bOt@zerobytes.monsterM · 28 days agoCSPT Playground - A new tool for learning about finding and exploiting client-side path traversal related vulnerabilitiesplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCSPT Playground - A new tool for learning about finding and exploiting client-side path traversal related vulnerabilitiesplus-squaregithub.combOt@zerobytes.monsterM · 28 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 29 days agoRedefining Ransomware Attacks on AWS using AWS KMS XKSplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRedefining Ransomware Attacks on AWS using AWS KMS XKSplus-squaremedium.combOt@zerobytes.monsterM · 29 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 29 days agoAw, Sugar. Critical Vulnerabilities in SugarWODplus-squarewww.n00py.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAw, Sugar. Critical Vulnerabilities in SugarWODplus-squarewww.n00py.iobOt@zerobytes.monsterM · 29 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 29 days agoMeasuring Detection Coverageplus-squareipurple.teamexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMeasuring Detection Coverageplus-squareipurple.teambOt@zerobytes.monsterM · 29 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 29 days agoCan You Get Root With Only a Cigarette Lighter?plus-squarewww.da.vidbuchanan.co.ukexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCan You Get Root With Only a Cigarette Lighter?plus-squarewww.da.vidbuchanan.co.ukbOt@zerobytes.monsterM · 29 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 30 days agoAxis Camera takeover alternativeplus-squarewww.r-tec.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAxis Camera takeover alternativeplus-squarewww.r-tec.netbOt@zerobytes.monsterM · 30 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 30 days agoPalo Alto Expedition: From N-Day to Full Compromise – Horizon3.aiplus-squarewww.horizon3.aiexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPalo Alto Expedition: From N-Day to Full Compromise – Horizon3.aiplus-squarewww.horizon3.aibOt@zerobytes.monsterM · 30 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 month agoExploiting AMD atdcm64a.sys arbitrary pointer dereference - Part 3plus-squaresecurity.humanativaspa.itexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkExploiting AMD atdcm64a.sys arbitrary pointer dereference - Part 3plus-squaresecurity.humanativaspa.itbOt@zerobytes.monsterM · 1 month agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 month agoMITRE Blog Post: Emulating complete, realistic attack chains with the new Caldera Bounty Hunter pluginplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMITRE Blog Post: Emulating complete, realistic attack chains with the new Caldera Bounty Hunter pluginplus-squaremedium.combOt@zerobytes.monsterM · 1 month agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 month agoHow to turn a file write vulnerability in a Node.js application into RCE – even though the target's file system is read-onlyplus-squarewww.sonarsource.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to turn a file write vulnerability in a Node.js application into RCE – even though the target's file system is read-onlyplus-squarewww.sonarsource.combOt@zerobytes.monsterM · 1 month agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 month agoEKUwu: Not just another AD CS ESCplus-squaretrustedsec.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEKUwu: Not just another AD CS ESCplus-squaretrustedsec.combOt@zerobytes.monsterM · 1 month agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 month agoIvanti Connect Secure - Authenticated RCE via OpenSSL CRLF Injection (CVE-2024-37404)plus-squareblog.amberwolf.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIvanti Connect Secure - Authenticated RCE via OpenSSL CRLF Injection (CVE-2024-37404)plus-squareblog.amberwolf.combOt@zerobytes.monsterM · 1 month agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 month agoLaunched Today: The NHI Indexplus-squarenon-human.idexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLaunched Today: The NHI Indexplus-squarenon-human.idbOt@zerobytes.monsterM · 1 month agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 month agoDocker Zombie Layers: Why Deleted Layers Can Still Haunt Youplus-squareblog.gitguardian.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDocker Zombie Layers: Why Deleted Layers Can Still Haunt Youplus-squareblog.gitguardian.combOt@zerobytes.monsterM · 1 month agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 month agoOpen Sourcing Venator – a kubernetes-native threat detection systemplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOpen Sourcing Venator – a kubernetes-native threat detection systemplus-squaremedium.combOt@zerobytes.monsterM · 1 month agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 month agoMonocle on Chronicles - Talkback automated infosec aggregator with a newsletterplus-squarewww.elttam.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMonocle on Chronicles - Talkback automated infosec aggregator with a newsletterplus-squarewww.elttam.combOt@zerobytes.monsterM · 1 month agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 month agoHacking Windows through iTunes - Local Privilege Escalation 0-day (CVE-2024–44193)plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHacking Windows through iTunes - Local Privilege Escalation 0-day (CVE-2024–44193)plus-squaregithub.combOt@zerobytes.monsterM · 1 month agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 month agoEffective Fuzzing: A Dav1d Case Studyplus-squaregoogleprojectzero.blogspot.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEffective Fuzzing: A Dav1d Case Studyplus-squaregoogleprojectzero.blogspot.combOt@zerobytes.monsterM · 1 month agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 month agoNew free 10h OpenSecurityTraining2 class: "Trusted Computing 1102: Intermediate Trusted Platform Module (TPM) usage" by Dimi Tomov is now releasedplus-squareost2.fyiexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew free 10h OpenSecurityTraining2 class: "Trusted Computing 1102: Intermediate Trusted Platform Module (TPM) usage" by Dimi Tomov is now releasedplus-squareost2.fyibOt@zerobytes.monsterM · 1 month agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 month agoThe PrintNightmare is not Over Yetplus-squareitm4n.github.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe PrintNightmare is not Over Yetplus-squareitm4n.github.iobOt@zerobytes.monsterM · 1 month agomessage-square0fedilink