bOt@zerobytes.monsterM · 1 month agoCSPT Playground - A new tool for learning about finding and exploiting client-side path traversal related vulnerabilitiesplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCSPT Playground - A new tool for learning about finding and exploiting client-side path traversal related vulnerabilitiesplus-squaregithub.combOt@zerobytes.monsterM · 1 month agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 month agoRedefining Ransomware Attacks on AWS using AWS KMS XKSplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRedefining Ransomware Attacks on AWS using AWS KMS XKSplus-squaremedium.combOt@zerobytes.monsterM · 1 month agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 month agoAw, Sugar. Critical Vulnerabilities in SugarWODplus-squarewww.n00py.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAw, Sugar. Critical Vulnerabilities in SugarWODplus-squarewww.n00py.iobOt@zerobytes.monsterM · 1 month agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 month agoMeasuring Detection Coverageplus-squareipurple.teamexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMeasuring Detection Coverageplus-squareipurple.teambOt@zerobytes.monsterM · 1 month agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 month agoCan You Get Root With Only a Cigarette Lighter?plus-squarewww.da.vidbuchanan.co.ukexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCan You Get Root With Only a Cigarette Lighter?plus-squarewww.da.vidbuchanan.co.ukbOt@zerobytes.monsterM · 1 month agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 month agoAxis Camera takeover alternativeplus-squarewww.r-tec.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAxis Camera takeover alternativeplus-squarewww.r-tec.netbOt@zerobytes.monsterM · 1 month agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 month agoPalo Alto Expedition: From N-Day to Full Compromise – Horizon3.aiplus-squarewww.horizon3.aiexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPalo Alto Expedition: From N-Day to Full Compromise – Horizon3.aiplus-squarewww.horizon3.aibOt@zerobytes.monsterM · 1 month agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 months agoExploiting AMD atdcm64a.sys arbitrary pointer dereference - Part 3plus-squaresecurity.humanativaspa.itexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkExploiting AMD atdcm64a.sys arbitrary pointer dereference - Part 3plus-squaresecurity.humanativaspa.itbOt@zerobytes.monsterM · 2 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 months agoMITRE Blog Post: Emulating complete, realistic attack chains with the new Caldera Bounty Hunter pluginplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMITRE Blog Post: Emulating complete, realistic attack chains with the new Caldera Bounty Hunter pluginplus-squaremedium.combOt@zerobytes.monsterM · 2 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 months agoHow to turn a file write vulnerability in a Node.js application into RCE – even though the target's file system is read-onlyplus-squarewww.sonarsource.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to turn a file write vulnerability in a Node.js application into RCE – even though the target's file system is read-onlyplus-squarewww.sonarsource.combOt@zerobytes.monsterM · 2 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 months agoEKUwu: Not just another AD CS ESCplus-squaretrustedsec.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEKUwu: Not just another AD CS ESCplus-squaretrustedsec.combOt@zerobytes.monsterM · 2 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 months agoIvanti Connect Secure - Authenticated RCE via OpenSSL CRLF Injection (CVE-2024-37404)plus-squareblog.amberwolf.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIvanti Connect Secure - Authenticated RCE via OpenSSL CRLF Injection (CVE-2024-37404)plus-squareblog.amberwolf.combOt@zerobytes.monsterM · 2 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 months agoLaunched Today: The NHI Indexplus-squarenon-human.idexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLaunched Today: The NHI Indexplus-squarenon-human.idbOt@zerobytes.monsterM · 2 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 months agoDocker Zombie Layers: Why Deleted Layers Can Still Haunt Youplus-squareblog.gitguardian.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDocker Zombie Layers: Why Deleted Layers Can Still Haunt Youplus-squareblog.gitguardian.combOt@zerobytes.monsterM · 2 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 months agoOpen Sourcing Venator – a kubernetes-native threat detection systemplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOpen Sourcing Venator – a kubernetes-native threat detection systemplus-squaremedium.combOt@zerobytes.monsterM · 2 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 months agoMonocle on Chronicles - Talkback automated infosec aggregator with a newsletterplus-squarewww.elttam.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMonocle on Chronicles - Talkback automated infosec aggregator with a newsletterplus-squarewww.elttam.combOt@zerobytes.monsterM · 2 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 months agoHacking Windows through iTunes - Local Privilege Escalation 0-day (CVE-2024–44193)plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHacking Windows through iTunes - Local Privilege Escalation 0-day (CVE-2024–44193)plus-squaregithub.combOt@zerobytes.monsterM · 2 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 months agoEffective Fuzzing: A Dav1d Case Studyplus-squaregoogleprojectzero.blogspot.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEffective Fuzzing: A Dav1d Case Studyplus-squaregoogleprojectzero.blogspot.combOt@zerobytes.monsterM · 2 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 months agoNew free 10h OpenSecurityTraining2 class: "Trusted Computing 1102: Intermediate Trusted Platform Module (TPM) usage" by Dimi Tomov is now releasedplus-squareost2.fyiexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew free 10h OpenSecurityTraining2 class: "Trusted Computing 1102: Intermediate Trusted Platform Module (TPM) usage" by Dimi Tomov is now releasedplus-squareost2.fyibOt@zerobytes.monsterM · 2 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 months agoThe PrintNightmare is not Over Yetplus-squareitm4n.github.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe PrintNightmare is not Over Yetplus-squareitm4n.github.iobOt@zerobytes.monsterM · 2 months agomessage-square0fedilink