Sign in to follow this
Followers
0

whatsapp FakesApp: A Vulnerability in WhatsApp
By
dEEpEst, in Bugs & Exploits
-
Similar Content
-
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. WordPress Delivery Plugins
MyDelivery WordPress
Delivery on WhatsApp
Receive complete delivery orders directly on your WhatsApp.
Easy, fast and complete!
Hidden Content
Give reaction to this post to see the hidden content.
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. More than 1 billion people in over 180 countries use WhatsApp. WordPress WhatsApp Support plugin provides better and easy way to communicate visitors and customers directly to your support person. It runs on your own WordPress site, allowing you full control over your support via WhatsApp.
Hidden Content
Give reaction to this post to see the hidden content.
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. WPrecon (WordPress Recon)
Wprecon (WordPress Recon), is a vulnerability recognition tool in CMS WordPress, 100% developed in Go.
Features
Detection WAF
Fuzzing Backup Files
Fuzzing Passwords
Random User-Agent
Plugin(s) Enumerator
Theme(s) Enumerator
Scripts
Tor Proxy
User(s) Enumerator
Vulnerability Version Checking (Beta)
Changelog v1.0 alpha
New:
Scripts in LUA 🌑
Vuln Scan (Beta)
Passive Mode User(s) Enumeration
Aggressive Mode User(s) Enumeration
Passive Mode Plugin(s) Enumeration
Aggressive Mode Plugin(s) Enumeration
Passive Mode Theme(s) Enumeration
Aggressive Mode Theme(s) Enumeration
Auto Finding Important File(s)
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. Wprecon (WordPress Recon), is a vulnerability recognition tool in CMS WordPress, 100% developed in Go.
Features
Status Features
✅ Random Agent
✅ Detection WAF
✅ User Enumerator
✅ Plugin Scanner
✅ Theme Scanner
✅ Tor Proxy’s
✅ Detection Honeypot
❌ Vulnerability Scanner
❌ Admin Finder
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. Sub 404 is a tool written in python which is used to check the possibility of subdomain takeover vulnerability and it is fast as it is Asynchronous.
Why
During the recon process, you might get a lot of subdomains(e.g more than 10k). It is not possible to test each manually or with traditional requests or the urllib method as it is very slow. Using Sub 404 you can automate this task in a much faster way. Sub 404 uses aiohttp/asyncio which makes this tool asynchronous and faster.
How it works
Sub 404 uses subdomains list from a text file and checks for url of 404 Not Found status code and in addition, it fetches CNAME(Canonical Name) and removes those URL which has target domain name in CNAME. It also combines results from subfinder and sublist3r(subdomain enumeration tool) if you don’t have target subdomains as two is better than one. But for this sublist3r and subfinder tools must be installed in your system. Sub 404 is able to check 7K subdomains in less than 5 minutes.
Key Features:
– Fast( as it is Asynchronous)
– Uses two more tool to increase efficiency
– Saves result in a text file for future reference
– Umm that’s it, nothing much!
Hidden Content
Give reaction to this post to see the hidden content.
-