remote2.avsoft.ir
Open in
urlscan Pro
5.145.119.22
Public Scan
URL:
https://remote2.avsoft.ir/
Submission: On August 11 via api from US — Scanned from DE
Submission: On August 11 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMGET /search/
<form method="get" action="/search/"><input type="text" name="q" id="q" maxlength="120" value="Search …"><button type="submit"></button>
<div id="q-tabs"><label for="s-files" class="on">Files</label><label for="s-news">News</label><label for="s-users">Users</label><label for="s-authors">Authors</label><input type="radio" value="files" name="s" id="s-files"><input type="radio"
value="news" name="s" id="s-news"><input type="radio" value="users" name="s" id="s-users"><input type="radio" value="authors" name="s" id="s-authors"></div>
</form>
GET /files/cal/
<form id="cal" action="/files/cal/" method="get">
<h2>File Archive:</h2>
<h3>August 2024</h3>
<button id="cal-prev" name="cal-prev" type="button" value="2024-8"><span><</span></button>
<ul class="dotw">
<li>Su</li>
<li>Mo</li>
<li>Tu</li>
<li>We</li>
<li>Th</li>
<li>Fr</li>
<li>Sa</li>
</ul>
<ul>
<li></li>
<li></li>
<li></li>
<li></li>
<li class="med"><a href="/files/date/2024-08-01/">1</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 1st</div>
<div class="count">15 Files</div>
</div>
</li>
<li class="med"><a href="/files/date/2024-08-02/">2</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 2nd</div>
<div class="count">22 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-03/">3</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 3rd</div>
<div class="count">0 Files</div>
</div>
</li>
</ul>
<ul>
<li class="none"><a href="/files/date/2024-08-04/">4</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 4th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="med"><a href="/files/date/2024-08-05/">5</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 5th</div>
<div class="count">15 Files</div>
</div>
</li>
<li class="low"><a href="/files/date/2024-08-06/">6</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 6th</div>
<div class="count">11 Files</div>
</div>
</li>
<li class="med"><a href="/files/date/2024-08-07/">7</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 7th</div>
<div class="count">43 Files</div>
</div>
</li>
<li class="med"><a href="/files/date/2024-08-08/">8</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 8th</div>
<div class="count">42 Files</div>
</div>
</li>
<li class="med"><a href="/files/date/2024-08-09/">9</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 9th</div>
<div class="count">36 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-10/">10</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 10th</div>
<div class="count">0 Files</div>
</div>
</li>
</ul>
<ul>
<li class="none today"><a href="/files/date/2024-08-11/">11</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 11th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-12/">12</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 12th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-13/">13</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 13th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-14/">14</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 14th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-15/">15</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 15th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-16/">16</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 16th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-17/">17</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 17th</div>
<div class="count">0 Files</div>
</div>
</li>
</ul>
<ul>
