Yesterday, I was searching for a PoC of a Spring Cloud Config vulnerability. The first result that Google returned was for a cool vulnerability and exploit testing framework - Tentacle. Cherry on the top was that this is open source and has been coded in Python3! This post is an attempt at listing the different nuances of this open source exploitation framework. Read more about Tentacle: A Vulnerability & Exploitation Test Framework
UPDATE: AutoSploit 4.0
AutoSploit 4.0 was released a month ago. I wrote about AutoSploit in a post titled AutoSploit = Shodan/Censys/Zoomeye + Metasploit and it’s subsequent update to AutoSploit 3.0. This version primarily adds support for running nmap scans within the same terminal. Read more about UPDATE: AutoSploit 4.0
UPDATE: AutoSploit 3.0 – The New Year’s edition
I wrote about AutoSploit in a post titled AutoSploit = Shodan/Censys/Zoomeye + Metasploit and it's subsequent update to AutoSploit 2.2. Recently, AutoSploit 3.0 was released. This post tries to describe the changes between the last release and the newest version as this release adds a number of features and bug fixes. This release is code named - The New Year's edition! Read more about UPDATE: AutoSploit 3.0 – The New Year’s edition
UPDATED VERSION: AutoSploit 2.2
It has been some days since there was a lot of hue and cry about AutoSploit and eventually everything subsided. I wrote about it in a post titled AutoSploit = Shodan/Censys/Zoomeye + Metasploit too. Recently, an updated an improved updated version - AutoSploit 2.2 was released. This post will try to describe the changes between the initial release and the newest Read more about UPDATED VERSION: AutoSploit 2.2
AutoSploit = Shodan/Censys/Zoomeye + Metasploit
I know, I know that you already have read about AutoSploit and used it probably since word got out about this auto exploitation tool some two months ago. However, between then and now, a lot has changed with the tool and this post is about that. Read more about AutoSploit = Shodan/Censys/Zoomeye + Metasploit