VULNERS OPENSOURCE, Vulners Project [https://vulners.com]
esxcli storage filesystem list
esxcli storage filesystem list
import os, psutil | |
import random | |
import string | |
large_string = "".join([random.choice(string.ascii_letters + string.punctuation) for _ in range(0, 500000)]) | |
process = psutil.Process(os.getpid()) | |
def is_palindrome(str_array): | |
str_array = str_array.lower() |
#!/usr/bin/env python | |
# -*- coding: utf-8 -*- | |
# | |
# VULNERS OPENSOURCE | |
# __________________ | |
# | |
# Vulners Project [https://vulners.com] | |
# All Rights Reserved. | |
# | |
# Exploit Title: Mikrotik exploit from Vault 7 CIA Leaks automation tool. Takeovers up to RouterOS 6.38.4. |
#! /usr/bin/env python3.6 | |
# -*- coding: utf-8 -*- | |
# | |
# VULNERS OPENSOURCE | |
# __________________ | |
# | |
# Vulners Project [https://vulners.com] | |
# All Rights Reserved. | |
# | |
# Author: Kir [[email protected]] |
""" | |
vulners_scanner.py | |
Copyright 2018 Kir Ermakov ([email protected]), Ilya Govorkov ([email protected]) | |
This file is part of w3af, http://w3af.org/ . | |
w3af is free software; you can redistribute it and/or modify | |
it under the terms of the GNU General Public License as published by | |
the Free Software Foundation version 2 of the License. |
Your website unpatched vulnerabilities at the Openbugbounty: | |
[type:openbugbounty AND title:"your-domain-here.com" AND openbugbounty.patchStatus:unpatched](http://bit.ly/2d12FF9) | |
Software vulnerabilities, Firefox as example: | |
[affectedSoftware.name:"firefox" OR affectedPackage.packageName:"firefox" OR cpe:*firefox* order:published](http://bit.ly/2cQvJ4e) | |
Software vulnerabilities, for exact version. Nginx 1.11.0 vulnerabilities: | |
[affectedSoftware.name:nginx AND affectedSoftware.version:"1.11.0"](http://bit.ly/2dEX8oz) |