The Alloggio Membership plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.2. This is due to the plugin not properly validating a user's identity through the alloggio_membership_init_rest_api_facebook_login and alloggio_membership_init_rest_api_google_login functions. This makes it possible for unauthenticated attackers to log in as any user, including administrators, without knowing a password.
#TOOL

Tools and Techniques for Red Team / Penetration Testing.

This calculator returns a variety of information regarding Internet Protocol version 4 (IPv4) and IPv6 subnets including possible network addresses, usable host ranges, subnet mask, and IP class, among others.

Website scanner for suspicious and malicious URLs

Defuse Security. Home of PIE Bin, TRENT, and more...

A subdomain finder is a tool used to find the subdomains of a given domain.

Analyze suspicious emails with Tines & urlscan. Forward a suspicious email (or an .eml attachment) to scan@phish.ly, Tines will automatically analyze the URLs with urlscan and send you a report.

At Objective-See our goal is simple, create free open-source security tools for macOS!

A portable multi-tool for pentesters and geeks in a toy-like body. It loves hacking digital stuff, such as radio protocols, access control systems, hardware, and more. It's fully open-source and customizable, so you can extend it in whatever way you like.

Canarytokens is a free tool that helps you discover you’ve been breached by having attackers announce themselves.

A vast collection of security tools.

The Most Popular & Fastest Growing Open Source Security Projects on GitHub.

The quick and simple editor for cron schedule expressions by Cronitor.

The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis.

Hacking Tools & Media

All in One Hacking tool For Hackers

Leading source of security tools, hacking tools, cybersecurity and network security. Learn about new tools and updates in one place.

The DNA test for websites.

The web application vulnerabilities index lists vulnerabilities according to its severity and is classified by the compliance standard it falls under.

Pentest List is a curation of the latest top-rated tools and content in penetration testing and security defense. Discover cutting-edge tools, blogs, and more, covering port scanning, SQL injection, and a wide range of other vulnerability exploits.

The Ultimate Cybersecurity Resource List. A curated directory of cybersecurity tools and resources for infosec professionals.

A resource containing all the tools each ransomware gangs uses.

We offer robust APIs & data services for Security Teams worldwide.