bOt@zerobytes.monsterM · 5 hours agoNext.js, cache, and chains: the stale elixirplus-squarezhero-web-sec.github.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNext.js, cache, and chains: the stale elixirplus-squarezhero-web-sec.github.iobOt@zerobytes.monsterM · 5 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 3 months agoCSPT Playground - A new tool for learning about finding and exploiting client-side path traversal related vulnerabilitiesplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCSPT Playground - A new tool for learning about finding and exploiting client-side path traversal related vulnerabilitiesplus-squaregithub.combOt@zerobytes.monsterM · 3 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 3 months agoRedefining Ransomware Attacks on AWS using AWS KMS XKSplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRedefining Ransomware Attacks on AWS using AWS KMS XKSplus-squaremedium.combOt@zerobytes.monsterM · 3 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 3 months agoAw, Sugar. Critical Vulnerabilities in SugarWODplus-squarewww.n00py.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAw, Sugar. Critical Vulnerabilities in SugarWODplus-squarewww.n00py.iobOt@zerobytes.monsterM · 3 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 22 hours agoNaN Of Your Business - My Favorite Unintended CTF Solutionplus-squaremaxwelldulin.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNaN Of Your Business - My Favorite Unintended CTF Solutionplus-squaremaxwelldulin.combOt@zerobytes.monsterM · 22 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 3 months agoMeasuring Detection Coverageplus-squareipurple.teamexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMeasuring Detection Coverageplus-squareipurple.teambOt@zerobytes.monsterM · 3 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 3 months agoCan You Get Root With Only a Cigarette Lighter?plus-squarewww.da.vidbuchanan.co.ukexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCan You Get Root With Only a Cigarette Lighter?plus-squarewww.da.vidbuchanan.co.ukbOt@zerobytes.monsterM · 3 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 day agoVulnerability Archeology: Stealing Passwords with IBM i Access Client Solutionsplus-squareblog.silentsignal.euexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVulnerability Archeology: Stealing Passwords with IBM i Access Client Solutionsplus-squareblog.silentsignal.eubOt@zerobytes.monsterM · 1 day agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 day agoReverse Engineering Call Of Duty Anti-Cheatplus-squaressno.ccexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkReverse Engineering Call Of Duty Anti-Cheatplus-squaressno.ccbOt@zerobytes.monsterM · 1 day agomessage-square0fedilink
bOt@zerobytes.monsterM · 3 months agoAxis Camera takeover alternativeplus-squarewww.r-tec.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAxis Camera takeover alternativeplus-squarewww.r-tec.netbOt@zerobytes.monsterM · 3 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 3 months agoPalo Alto Expedition: From N-Day to Full Compromise – Horizon3.aiplus-squarewww.horizon3.aiexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPalo Alto Expedition: From N-Day to Full Compromise – Horizon3.aiplus-squarewww.horizon3.aibOt@zerobytes.monsterM · 3 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agov0.1.0 released - Analyze IoC with OpenCTI, Threat fox and more #FOSSplus-squarecyberbro.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkv0.1.0 released - Analyze IoC with OpenCTI, Threat fox and more #FOSSplus-squarecyberbro.netbOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoThe cost of false positives - how we became a targetplus-squarecside.devexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe cost of false positives - how we became a targetplus-squarecside.devbOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoMalware Analysis of Fake Banking Reward APK Targeting WhatsApp Usersplus-squaremalwr-analysis.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMalware Analysis of Fake Banking Reward APK Targeting WhatsApp Usersplus-squaremalwr-analysis.combOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoTear Down The Castle - Part 1 | dfir.chplus-squaredfir.chexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTear Down The Castle - Part 1 | dfir.chplus-squaredfir.chbOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 months agoExploiting AMD atdcm64a.sys arbitrary pointer dereference - Part 3plus-squaresecurity.humanativaspa.itexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkExploiting AMD atdcm64a.sys arbitrary pointer dereference - Part 3plus-squaresecurity.humanativaspa.itbOt@zerobytes.monsterM · 4 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 months agoMITRE Blog Post: Emulating complete, realistic attack chains with the new Caldera Bounty Hunter pluginplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMITRE Blog Post: Emulating complete, realistic attack chains with the new Caldera Bounty Hunter pluginplus-squaremedium.combOt@zerobytes.monsterM · 4 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoLet’s talk about AI and end-to-end encryptionplus-squareblog.cryptographyengineering.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLet’s talk about AI and end-to-end encryptionplus-squareblog.cryptographyengineering.combOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 months agoHow to turn a file write vulnerability in a Node.js application into RCE – even though the target's file system is read-onlyplus-squarewww.sonarsource.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to turn a file write vulnerability in a Node.js application into RCE – even though the target's file system is read-onlyplus-squarewww.sonarsource.combOt@zerobytes.monsterM · 4 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 months agoEKUwu: Not just another AD CS ESCplus-squaretrustedsec.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEKUwu: Not just another AD CS ESCplus-squaretrustedsec.combOt@zerobytes.monsterM · 4 months agomessage-square0fedilink