bOt@zerobytes.monsterM · 19 hours ago60-pages guide on how to use Bettercap on Androidplus-squarewww.mobile-hacker.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link60-pages guide on how to use Bettercap on Androidplus-squarewww.mobile-hacker.combOt@zerobytes.monsterM · 19 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 day agoIntroducing keycred: A cross-platform tool for handling Active Directory Shadow Credentials/msDS-KeyCredentialLinkplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIntroducing keycred: A cross-platform tool for handling Active Directory Shadow Credentials/msDS-KeyCredentialLinkplus-squaregithub.combOt@zerobytes.monsterM · 1 day agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoTop Hacking Tools and Skills You Need to Learn in 2025plus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTop Hacking Tools and Skills You Need to Learn in 2025plus-squaremedium.combOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 months agoCSPT Playground - A new tool for learning about finding and exploiting client-side path traversal related vulnerabilitiesplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCSPT Playground - A new tool for learning about finding and exploiting client-side path traversal related vulnerabilitiesplus-squaregithub.combOt@zerobytes.monsterM · 4 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days ago300% increase in endpoint malware detections - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link300% increase in endpoint malware detections - Help Net Securityplus-squarewww.helpnetsecurity.combOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoRANsacked: Over 100 Security Flaws Found in LTE/5G Network Implementationsplus-squarecellularsecurity.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRANsacked: Over 100 Security Flaws Found in LTE/5G Network Implementationsplus-squarecellularsecurity.orgbOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoNew Java Runtime Reverse Engineering Tool (Injected DLL, Runtime Bytecode & Heap Analysis)plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Java Runtime Reverse Engineering Tool (Injected DLL, Runtime Bytecode & Heap Analysis)plus-squaregithub.combOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoHow vulnerable are company leaders to phishing attacks ? Results of our studyplus-squarewww.hackmosphere.frexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow vulnerable are company leaders to phishing attacks ? Results of our studyplus-squarewww.hackmosphere.frbOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoHow to prove false statements? (Part 3)plus-squareblog.cryptographyengineering.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to prove false statements? (Part 3)plus-squareblog.cryptographyengineering.combOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 months agoRedefining Ransomware Attacks on AWS using AWS KMS XKSplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRedefining Ransomware Attacks on AWS using AWS KMS XKSplus-squaremedium.combOt@zerobytes.monsterM · 4 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 months agoAw, Sugar. Critical Vulnerabilities in SugarWODplus-squarewww.n00py.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAw, Sugar. Critical Vulnerabilities in SugarWODplus-squarewww.n00py.iobOt@zerobytes.monsterM · 4 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 3 days agoAchieving RCE in famous Japanese chat tool with an obsolete Electron featureplus-squareflatt.techexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAchieving RCE in famous Japanese chat tool with an obsolete Electron featureplus-squareflatt.techbOt@zerobytes.monsterM · 3 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 months agoMeasuring Detection Coverageplus-squareipurple.teamexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMeasuring Detection Coverageplus-squareipurple.teambOt@zerobytes.monsterM · 4 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 months agoCan You Get Root With Only a Cigarette Lighter?plus-squarewww.da.vidbuchanan.co.ukexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCan You Get Root With Only a Cigarette Lighter?plus-squarewww.da.vidbuchanan.co.ukbOt@zerobytes.monsterM · 4 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 3 days agoIvanti Endpoint Manager Credential Coercion Vulnerabilities Deep-Diveplus-squarewww.horizon3.aiexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIvanti Endpoint Manager Credential Coercion Vulnerabilities Deep-Diveplus-squarewww.horizon3.aibOt@zerobytes.monsterM · 3 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 3 days agoReinventing PowerShell in C/C++plus-squareblog.scrt.chexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkReinventing PowerShell in C/C++plus-squareblog.scrt.chbOt@zerobytes.monsterM · 3 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 5 months agoAxis Camera takeover alternativeplus-squarewww.r-tec.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAxis Camera takeover alternativeplus-squarewww.r-tec.netbOt@zerobytes.monsterM · 5 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 5 months agoPalo Alto Expedition: From N-Day to Full Compromise – Horizon3.aiplus-squarewww.horizon3.aiexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPalo Alto Expedition: From N-Day to Full Compromise – Horizon3.aiplus-squarewww.horizon3.aibOt@zerobytes.monsterM · 5 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 days agoEveryday Ghidra: How Platform Choice Influences Ghidra’s Binary Analysisplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEveryday Ghidra: How Platform Choice Influences Ghidra’s Binary Analysisplus-squaremedium.combOt@zerobytes.monsterM · 4 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 days agoMicrosoft Edge Developer VM Remote Code Executionplus-squareinfosec.rm-it.deexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft Edge Developer VM Remote Code Executionplus-squareinfosec.rm-it.debOt@zerobytes.monsterM · 4 days agomessage-square0fedilink