Sec13B

Results 53 comments of Sec13B

how is correct ? `ecorp\\jsmith` or ` ecorp\jsmith`

anyway with `\\ `give false

──(root㉿kali)-[~] └─# ./msfinstall Adding metasploit-framework to your repository list..Warning: apt-key is deprecated. Manage keyring files in trusted.gpg.d instead (see apt-key(8)). OK Updating package cache..W: http://downloads.metasploit.com/data/releases/metasploit-framework/apt/dists/lucid/InRelease: Key is stored in legacy...

change in utf-16 or utf_16_le and see what happen

@NitescuLucian In your targets list , the vuln IP is with https or without https . root@tc:~/.cache# cat test.txt | ./nuclei -t cve-2024-21762-check.yaml -code [INF] Supplied input was automatically deduplicated...

no i didnt -sign (solved) default nuclei sign # digest: 490a0046304402206a39800bff0d9ca85a05e3686a0e246f8d5504a38e8501a1d7e8684ae6f2853002205ba7c74bb1f99cacf693e8a5a1cd429dcd7e52fab188beb8c95b934e4aabcd57:922c64590222798bb761d5b6d8e72950 i ask if in targets.txt the list have exampe : https://{ip}:{port} or just {ip}:{port} cat targets.txt | httpx -random-agent...

@pentesttools-com why you use ? -sS github QTranspose/CVE-2020-7247-exploit