🎯 An upgraded-ARP-Poisoning attack can be directed at “cheating” a host computer or a network router. If a router has the wrong MAC address for a given IP address, then all communications are routed to the wrong host. ☠️ What is ARP-Poisoning? ARP Poisoning (also known as ARP Spoofing) is a type of cyber attack... Continue Reading →
BT-ddos-tool:
BT-ddos-tool
Token API Password Generator tool:
This python based tool help you to generate random token, API key & password with multi function features. Also you can use this tool as buffer overflow code generator. :: Token :: 1. In networking, a token is a series of bits that circulate on a token-ring network. When one of the systems on the network has the... Continue Reading →
Hack the box invite_code_generator:
https://www.hackthebox.eu/ This tool helps you to generate Hack The Box :: site invite codes easily, automatically & unlimited times. Code Written in ==>> PYTHON :: Installation :: # Installation for linux 1) pip install requests or pip3 install requests 2) sudo chmod +x * 3) sudo ./hack-the-box-Linux * Follow in tool instruction # Installation for... Continue Reading →
Byte Code Encrypter-Decrypter Tool:
This tool made for Security purposes only. You can encrypt Any file & any size. Also I provide a decrypt tool for Decrypt your byte code encrypted file with a key. Also I'm using Byte code Encryption for encrypt file in this tool. The Secret key you can choose when you encrypting your file but... Continue Reading →
PHP Scripts Mall Amazon Affiliate Store 2.1.6 allows Parameter Tampering of the payment amount:[CVE-2019-9864]
strong>Vulnerability Description => Parameter tampering is a form of Web-based attack in which certain parameters in the Uniform Resource Locator (URL) or Web page form field data entered by a user are changed without that user's authorization. ↡ ↡ ↡ ↡ How to Exploit ↡ ↡ ↡ ↡ 1. Go to Amazon Affiliate Store site... Continue Reading →
PHP Scripts Mall Chartered Accountant : Auditor Website has Buffer Overflow:
Vulnerability Description => A buffer overflow occurs when a program or process attempts to write more data to a fixed length block of memory, or buffer, than the buffer is allocated to hold. Since buffers are created to contain a defined amount of data, the extra data can overwrite data values in memory addresses adjacent... Continue Reading →
PHP Scripts Mall Multilanguage Real Estate MLM Script has Stored Cross-site Scripting (XSS) in edit my profile:
Vulnerability Description => Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy. ↡ ↡ ↡ ↡ How... Continue Reading →
PHP Scripts Mall Multilanguage Real Estate MLM Script has Cross-Site Request Forgery (CSRF):
Vulnerability Description => Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated. CSRF attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request. ↡ ↡ ↡... Continue Reading →
PHP Scripts Mall Consumer Complaints Clone Script has Stored Cross-site Scripting (XSS) in edit my profile:
Vulnerability Description=> Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these... Continue Reading →