<li class="none"><a href="/files/date/2024-08-18/">18</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 18th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-19/">19</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 19th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-20/">20</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 20th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-21/">21</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 21st</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-22/">22</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 22nd</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-23/">23</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 23rd</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-24/">24</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 24th</div>
<div class="count">0 Files</div>
</div>
</li>
</ul>
<ul>
<li class="none"><a href="/files/date/2024-08-25/">25</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 25th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-26/">26</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 26th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-27/">27</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 27th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-28/">28</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 28th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-29/">29</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 29th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-30/">30</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 30th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-31/">31</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 31st</div>
<div class="count">0 Files</div>
</div>
</li>
</ul>
</form>
Text Content
what you don't know can hurt you Register | Login FilesNewsUsersAuthors Home Files News &[SERVICES_TAB]About Contact Add New 0.0.0.0 Day Browser Flaw Enables Malicious Requests To Local Networks SEC Takes No Action On Progress MOVEit Transfer Case Paris Olympics Deal With Ransomware Attack 512-bit RSA Key In Home System Gives Control Of Virtual Power Plant RECENT FILES * All * Exploits * Advisories * Tools * Whitepapers * Other Gentoo Linux Security Advisory 202408-19 Posted Aug 9, 2024 Authored by Gentoo | Site security.gentoo.org Gentoo Linux Security Advisory 202408-19 - Multiple vulnerabilities have been discovered in ncurses, the worst of which could lead to a denial of service. Versions greater than or equal to 6.4_p20230408 are affected. tags | advisory, denial of service, vulnerability systems | linux, gentoo Download | Favorite | View Debian Security Advisory 5746-1 Posted Aug 9, 2024 Authored by Debian | Site debian.org Debian Linux Security Advisory 5746-1 - Noah Misch discovered a race condition in the pg_dump tool included in PostgreSQL, which may result in privilege escalation. tags | advisory systems | linux, debian Download | Favorite | View I2P 2.6.1 Posted Aug 9, 2024 Authored by welterde | Site i2p2.de I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version. Changes: Updates to Graphs and Translations. Fix a bug in i2ptunnel causing truncation configuration UI. Translation updates. tags | tool systems | unix Download | Favorite | View Gentoo Linux Security Advisory 202408-18 Posted Aug 9, 2024 Authored by Gentoo | Site security.gentoo.org Gentoo Linux Security Advisory 202408-18 - Multiple vulnerabilities have been discovered in QEMU, the worst of which could lead to a denial of service. Versions greater than or equal to 8.0.0 are affected. tags | advisory, denial of service, vulnerability systems | linux, gentoo Download | Favorite | View Debian Security Advisory 5745-1 Posted Aug 9, 2024 Authored by Debian | Site debian.org Debian Linux Security Advisory 5745-1 - Noah Misch discovered a race condition in the pg_dump tool included in PostgreSQL, which may result in privilege escalation. tags | advisory systems | linux, debian Download | Favorite | View Faraday 5.5.0 Posted Aug 9, 2024 Authored by Francisco Amato | Site github.com Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way. Changes: Added Scheduler feature to community. Modified pytest launch parameters to fail job at first error. Added Pipelines feature in community. tags | tool, rootkit