logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Beware of the new phishing technique “file archiver in the browser” that exploits zip domains
  • Mirai botnet: IZ1H9 variant targets IoT devices
  • Screen recording Android app found to be spying on users
  • Bl00dy Ransomware Targets Indian University: Actively Exploiting PaperCut Vulnerability
  • 68% of organizations suffered a cyberattack in past year

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-2879 (wireshark) 26 May 2023
  • CVE-2023-2858 (wireshark) 26 May 2023
  • CVE-2023-2857 (wireshark) 26 May 2023
  • CVE-2023-2855 (wireshark) 26 May 2023
  • CVE-2023-2854 (wireshark) 26 May 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

NekoBot : Auto Exploiter With 500+ Exploit 2000+ Shell

Posted on 22 February 2020

From kalilinuxtutorials.com

NekoBot : Auto Exploiter With 500+ Exploit 2000+ Shell

NekoBot is an auto exploit tool to facilitate the penetration of one or many websites (WordPress, Joomla, Drupal, Magento, Opencart,and Etc).

Read more…

Posted in News

Post navigation

Previous post: FireEye Verodin Operationalizes Threat Intelligence with Threat Actor Assurance Module
Next post: What are Deep Neural Networks Learning About Malware?
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.