[webapps] Landa Driving School Management System 2.0.1 – Arbitrary File Upload
Landa Driving School Management System 2.0.1 – Arbitrary File Upload
Landa Driving School Management System 2.0.1 – Arbitrary File Upload
Whatfiles is a Linux utility that logs what files another program reads/writes/creates/deletes on your system. It traces any new processes and threads that are created by the targeted process as well. Rationale: I’ve long been frustrated at the lac…
Scans web applications for second-order subdomain takeover by crawling the app, and collecting URLs (and other data) that match certain rules, or respond in a certain way. Installation From binary Download a prebuilt binary from the releases page …
Not all data privacy rights are the same. Do you know what your rights are, and what tools should you be using to stay private online?
Categories: Privacy Tags: Data privacydata privacy daydata privacy lawdata privacy lawsdata privacy legislationdata privacy weekprivate browserprivate searchprivate search enginetorTor browserTor networkvirtual private networkvirtual private networksvpn |
The post Data Privacy Day: Know your rights, and the right tools to stay private appeared first on Malwarebytes Labs.
This repository contains a PowerShell module for detecting artifacts that may be indicators of UNC2452 and other threat actor activity. Some indicators are “high-fidelity” indicators of compromise, while other artifacts are so called “dual-use” artif…
Latest analysis into the wiper malware that targeted dozens of Ukrainian agencies earlier this month has revealed “strategic similarities” to NotPetya malware that was unleashed against the country’s infrastructure and elsewhere in 2017.
The malware, …
Pwndora is a massive and fast IPv4 address range scanner, integrated with multi-threading. Using sockets, it analyzes which ports are open, and collects more information about targets, each result is stored in Elasticsearch. You can integrate with K…
An active espionage campaign has been attributed to the threat actor known as Molerats that abuses legitimate cloud services like Google Drive and Dropbox to host malware payloads and for command-and-control and the exfiltration of data from targets a…
In yet another instance of software supply chain attack, dozens of WordPress themes and plugins hosted on a developer’s website were backdoored with malicious code in the first half of September 2021 with the goal of infecting further sites.
The backd…
Researchers have disclosed details of two critical security vulnerabilities in Control Web Panel that could be abused as part of an exploit chain to achieve pre-authenticated remote code execution on affected servers.
Tracked as CVE-2021-45467, the is…