Detecting ATM skimmer







Linux exploit suggester

https://github.com/mzet-/linux-exploit-suggester



Supported vulnerability:
CVE-2004-1235
CVE-2004-0077
CVE-2006-2451
CVE-2006-3626
CVE-2008-0600
CVE-2008-4210
CVE-2009-2692
CVE-2009-1895
CVE-2009-2698
CVE-2009-3547
CVE-2010-3301
CVE-2010-1146
CVE-2010-2959
CVE-2010-3904
CVE-2010-3848
CVE-2010-3850
CVE-2010-4073
CVE-2010-4347
CVE-2010-3437
CVE-2010-3081
CVE-2012-0056
CVE-2010-3849
CVE-2010-3850
CVE-2013-1858
CVE-2013-2094
CVE-2013-0268
CVE-2013-1959
CVE-2013-1979
CVE-2014-0038
CVE-2014-0196
CVE-2014-2851
CVE-2014-4014
CVE-2014-4699
CVE-2014-4943
CVE-2014-5207
CVE-2015-9322
CVE-2015-3290
CVE-2015-1328
CVE-2015-8660
CVE-2016-0728
CVE-2016-2384
CVE-2016-5195
CVE-2016-8655

#####Userspace#######
CVE-2004-0186
CVE-2009-1185
CVE-2010-0832
CVE-2011-1485
CVE-2012-0809
CVE-2014-0476
CVE-2014-5119
CVE-2015-1862
CVE-2015-3315
CVE-2015-1318
CVE-2015-3202
CVE-2015-1815
CVE-2015-3246
CVE-2015-6565
CVE-2016-1240
CVE-2016-1247
CVE-2016-1531
CVE-2016-4989
CVE-2016-5425
CVE-2016-6662
CVE-2016-6663
CVE-2016-6664
CVE-2016-9566

Dirty COW (CVE-2016-5195)

https://dirtycow.ninja/
Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel
The bug has existed since around 2.6.22 (released in 2007) and was fixed on Oct 18, 2016
If you have any device running a Linux kernel higher than 2.6.22, there’s a good chance that you are vulnerable. The same goes for all versions of Android whether they come from Samsung, Google, Cyanogen, MIUI, or other vendors because they have not yet issued security updates.
In order to exploit this vulnerability, the attacker needs to run code in the affected device, which in Android’s case can be done via the Android Debug Bridge (ADB) over USB or by installing an app that makes use of the exploit.



[Project List]1st year of college

[Project]Knowledge Base

Currently for private use only

[Project]ZLmenu

This is intended to be a linux menubar for windows, but I am too lazy to release it so it is now for private use only





How to find hidden cameras

Powered by Blogger.
Warning: include(4.php) [function.include]: failed to open stream: No such file or directory in PATH on line 3

Microsoft SQL Native Client error '80040e14
Unclosed quotation mark after the character string
Query failed: ERROR: syntax error at or near \"'\" at character 56 in home/www/regs/home.php on line 121.
SQLSTATE: 42000 (ER_SYNTAX_ERROR) You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use
ORACLE-00933: SQL command not properly ended
function antiscanner($antiscanner)
{
return \$antiscanner;
}
\"/usr/local/bin\"
\"c:/www/regs/home\"
define( 'DB_NAME', 'database' );
define( 'DB_USER', 'www.localhost.com' );
define( 'DB_PASSWORD', 'antiscanner' );
define( 'DB_HOST', 'localhost' );
define( 'DB_CHARSET', 'utf8' );
root:!:0:0::/:/usr/bin/ksh daemon:!:1:1::/etc:bin:!:2:2::/bin:sys:!:3:3::/usr/sys: adm:!:4:4::/var/adm:uucp:!:5:5::/usr/lib/uucp: guest:!:100:100::/home/guest:
SomeCustomInjectedHeader:injected_by_wvs
PROJECTS
Raven
DevAssistant
Pascal Trainer
Meow encoder 0.2
PROJECT LIST
TOOLS
Hacking
Forensic
Developer tools
Reverse engineering
APP LIST
DOCUMENTS
Hacking
Metasploit
Coding
Web development
SOURCE CODE
C#, VB.NET C++ Delphi VB6
Python PHP Perl Bash Batch
HTML, CSS, Javascript
Autoit AHK