logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • From Ransomware to Cyber Espionage: 55 Zero-Day Vulnerabilities Weaponized in 2022
  • 9 attack surface discovery and management tools
  • Crooks stole more than $1.5M worth of Bitcoin from General Bytes ATMs
  • Windows 11 bug warns Local Security Authority protection is off
  • Ferrari: Discloses data breach after receiving ransom note

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-24468 (advanced_authentication) 15 March 2023
  • CVE-2023-22591 (robotic_process_automation, robotic_process_automation_as_a_service) 15 March 2023
  • CVE-2023-25344 (swig, swig-templates) 15 March 2023
  • CVE-2022-46773 (robotic_process_automation, robotic_process_automation_as_a_service, robotic_process_automation_for_cloud_pak) 15 March 2023
  • CVE-2023-25680 (robotic_process_automation, robotic_process_automation_as_a_service, robotic_process_automation_for_cloud_pak) 15 March 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

ParamPamPam – Brute Force Discover GET And POST Parameters

Posted on 28 April 2019

From kitploit.com

This tool for brute discover GET and POST parameters.

Read more…

Posted in News

Post navigation

Previous post: How a blockchain startup with 1M users is working to break your Google habit
Next post: Hackers Abusing Digitally Signed Emails to Launch JasperLoader Malware Via Weaponized Word Document
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.