A vulnerability has been found in PHPGurukul Restaurant Table Booking System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/profile.php. The manipulation of the argument mobilenumber leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

ALL

5

Illuminate the reputation behind an email address.

Explore more than 866 billion web pages saved over time.

A dashboard for monitoring ransomware groups, threat intelligence.

Ransomware.live monitors the extortion sites used by ransomware groups. The information posted on this website is dynamically updated in near real-time.

Ransomwatch trails the extortion sites used by ransomware groups and surfaces an aggregated feed of claims.

Tools and Techniques for Red Team / Penetration Testing.

Explore security resources, trends and updates, media, podcast episodes, and more.

Defuse Security. Home of PIE Bin, TRENT, and more...

Stay informed and empowered with Forcepoint Security Insights. Gain valuable knowledge and insights into the ever-evolving world of cybersecurity.

Explore GreyNoise Intelligence with industry-leading analysis, product tips, and emerging research in our ongoing Cybersecurity Blog.

The ATLAS Matrix shows the progression of tactics used in attacks as columns from left to right, with ML techniques belonging to each tactic below. & indicates an adaption from ATT&CK.

A one stop shop for AI security education. Use Nightfall's growing library to learn new concepts evolving in today's world of artificial intelligence or refresh yourself on AI security's core topics.

Discover the latest trends in data loss prevention and information security. Gain insights from thought leaders and industry experts.

GitHub public repositories matching the '#hacking' topic.

Get the latest news, insights and updates from bot experts from the Netacea blog.

The list of research articles compiled by SecurityScorecard.

Stay updated with SecurityScorecard's latest blog posts, featuring weekly insights on cybersecurity trends and best practices.

A cybersecurity and technology news platform that also publishes in-depth guides, tutorials, and reviews.

Check out our latest threat hunting articles, tips and stories.

Collection of malware source code for a variety of platforms in an array of different programming languages.

Analyze suspicious files and URLs, at scale, millions of times per day. Get real-time threat intel from a crowdsourced network of security experts and antivirus companies competing to protect you.

Discover expert analysis and thought leadership on the latest trends in corporate intelligence and cyber security. Explore and subscribe to our extensive range of bulletins and briefings. Catch up on the content you may have missed.

Red Team Lab, Active Directory Lab, Red Team Trainings, Azure Pentesting, Azure Security, Azure Red Team Lab, Enterprise Security and Red Team Certifications (CRTP, CRTE, CRTM, CARTP and more)

Stay updated on everything product security with Cybellum`s blog. We cover topics such as SBOM, vulnerabilities, and industry cyber security regulations.

The quiz for phishing. Can you spot when you’re being phished? Identifying phishing can be harder than you think. Phishing is an attempt to trick you into giving up your personal information by pretending to be someone you know. Can you tell what's fake?

A subdomain finder is a tool used to find the subdomains of a given domain.

Weakpass collection of tools for bruteforce and hashcracking.

GitHub public repositories matching the '#malware' topic.

GitHub public repositories matching the '#redteam' topic.

Directory of onion sites in darkweb. Fresh and reliable list of dark web sites from search engines to chat rooms and forums.

Learn how our open source technology and browser fingerprinting API help prevent online fraud on our blog.

Guides that cover security, privacy, and anonymity grouped by their importance.

The largest truly open library in human history. We mirror Sci-Hub and LibGen. We scrape and open-source Z-Lib, DuXiu, and more. 35,495,093 books, 103,135,237 papers — preserved forever. All our code and data are completely open source.

The Radware Blog shares vital knowledge with IT decision makers on application delivery, virtualization/cloud, security and specialized service provider needs.

Radware’s Live Threat Map presents near real-time information about cyberattacks as they occur, based on our global threat deception network and cloud systems event information. The systems transmit a variety of anonymized and sampled network and application attacks to our Threat Research Center and are shared with the community via this threat map.

Find accurate phone numbers, addresses and emails from the most trusted U.S. white pages phone directory and address lookup since 1997.

Cybersecurity news feed collected from many sites.

The latest information and archives of advisories.

Risky Business publishes cybersecurity newsletters and podcasts for security professionals.