Category Archives: Vulnerabilities & attacks

Wafpass – Analyzing WAF Bypass Methods

WAFPASS is a tool to analyze parameters with all payloads' bypass methods, aiming at benchmark security solutions like WAF.

vscan – Vulnerability Scanner Using Nmap and NSE

vscan is a tool that puts an additional value into vulnerability scanning with nmap.

Pocsuite – Vulnerability Testing Framework

Pocsuite is an open-sourced remote vulnerability testing and proof-of-concept development framework developed by the Knownsec 404 Team

2FAssassin – Bypass Two-Factor-Authentication

2FAssassin is a tool that will help in exploiting certain misconfiguration or vulnerabilities on remote system to extract private keys from memory.

Striker – Offensive vulnerability scanner

Striker is an offensive information and vulnerability scanner that will make enumeration of remote system mostly using some online services this will make the attack not depending on user connection and it will make attacker avoid being detected or prevented

Researchers Remotely Hijack Facebook single sign-on

Single Sign-On is becoming the first way used to allow users logging into several web resources. This technology may include several vulnerabilities and here as any technology will have some advantages and disadvantages

Rakos Malware that targets IoT devices and servers under SSH

Rakos Malware that targets IoT devices and servers under SSH. Security researchers at ESET uncovered a new malware that targets IoT-devices and servers running Linux.