Explore >> Select a destination


You are here

blog.g0tmi1k.com
| | linuxsecurityblog.com
4.9 parsecs away

Travel
| | Metasploit is a popular exploitation framework that has seen plenty of coverage on ethicalhacker.net. This article introduces Armitage, a new GUI for Metasploit built around the hacking process. Today, I will show you how to use Armitage to scan a Linux host, find the right exploit, exploit the host, and handle post-exploitation. By following this...
| | taeluralexis.com
3.9 parsecs away

Travel
| | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies.
| | eapolsniper.github.io
4.7 parsecs away

Travel
| | [AI summary] The blog post discusses a critical security vulnerability in Splunk Universal Forwarders, allowing attackers to exploit weak passwords and API access to gain SYSTEM or root privileges on networked systems.
| | www.code-intelligence.com
30.3 parsecs away

Travel
| A dynamic stack buffer overflow vulnerability in the Abseil C++ library (abseil-cpp) was autonomously identified through AI-enhanced fuzz testing using CI Fuzz's AI Test Agent. Learn more in this blog.