mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-22 04:33:28 +00:00
Translated ['generic-methodologies-and-resources/search-exploits.md'] to
This commit is contained in:
parent
7f6565c594
commit
bb3ad13690
1 changed files with 7 additions and 4 deletions
|
@ -63,20 +63,23 @@ Hii inatafuta exploits katika hifadhidata nyingine: [https://sploitus.com/](http
|
|||
|
||||
### Sploitify
|
||||
|
||||
Orodha iliyochaguliwa kama GTFOBins ya exploits yenye filters kwa aina ya udhaifu (Local Privilege Escalation, Remote Code execution, nk), aina ya huduma (Web, SMB, SSH, RDP, nk), OS na maabara za mazoezi (viungo kwa mashine ambapo unaweza kucheza na sploits): [https://sploitify.haxx.it](https://sploitify.haxx.it)
|
||||
Orodha iliyochaguliwa kama GTFOBins ya exploits yenye vichujio kwa aina ya udhaifu (Local Privilege Escalation, Remote Code execution, nk), aina ya huduma (Web, SMB, SSH, RDP, nk), OS na maabara za mazoezi (viungo kwa mashine ambapo unaweza kucheza na sploits): [https://sploitify.haxx.it](https://sploitify.haxx.it)
|
||||
|
||||
### search_vulns
|
||||
|
||||
search_vulns inakuwezesha kutafuta udhaifu na exploits zinazojulikana pia: [**https://search-vulns.com/**](https://search-vulns.com/). Inatumia vyanzo mbalimbali vya data kama NVD, Exploit-DB, PoC-in-GitHub, hifadhidata ya Usalama ya GitHub na endoflife.date.
|
||||
|
||||
<figure><img src="../.gitbook/assets/image (48).png" alt=""><figcaption></figcaption></figure>
|
||||
|
||||
\
|
||||
Tumia [**Trickest**](https://trickest.com/?utm_source=hacktricks&utm_medium=text&utm_campaign=ppc&utm_content=search-exploits) kujenga na **kujiendesha** kwa urahisi kazi zinazotumiwa na zana za jamii **zilizoendelea zaidi** duniani.\
|
||||
Tumia [**Trickest**](https://trickest.com/?utm_source=hacktricks&utm_medium=text&utm_campaign=ppc&utm_content=search-exploits) kujenga na **kuandaa kazi** kwa urahisi zinazotolewa na zana za jamii **za kisasa zaidi** duniani.\
|
||||
Pata Ufikiaji Leo:
|
||||
|
||||
{% embed url="https://trickest.com/?utm_source=hacktricks&utm_medium=banner&utm_campaign=ppc&utm_content=search-exploits" %}
|
||||
|
||||
{% hint style="success" %}
|
||||
Jifunze & fanya mazoezi ya AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
||||
Jifunze & fanya mazoezi ya GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
||||
Jifunze na fanya mazoezi ya AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
||||
Jifunze na fanya mazoezi ya GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
||||
|
||||
<details>
|
||||
|
||||
|
|
Loading…
Reference in a new issue