Twitter | Pretraživanje | |
Tweetovi
muuk proslijedio/la je tweet
Faraz Khan 29. lip
CollabOzark is a simple tool which helps the researchers track SSRF, Blind XSS, XXE, SQLi, External Resource Access payloads triggers.
Reply Retweet Označi sa "sviđa mi se"
muuk proslijedio/la je tweet
/r/netsec 4. velj
ESLinter - a Burp Extension to Extract and ESLint JavaScript
Reply Retweet Označi sa "sviđa mi se"
muuk proslijedio/la je tweet
Root Cause 4. velj
Firefox Spidermonkey JS Engine Exploitation
Reply Retweet Označi sa "sviđa mi se"
muuk proslijedio/la je tweet
OccupytheWeb 4. velj
Android Hacking: How to Embed a Backdoor into a Legitimate APK
Reply Retweet Označi sa "sviđa mi se"
muuk proslijedio/la je tweet
Planet Arduino 4. velj
A Simple App Controlled Door Lock -
Reply Retweet Označi sa "sviđa mi se"
muuk proslijedio/la je tweet
meh 6. ožu 2018.
Found another off-by-one remote code execution vulnerability (CVE-2018-6789) in Exim mail server! It was challenging but interesting and we finally achieve RCE and bypass mitigations (ASLR, NX …) successfully. Details here:
Reply Retweet Označi sa "sviđa mi se"
muuk proslijedio/la je tweet
The Hacker's Choice 23. ožu 2018.
new tools: afl-fuzz with pintool , afl-simulator ... have fun!
Reply Retweet Označi sa "sviđa mi se"
muuk proslijedio/la je tweet
hanno 21. sij 2019.
Apache httpd use after free bugs (unfixed)
Reply Retweet Označi sa "sviđa mi se"
muuk proslijedio/la je tweet
Roderick Schaefer 29. ruj
Woohoo got 2 new CVE’s on Foxit Reader CVE-2019-13123 and CVE-2019-13124. Happy Sunday! ;-)
Reply Retweet Označi sa "sviđa mi se"
muuk proslijedio/la je tweet
Paul Seekamp 2. ožu
Need privilege escalation? Have access to SMB and NFS shares? Automate looking for credentials! 1) pip3 install -r requirements.txt sudo apt-get install cifs-utils 2) git clone 3) python3 -p all -w -v -H hosts.lst -C creds.lst
Reply Retweet Označi sa "sviđa mi se"
muuk proslijedio/la je tweet
Daniel Cocking 4. ožu
An Introduction to file format fuzzing where we find a previously unknown vulnerability in a real-world piece of software and exploit it to gain code execution. Enjoy!
Reply Retweet Označi sa "sviđa mi se"
muuk proslijedio/la je tweet
Patrik Fehrenbach🤖 8. ožu
Happy Friday! have you ever stumbled over this and asked yourself whats next? Try to append ?wsdl at the end of the URL to get the entire description of the application, use to parse the necessary POST / GET requests
Reply Retweet Označi sa "sviđa mi se"
muuk proslijedio/la je tweet
Somdev Sangwan 10. ožu
Here's my research paper about bypassing WAFs for XSS ❤️
Reply Retweet Označi sa "sviđa mi se"
muuk proslijedio/la je tweet
Teddy Katz 23. stu
New blogpost about an account takeover bug. This one took awhile to figure out
Reply Retweet Označi sa "sviđa mi se"
muuk proslijedio/la je tweet
Nacho Sanzu © 🇪🇸 31. sij
S3Enum – Fast Amazon S3 Bucket Enumeration Tool For Pentesters: s3enum is a tool to enumerate a target’s Amazon S3 buckets. It is fast and leverages DNS instead of HTTP,... The post S3Enum – Fast Amazon S3 Bucket…
Reply Retweet Označi sa "sviđa mi se"
muuk proslijedio/la je tweet
raptor 2. velj
I’ve just published my exploit for the LPE and RCE in OpenBSD’s OpenSMTPD recently disclosed by You can find it here:
Reply Retweet Označi sa "sviđa mi se"
muuk proslijedio/la je tweet
Aliaksei Chapyzhenka 3. velj
Odgovor korisniku/ci @wavedrom
Memory Maps are bread and butter of chip design. I see a lot of artistic creativity looking into datasheets.
Reply Retweet Označi sa "sviđa mi se"
muuk proslijedio/la je tweet
Michael Hausenblas 3. velj
Yo Lambda folks, if you’re into layers I might have something for you: The Lambda Layer Inspector (l2i). A CLI inspection tool w/ binaries for Linux, macOS, and Windows, see: CC:
Reply Retweet Označi sa "sviđa mi se"
muuk proslijedio/la je tweet
💾 Astr0 Baby 3. velj
Seems that Windows 10 arm64 10.0.19033.1 does not ship the CVE-2020-0601 patch .. works perfectly for signing custom meterpreter payloads to execute on the Arm64 windows 10 box :)
Reply Retweet Označi sa "sviđa mi se"
muuk proslijedio/la je tweet
Anastasis KingStyle 3. velj
Python-Backdoor:-- Hidden and undetectable written in :-
Reply Retweet Označi sa "sviđa mi se"