systems | unix Download | Favorite | View Gentoo Linux Security Advisory 202408-17 Posted Aug 9, 2024 Authored by Gentoo | Site security.gentoo.org Gentoo Linux Security Advisory 202408-17 - A vulnerability has been discovered in Nautilus, which can lead to a denial of service. Versions greater than or equal to 44.0 are affected. tags | advisory, denial of service systems | linux, gentoo Download | Favorite | View Debian Security Advisory 5744-1 Posted Aug 9, 2024 Authored by Debian | Site debian.org Debian Linux Security Advisory 5744-1 - Multiple security issues were discovered in Thunderbird, which could result in denial of service or the execution of arbitrary code. tags | advisory, denial of service, arbitrary systems | linux, debian Download | Favorite | View Gentoo Linux Security Advisory 202408-16 Posted Aug 9, 2024 Authored by Gentoo | Site security.gentoo.org Gentoo Linux Security Advisory 202408-16 - A vulnerability has been discovered in re2c, which can lead to a denial of service. Versions greater than or equal to 2.0 are affected. tags | advisory, denial of service systems | linux, gentoo Download | Favorite | View Gentoo Linux Security Advisory 202408-15 Posted Aug 9, 2024 Authored by Gentoo | Site security.gentoo.org Gentoo Linux Security Advisory 202408-15 - Multiple vulnerabilities have been discovered in Percona XtraBackup, the worst of which could lead to arbitrary code execution. Versions greater than or equal to 8.0.29.22 are affected. tags | advisory, arbitrary, vulnerability, code execution systems | linux, gentoo Download | Favorite | View Gentoo Linux Security Advisory 202408-14 Posted Aug 9, 2024 Authored by Gentoo | Site security.gentoo.org Gentoo Linux Security Advisory 202408-14 - A vulnerability has been discovered in Librsvg, which can lead to arbitrary file reads. Versions greater than or equal to 2.56.3 are affected. tags | advisory, arbitrary systems | linux, gentoo Download | Favorite | View Ubuntu Security Notice USN-6953-1 Posted Aug 9, 2024 Authored by Ubuntu | Site security.ubuntu.com Ubuntu Security Notice 6953-1 - Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. tags | advisory, kernel systems | linux, ubuntu Download | Favorite | View Ubuntu Security Notice USN-6952-1 Posted Aug 9, 2024 Authored by Ubuntu | Site security.ubuntu.com Ubuntu Security Notice 6952-1 - Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw is known as WeSee. A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. tags | advisory, arbitrary, kernel, local systems | linux, ubuntu Download | Favorite | View Ubuntu Security Notice USN-6951-1 Posted Aug 9, 2024 Authored by Ubuntu | Site security.ubuntu.com Ubuntu Security Notice 6951-1 - Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. tags | advisory, kernel systems | linux, ubuntu Download | Favorite | View Ubuntu Security Notice USN-6950-1 Posted Aug 9, 2024 Authored by Ubuntu | Site security.ubuntu.com Ubuntu Security Notice 6950-1 - Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. tags | advisory, kernel systems | linux, ubuntu Download | Favorite | View Gaati Track 1.0-2023 Insecure Direct Object Reference Posted Aug 9, 2024 Authored by indoushka Gaati Track version 1.0-2023 suffers from an insecure direct object reference vulnerability. tags | exploit Download | Favorite | View Red Hat Security Advisory 2024-5147-03 Posted Aug 9, 2024 Authored by Red Hat | Site access.redhat.com Red Hat Security Advisory 2024-5147-03 - An update is now available for Red Hat JBoss Enterprise Application Platform 7.4. