Open in app

Sign In

Write

Sign In

SkyNet Tools
SkyNet Tools

15 Followers

Home

About

Jan 12

Find Stored XSS & HTML Injections Easily

This is a short tutorial to find stored XSS & HTML Injections easily. HTML injections occur when input isn’t sanitized to check or remove code thus, allowing potentially malicious code to execute on a web page. 1. On a search engine such as Google, search, site:target.com inurl:”contact” | inurl:”contact-us” |…

Bug Bounty

1 min read

Find Stored XSS & HTML Injections Easily
Find Stored XSS & HTML Injections Easily
Bug Bounty

1 min read


Jun 1, 2022

WordPress User Meta Lite / Pro 2.4.3 Suffers Path Traversal Exploit

More @ https://skynettools.com Currently the WordPress Plugin User Meta 2.4.3, both Lite and Pro is vulnerable to a Path Traversal Exploit. Updating to the latest version will solve the issue. RCE Security Advisory https://www.rcesecurity.com 1. ADVISORY INFORMATION ======================= Product: User Meta Vendor URL: https://wordpress.org/plugins/user-meta Type…

Bug Bounty

2 min read

Bug Bounty

2 min read


Jan 10, 2022

Free Online Hash Cracking Websites

Cracking password hashes on your own without the proper hardware can become time-consuming and tedious. Luckily for those capped by their hardware a variety of free sites have arisen over the years. https://crackstation.net/ — They support hashes such as LM, NTLM, md2, md4, md5, md5(md5_hex), md5-half, sha1, sha224, sha256, sha384…

Cryptography

2 min read

Free Online Hash Cracking Websites
Free Online Hash Cracking Websites
Cryptography

2 min read


Jan 10, 2022

Basic Tips to Secure Microsoft Windows IIS Server

Stable software updates whether it be on client machines or servers they are very essential. Having the machine upon the current patches and updates will close the window of vulnerability an attacker may have with an unpatched system. Removing unnecessary applications and services. If one has a home with two…

Windows

2 min read

Basic Tips to Secure Microsoft Windows IIS Server
Basic Tips to Secure Microsoft Windows IIS Server
Windows

2 min read


Aug 10, 2021

Malware Backdoor.Win32.Zdemon.10 Vulnerable To Remote Command Execution (RCE)

More @ https://skynettools.com The malware Zdemon listens on TCP ports 31556, 6051. Third-party attackers who can reach infected systems can execute commands made available by the backdoor. Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/d12f38e959d70af76fd263aa1933033c.txt Contact: malvuln13@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.Zdemon.10 Vulnerability: Unauthenticated Remote Command Execution Description: Zdemon malware listens on TCP…

Hacking

3 min read

Hacking

3 min read


Jun 21, 2021

Traitor — Automatically Exploit Low-Hanging Fruit For A Root Shell. Linux Privilege Escalation Made Easy

Traitor packages up a bunch of methods to exploit local misconfigurations and vulnerabilities (including most of GTFOBins) in order to pop a root shell. It’ll exploit most sudo privileges listed in GTFOBins to pop a root shell, as well as exploiting issues like a writable docker.sock, or the recent polkit…

Linux

2 min read

Traitor — Automatically Exploit Low-Hanging Fruit For A Root Shell.
Traitor — Automatically Exploit Low-Hanging Fruit For A Root Shell.
Linux

2 min read


Jun 17, 2021

Polkit Version 0.105–26 0.117–2 Suffers a Local Privilege Escalation

Polkit Version 0.105–26 0.117–2 Suffers a Local Privilege Escalation (LPE) exploit. This exploit allows an unprivileged user to gain root access to the Linux system. Updating the system is recommended to avoid exploitation. More @ https://skynettools.com/ # Exploit Title: Polkit 0.105-26 0.117-2 - Local Privilege Escalation # Date: 06/11/2021 # Exploit Author…

Exploitation

2 min read

Exploitation

2 min read


Jun 17, 2021

pyWhat — Identify Useful Information Within Files & Text

More @ https://skynettools.com/ Imagine this: You come across some mysterious text

Information Gathering

3 min read

pyWhat — Identify Useful Information Within Files & Text
pyWhat — Identify Useful Information Within Files & Text
Information Gathering

3 min read


May 26, 2021

HostHunter v1.5 — Discover & Extract Hostnames Providing a Large Set of Target IP Addresses

A tool to efficiently discover and extract hostnames providing a large set of target IP addresses. HostHunter utilises simple OSINT techniques to map IP addresses with virtual hostnames. It generates a CSV or TXT file containing the results of the reconnaissance. Latest version of HostHunter also takes screenshots of the…

Pentesting

2 min read

HostHunter v1.5 — Discover & Extract Hostnames Providing a Large Set of Target IP Addresses
HostHunter v1.5 — Discover & Extract Hostnames Providing a Large Set of Target IP Addresses
Pentesting

2 min read


May 7, 2021

Vulnnr — Vulnerability Scanner & Auto Exploiter

Create a target list or select one target, scans then exploits, done! Vulnnr is a Vulnerability Scanner & Auto Exploiter You can use this tool to check the security by finding the vulnerability in your website or you can use this tool to Get Shells Offers LFI Scanners > Coming soon XSS…

Infosec

2 min read

Vulnnr — Vulnerability Scanner & Auto Exploiter
Vulnnr — Vulnerability Scanner & Auto Exploiter
Infosec

2 min read

SkyNet Tools

SkyNet Tools

15 Followers

Providing the Latest #Infosec #News, #Tools, and #Exploits https://skynettools.com

Following
  • Shahmeer Amir

    Shahmeer Amir

  • Orwa Atyat

    Orwa Atyat

  • Vickie Li

    Vickie Li

  • Aditya Shende

    Aditya Shende

  • Bugbounty Surveys 📊

    Bugbounty Surveys 📊

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech