Commit 0aba26c6 authored by Alessandro Tanasi's avatar Alessandro Tanasi

Added more tools

parent c9a6c732
......@@ -1462,3 +1462,6 @@
[submodule "Intelligence/shodan-seeker"]
path = Intelligence/shodan-seeker
url = https://github.com/laincode/shodan-seeker.git
[submodule "Penetration Testing/Exploits/qemu-vm-escape"]
path = Penetration Testing/Exploits/qemu-vm-escape
url = https://github.com/Kira-cxy/qemu-vm-escape.git
Subproject commit e46e37e25616e4140ce26492443928e461c9a1d6
......@@ -470,6 +470,7 @@ Exploits
- `ES File Explorer Open Port Vulnerability <https://github.com/fs0c131y/ESFileExplorerOpenPortVuln>`_ - ES File Explorer Open Port Vulnerability - CVE-2019-6447.
- `HolicPOC <https://github.com/leeqwind/HolicPOC>`_ - CVE-2015-2546, CVE-2016-0165, CVE-2016-0167, CVE-2017-0101, CVE-2017-0263, CVE-2018-8120.
- `Jira-Scan <https://github.com/random-robbie/Jira-Scan>`_ - Jira scanner for CVE-2017-9506.
- `Qemu-vm-escape <https://github.com/Kira-cxy/qemu-vm-escape>`_ - This is an exploit for CVE-2019-6778, a heap buffer overflow in slirp:tcp_emu().
- `MS17-010 <https://github.com/worawit/MS17-010>`_ - Exploits for MS17-010.
- `Ruby-advisory-db <https://github.com/rubysec/ruby-advisory-db>`_ - A database of vulnerable Ruby Gems.
- `The Exploit Database <https://github.com/offensive-security/exploit-database>`_ - The official Exploit Database repository.
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment