CVE-2024-39772 | Mattermost Desktop App up to 5.8.0 access control
CVE-2024-45695 | D-Link DIR-X4860 A1 1.00/1.04 Web Service stack-based overflow
catalyst: automate alert handling and incident response processes
Catalyst Catalyst is an incident response platform or SOAR (Security Orchestration, Automation, and Response) system. It can help you to automate your alert handling and incident response procedures. Features Ticket (Alert & Incident) Management...
The post catalyst: automate alert handling and incident response processes appeared first on Penetration Testing Tools.