Search the Community
Showing results for tags 'v3.5.1'.
-
Penetration testing utility. The goal is to use this tool when access to some Windows OS features through GUI is restricted. Capabilities: invoke the Command Prompt and PowerShell, use Windows Management Instrumentation (WMI), connect to a remote host, run a new process, terminate a running process, dump a process memory, inject a bytecode into a running process, inject a DLL into a running process, list DLLs of a running process, install a hook procedure, enable access token privileges, duplicate the access token of a running process, download a file, add a registry key, schedule a task, list unquoted service paths and restart a running service, replace System32 files. Changelog v3.5.1 Added process hollowing. File read and write update. Added bytecode and DLL injection through an asynchronous procedure call (APC). [hide][Hidden Content]]
-
WPScan 3.5.1 – New Features & Fixes Support of Ruby 2.3 removed as its supported ended Fixes a regression in the users detection Default user agent list now handled by the related CLI option, rather than ‘hardcoded’ in the CMSScanner::Browser – Fixes #1328 (caused by using –random-user-agent on the first DB update) Dev Stuff: Parsed options are now accessible the ParsedCli class from everywhere, rather than just the controllers [HIDE][Hidden Content]]