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link in the References section. Issues addressed include a denial of service vulnerability. tags | advisory, denial of service systems | linux, redhat Download | Favorite | View Ubuntu Security Notice USN-6949-1 Posted Aug 9, 2024 Authored by Ubuntu | Site security.ubuntu.com Ubuntu Security Notice 6949-1 - Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. tags | advisory, kernel systems | linux, ubuntu Download | Favorite | View Ubuntu Security Notice USN-6948-1 Posted Aug 9, 2024 Authored by Ubuntu | Site security.ubuntu.com Ubuntu Security Notice 6948-1 - It was discovered that Salt incorrectly handled crafted web requests. A remote attacker could possibly use this issue to run arbitrary commands. It was discovered that Salt incorrectly created certificates with weak file permissions. It was discovered that Salt incorrectly handled credential validation. A remote attacker could possibly use this issue to bypass authentication. tags | advisory, remote, web, arbitrary systems | linux, ubuntu Download | Favorite | View Farmacia Gama 1.0 File Inclusion Posted Aug 9, 2024 Authored by indoushka Farmacia Gama version 1.0 suffers from a file inclusion vulnerability. tags | exploit, code execution, file inclusion Download | Favorite | View Red Hat Security Advisory 2024-5145-03 Posted Aug 9, 2024 Authored by Red Hat | Site access.redhat.com Red Hat Security Advisory 2024-5145-03 - An update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link in the References section. Issues addressed include a denial of service vulnerability. tags | advisory, denial of service systems | linux, redhat Download | Favorite | View Employee Management System 1.0 Cross Site Request Forgery Posted Aug 9, 2024 Authored by indoushka Employee Management System version 1.0 suffers from a cross site request forgery vulnerability. tags | exploit, csrf Download | Favorite | View Red Hat Security Advisory 2024-5144-03 Posted Aug 9, 2024 Authored by Red Hat | Site access.redhat.com Red Hat Security Advisory 2024-5144-03 - An update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link in the References section. Issues addressed include a denial of service vulnerability. tags | advisory, denial of service systems | linux, redhat Download | Favorite | View Red Hat Security Advisory 2024-5143-03 Posted Aug 9, 2024 Authored by Red Hat | Site access.redhat.com Red Hat Security Advisory 2024-5143-03 - An update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link in the References section. Issues addressed include a denial of service vulnerability. tags | advisory, denial of service systems | linux, redhat Download | Favorite | View E-Commerce Site Using PHP PDO 1.0 Cross Site Scripting Posted Aug 9, 2024 Authored by indoushka E-Commerce Site using PHP PDO version 1.0 suffers from a cross site scripting vulnerability. tags | exploit, php, xss Download | Favorite | View View Older Files → * Follow us on Twitter * Follow us on Facebook * Subscribe to an RSS Feed RECENT NEWS FTX Ordered To Pay $12.7 Billion To Customers Posted Aug 9, 2024 tags | headline, fraud, cryptography Favorite | View CrowdStrike Dismisses Claims Of Vulnerability In Falcon Sensor Bug Posted Aug 9, 2024 tags | headline, denial of service, flaw Favorite | View Pro-Iran Groups Lay Groundwork For Chaos And Violence As US Election Meddling Intensifies Posted Aug 9, 2024 tags | headline, government, usa, cyberwar, iran Favorite | View A Deep Dive Into CVE-2023-2163: How Google Found And Fixed An eBPF Linux Kernel Vulnerability Posted Aug 8, 2024 tags | headline, hacker, linux, flaw, google Favorite | View Critical Vulnerabilities In 6 AWS Services Disclosed At Black Hat USA Posted Aug 8, 2024 tags | headline, hacker, amazon, data loss, flaw, conference Favorite | View Samsung Boosts Bug Bounty To A Cool Million For Cracks Of The Knox Vault Subsystem Posted Aug 8, 2024 tags | headline, hacker, samsung Favorite | View Windows Update Flaws Allow Undetectable Downgrade Attacks Posted Aug 8, 2024 tags | headline, microsoft, flaw Favorite | View Black Hat USA: Wi-Fi Tracking Flaw Puts The BS In BSSID Posted Aug 8, 2024 tags | headline, wireless, flaw, conference Favorite | View US Elections Have Never Been More Secure, Says CISA Chief Posted Aug 8, 2024 tags | headline, government, usa, conference Favorite | View US Offering $10 Million Reward For Iranian ICS Hackers Posted Aug 8, 2024 tags | headline, hacker, government, usa, cyberwar, iran, scada Favorite | View View More News → FILE ARCHIVE: AUGUST 2024 < * Su * Mo * Tu * We * Th * Fr * Sa * * * * * 1 Aug 1st 15 Files * 2 Aug 2nd 22 Files * 3 Aug 3rd 0 Files * 4 Aug 4th 0 Files * 5 Aug 5th 15 Files * 6 Aug 6th 11 Files * 7 Aug 7th 43 Files * 8 Aug 8th 42 Files * 9 Aug 9th 36 Files * 10 Aug 10th 0 Files * 11 Aug 11th 0 Files * 12 Aug 12th 0 Files * 13 Aug 13th 0 Files * 14 Aug 14th 0 Files * 15 Aug 15th 0 Files * 16 Aug 16th 0 Files * 17 Aug 17th 0 Files * 18 Aug 18th 0 Files * 19 Aug 19th 0 Files * 20 Aug 20th 0 Files * 21 Aug 21st 0 Files * 22 Aug 22nd 0 Files * 23 Aug 23rd 0 Files * 24 Aug 24th 0 Files * 25 Aug 25th 0 Files * 26 Aug 26th 0 Files * 27 Aug 27th 0 Files * 28 Aug 28th 0 Files * 29 Aug 29th 0 Files * 30 Aug 30th 0 Files * 31 Aug 31st 0 Files TOP AUTHORS IN LAST 30 DAYS * Red Hat 219 files * Ubuntu 85 files * indoushka 77 files * Jasper Nota 25 files * Gentoo 22 files * Debian 19 files * Willem Westerhof 19 files * Jim Blankendaal 11 files * Martijn Baalman 9 files * Apple 9 files FILE TAGS * ActiveX (933) * Advisory (86,331) * Arbitrary (16,864) * BBS (2,859) * Bypass (1,861) * CGI (1,033) * Code Execution (7,801) * Conference (691) * Cracker (844) * CSRF (3,388) * DoS (25,066) * Encryption (2,389) * Exploit (53,171) * File Inclusion (4,262) * File Upload (994) * Firewall (822) * Info Disclosure (2,890) * Intrusion Detection (915) * Java (3,144) * JavaScript (896) * Kernel (7,201) * Local (14,794) * Magazine (586) * Overflow (13,169) * Perl (1,435) * PHP (5,224) * Proof of Concept (2,393) * Protocol (3,724) * Python (1,639) * Remote (31,650) * Root (3,635) * Rootkit (527) * Ruby (631) * Scanner (1,657) * Security Tool (8,027) * Shell (3,273) * Shellcode (1,217) * Sniffer (902) * Spoof (2,275) * SQL Injection (16,606) * TCP (2,441) * Trojan (690) * UDP (904) * Virus (669) * Vulnerability (32,956) * Web (9,963) * Whitepaper (3,782) * x86 (967) * XSS (18,250) * Other FILE ARCHIVES * August 2024 * July 2024 * June 2024 * May 2024 * April 2024 * March 2024 * February 2024 * January 2024 * December 2023 * November 2023 * October 2023 * September 2023 * Older SYSTEMS * AIX (429) * Apple (2,099) * BSD (377) * CentOS (58) * Cisco (1,927) * Debian (7,096) * Fedora (1,693) * FreeBSD (1,246) * Gentoo (4,553) * HPUX (880) * iOS (378) * iPhone (108) * IRIX (220) * Juniper (69) * Linux (50,689) * Mac OS X (691) * Mandriva (3,105) * NetBSD (256) * OpenBSD (489) * RedHat (16,482) * Slackware (941) * Solaris (1,611) * SUSE (1,444) * Ubuntu (9,736) * UNIX (9,435) * UnixWare (187) * Windows (6,671) * Other NEWS TAGS * 0 Day (299) * Adobe (310) * Anonymous (350) * Apple (1,064) * Backdoor (702) * Bank (1,207) * Botnet (579) * Britain (1,106) * China (940) * Cisco (208) * Conference (325) * Cryptography (1,604) * Cybercrime (2,106) * Cyberwar (1,923) * Data Loss (3,941) * Database (227) * DoS (548) * Email (517) * Facebook (829) * FBI (455) * Flaw (4,501) * Fraud (2,666) * Google (1,560) * Government (6,960) * Hacker (7,539) * Headline (19,774) * Identity Theft (211) * Iran (222) * Linux (261) * Malware (2,725) * Microsoft (1,822) * Military (219) * Mozilla (216) * NSA (678) * Password (775) * Patch (1,003) * Phish (373) * Phone (1,925) * Privacy (4,758) * Russia (1,061) * Scada (206) * Scam (273) * Science (534) * Social (467) * Space (256) * Spam (379) * Spyware (1,593) * Terror (402) * Trojan (321) * Twitter (402) * USA (3,884) * Virus (397) * Wireless (228) * Worm (201) * Other NEWS ARCHIVES * August 2024 * July 2024 * June 2024 * May 2024 * April 2024 * March 2024 * February 2024 * January 2024 * December 2023 * November 2023 * October 2023 * September 2023 * Older © 2022 Packet Storm. All rights reserved. Site Links News by Month News Tags Files by Month File Tags File Directory About Us History & Purpose Contact Information Terms of Service Privacy Statement Copyright Information Services Security Services Hosting By Rokasec * Follow us on Twitter * Follow us on Facebook * Subscribe to an RSS Feed