Skip to content
  • 0 Votes
    1 Posts
    0 Views
    pentesttools@infosec.exchangeP
    CVE-2026-41940 was exploited for 64 days before a patch existed. First attack: Feb 23. Advisory: Apr 28.After disclosure, 15,448 cPanel hosts in malicious activity on May 1 alone. Ransomware and a Mirai botnet running in parallel. CVSS 9.8. CISA KEV.We built a free scanner. No account needed.https://pentest-tools.com/network-vulnerability-scanning/cve-2026-41940-scanner-cpanel-authentication-bypass#infosec #pentesting #vulnerabilitymanagement
  • 🛠️ Tool

    Uncategorized osint recon pentesting
    1
    0 Votes
    1 Posts
    3 Views
    hasamba@infosec.exchangeH
    ----------------️ Tool===================Opening: Claude-OSINT is a paired set of Claude skills intended to operationalize offensive reconnaissance inside a Claude skills environment. The project bundles a methodology skill (osint-methodology) and a tactical skill (offensive-osint) to provide structured tradecraft, scoring rules, and probe paths tailored for authorized red-team and bug-bounty engagements.Key Features:• Modular skills: Two self-contained SKILL.md files that prime Claude for strategy and tactics respectively.• Broad coverage: ~5,500 lines of tradecraft, 90+ recon modules, 48 secret-regex patterns, 80+ dorks, 9 read-only credential validators, and 27 attack-path templates.• Recon capabilities: Subdomain discovery stacks (crt.sh + fallback), Wayback/CDX deep mining, WHOIS/RDAP pivots, bulk IP→ASN mappings, and public-records pivots such as OpenCorporates and SEC EDGAR.• Identity & SSO mapping: Fingerprinting and enumeration for Microsoft Entra/M365, Okta tenant slugs, ADFS metadata, Google Workspace OIDC discovery, and generic OIDC/SAML paths.• App surface discovery: Swagger/OpenAPI discovery paths, GraphQL discovery and field-enumeration strategies, always-on HTTP checks (common sensitive files and endpoints), and security header audits.Technical Implementation:• The repository structure centers on skills/ containing SKILL.md files that encode prompts, heuristics, regexes and scoring rules, plus a small standard-library-only secret_scan.py for local secret scanning.• The approach is to supply Claude with structured tradecraft (procedural steps, regex tiers, payload ideas, and scoring thresholds) rather than a runnable scanner binary.Use Cases:• Red-team external recon phases with time-budgeted pipelines (1h/4h/1d/1w).• Bug-bounty reconnaissance to enumerate SSO, open APIs, and legacy backups using crafted dorks and regexes.• Augmenting human analysts by surfacing prioritized attack paths and identity pivots.Limitations:• The repository provides methodology and prompting artifacts rather than turnkey scanning infrastructure; operationalization requires an authorized Claude skills environment.• No active exploitation tooling is included; focus remains on discovery, mapping, and validation primitives. tool #osint #recon #pentesting Source: https://github.com/elementalsouls/Claude-OSINT
  • 0 Votes
    1 Posts
    2 Views
    matchasecurity@infosec.exchangeM
    HTB Sau Walkthrough Learn how to:- Perform SSRF in request-baskets- Exploit Command Injection in Maltrail️Watch it here:https://www.youtube.com/watch?v=wNkrm_PSsQU#HTB #HackTheBox #OSCP #Pentesting #EthicalHacking #Cybersecurity #RedTeam #CTF
  • 0 Votes
    1 Posts
    1 Views
    matchasecurity@infosec.exchangeM
    HTB Servmon Walkthrough Learn how to:- Perform directory traversal in NVMS-1000- Exploit NSClient++ for privilege escalation- Use Ligolo for port forwarding️Watch it here:https://www.youtube.com/watch?v=2-cfwUNRHT4#HTB #HackTheBox #OSCP #Pentesting #EthicalHacking #Cybersecurity #RedTeam #CTF
  • 0 Votes
    1 Posts
    3 Views
    technadu@infosec.exchangeT
    The sentencing of Nicholas Moore (one-year probation) serves as a case study in credential-based breaches. By compromising one set of credentials, Moore gained access to the U.S. Supreme Court, AmeriCorps, and the VA."This highlights the persistent danger of "low-effort" entry points into high-value targets.How are your organizations hardening against credential stuffing and lateral movement in the public sector?Source: https://techcrunch.com/2026/04/17/man-who-hacked-us-supreme-court-filing-system-sentenced-to-probation/ Engage with us in the thread. Follow for more technical breakdowns and vulnerability news.#InfoSec #Pentesting #OpSec #GovWare #CyberLaw #Technadu
  • 0 Votes
    1 Posts
    1 Views
    matchasecurity@infosec.exchangeM
    HTB UpDown Walkthrough Learn how to perform:- Upload filter bypass- Local File Inclusion (LFI)️Watch it here:https://www.youtube.com/watch?v=kzQx0MdKG4c#HTB #HackTheBox #OSCP #Pentesting #EthicalHacking #Cybersecurity #RedTeam #CTF
  • Am 08.05.

    Uncategorized tschunk hacking pentesting cybersecurity infosec
    2
    0 Votes
    2 Posts
    1 Views
    lennybacon@infosec.exchangeL
    @kpwn Da is ein Leerzeichen. Ist das Absicht?