Find Stored XSS & HTML Injections EasilyThis is a short tutorial to find stored XSS & HTML Injections easily. HTML injections occur when input isn’t sanitized to check or remove…Jan 12, 2023Jan 12, 2023
WordPress User Meta Lite / Pro 2.4.3 Suffers Path Traversal ExploitMore @ https://skynettools.com Currently the WordPress Plugin User Meta 2.4.3, both Lite and Pro is vulnerable to a Path Traversal…Jun 1, 2022Jun 1, 2022
Free Online Hash Cracking WebsitesCracking password hashes on your own without the proper hardware can become time-consuming and tedious. Luckily for those capped by their…Jan 10, 2022Jan 10, 2022
Basic Tips to Secure Microsoft Windows IIS ServerOriginal Link : https://skynettools.com/basic-tips-to-secure-microsoft-windows-iis-server/Jan 10, 2022Jan 10, 2022
Malware Backdoor.Win32.Zdemon.10 Vulnerable To Remote Command Execution (RCE)More @ https://skynettools.comAug 10, 2021Aug 10, 2021
Traitor — Automatically Exploit Low-Hanging Fruit For A Root Shell.Traitor packages up a bunch of methods to exploit local misconfigurations and vulnerabilities (including most of GTFOBins) in order to pop…Jun 21, 2021Jun 21, 2021
Polkit Version 0.105–26 0.117–2 Suffers a Local Privilege EscalationMore @ https://skynettools.com/Jun 17, 2021Jun 17, 2021
HostHunter v1.5 — Discover & Extract Hostnames Providing a Large Set of Target IP AddressesMay 26, 2021May 26, 2021