VULNERS OPENSOURCE, Vulners Project [https://vulners.com]
esxcli storage filesystem list
esxcli storage filesystem list
| import os, psutil | |
| import random | |
| import string | |
| large_string = "".join([random.choice(string.ascii_letters + string.punctuation) for _ in range(0, 500000)]) | |
| process = psutil.Process(os.getpid()) | |
| def is_palindrome(str_array): | |
| str_array = str_array.lower() |
| #!/usr/bin/env python | |
| # -*- coding: utf-8 -*- | |
| # | |
| # VULNERS OPENSOURCE | |
| # __________________ | |
| # | |
| # Vulners Project [https://vulners.com] | |
| # All Rights Reserved. | |
| # | |
| # Exploit Title: Mikrotik exploit from Vault 7 CIA Leaks automation tool. Takeovers up to RouterOS 6.38.4. |
| #! /usr/bin/env python3.6 | |
| # -*- coding: utf-8 -*- | |
| # | |
| # VULNERS OPENSOURCE | |
| # __________________ | |
| # | |
| # Vulners Project [https://vulners.com] | |
| # All Rights Reserved. | |
| # | |
| # Author: Kir [[email protected]] |
| """ | |
| vulners_scanner.py | |
| Copyright 2018 Kir Ermakov (isox@vulners.com), Ilya Govorkov (gmedian@vulners.com) | |
| This file is part of w3af, http://w3af.org/ . | |
| w3af is free software; you can redistribute it and/or modify | |
| it under the terms of the GNU General Public License as published by | |
| the Free Software Foundation version 2 of the License. |
| Your website unpatched vulnerabilities at the Openbugbounty: | |
| [type:openbugbounty AND title:"your-domain-here.com" AND openbugbounty.patchStatus:unpatched](http://bit.ly/2d12FF9) | |
| Software vulnerabilities, Firefox as example: | |
| [affectedSoftware.name:"firefox" OR affectedPackage.packageName:"firefox" OR cpe:*firefox* order:published](http://bit.ly/2cQvJ4e) | |
| Software vulnerabilities, for exact version. Nginx 1.11.0 vulnerabilities: | |
| [affectedSoftware.name:nginx AND affectedSoftware.version:"1.11.0"](http://bit.ly/2dEX8oz) |