by Muhammad Arooj | Jul 7, 2017 | Botpicks, Digital, Hacking, Programming, Security
#!/usr/bin/python “”” Lepide Auditor Suite createdb() Web Console Database Injection Remote Code Execution Vulnerability Vendor: http://www.lepide.com/ File: lepideauditorsuite.zip SHA1: 3c003200408add04308c04e3e0ae03b7774e4120 Download:...
by Muhammad Arooj | Jul 6, 2017 | Botpicks, Hacking, Programming, Security
It’s common for modern browser exploits to attempt to transform a memory safety vulnerability into a method of running arbitrary native code on a target device. This technique is most preferred since it allows the attackers to accomplish their means with least...
by Muhammad Arooj | Jul 4, 2017 | Programming, Security
Humax Digital HG100R multiple vulnerabilities Device: Humax HG100R Software Version: VER 2.0.6 – Backup file download (CVE-2017-7315) An issue was discovered on Humax Digital HG100R 2.0.6 devices, a modem commonly used by ISPs to provide ADSL internet service to...
by Muhammad Arooj | Jul 3, 2017 | Opiniation, Programming
Ethereum – the cryptocurrency created in 2013 – has been a story of success in the crypto world. Some key events marked its ascendancy. Key technological innovations at the right time consolidated huge competitive advantages when compared to other cryptocurrencies,...
by Muhammad Arooj | Jul 3, 2017 | Programming, Security
All the programming you’d need to perform strictly machine learning related tasks you can learn “on the job”. Programming and thinking like a computer scientists are valuable skills on their own, and I think everyone should introduce themselves to...
by Muhammad Arooj | Mar 19, 2015 | Digital, Hacking, Programming, Security
Category Description [ Automation ] Automation tools and wrapper scripts [ Backdoor ] Backdoors and rootkits for kernel, userland, network, hardware and software [ Binary ] ELF and PE Binary related tools [ Cracker ] Cracker for network and software login masks [...
Recent Comments