Translated ['generic-methodologies-and-resources/search-exploits.md'] to

This commit is contained in:
Translator 2024-09-15 15:25:04 +00:00
parent 7f6565c594
commit bb3ad13690

View file

@ -63,20 +63,23 @@ Hii inatafuta exploits katika hifadhidata nyingine: [https://sploitus.com/](http
### Sploitify ### Sploitify
Orodha iliyochaguliwa kama GTFOBins ya exploits yenye filters kwa aina ya udhaifu (Local Privilege Escalation, Remote Code execution, nk), aina ya huduma (Web, SMB, SSH, RDP, nk), OS na maabara za mazoezi (viungo kwa mashine ambapo unaweza kucheza na sploits): [https://sploitify.haxx.it](https://sploitify.haxx.it) Orodha iliyochaguliwa kama GTFOBins ya exploits yenye vichujio kwa aina ya udhaifu (Local Privilege Escalation, Remote Code execution, nk), aina ya huduma (Web, SMB, SSH, RDP, nk), OS na maabara za mazoezi (viungo kwa mashine ambapo unaweza kucheza na sploits): [https://sploitify.haxx.it](https://sploitify.haxx.it)
### search_vulns
search_vulns inakuwezesha kutafuta udhaifu na exploits zinazojulikana pia: [**https://search-vulns.com/**](https://search-vulns.com/). Inatumia vyanzo mbalimbali vya data kama NVD, Exploit-DB, PoC-in-GitHub, hifadhidata ya Usalama ya GitHub na endoflife.date.
<figure><img src="../.gitbook/assets/image (48).png" alt=""><figcaption></figcaption></figure> <figure><img src="../.gitbook/assets/image (48).png" alt=""><figcaption></figcaption></figure>
\ \
Tumia [**Trickest**](https://trickest.com/?utm_source=hacktricks&utm_medium=text&utm_campaign=ppc&utm_content=search-exploits) kujenga na **kujiendesha** kwa urahisi kazi zinazotumiwa na zana za jamii **zilizoendelea zaidi** duniani.\ Tumia [**Trickest**](https://trickest.com/?utm_source=hacktricks&utm_medium=text&utm_campaign=ppc&utm_content=search-exploits) kujenga na **kuandaa kazi** kwa urahisi zinazotolewa na zana za jamii **za kisasa zaidi** duniani.\
Pata Ufikiaji Leo: Pata Ufikiaji Leo:
{% embed url="https://trickest.com/?utm_source=hacktricks&utm_medium=banner&utm_campaign=ppc&utm_content=search-exploits" %} {% embed url="https://trickest.com/?utm_source=hacktricks&utm_medium=banner&utm_campaign=ppc&utm_content=search-exploits" %}
{% hint style="success" %} {% hint style="success" %}
Jifunze & fanya mazoezi ya AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\ Jifunze na fanya mazoezi ya AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
Jifunze & fanya mazoezi ya GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte) Jifunze na fanya mazoezi ya GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
<details> <details>