信息源 | 时间 | ||
---|---|---|---|
vx-underground
|
vxunderground | 原文
We'll be giving things away for the rest of the month. - A winner has been selected for the CRTO giveaway - 20 vouchers for a DFIR course and exam - 2... |
|
vx-underground
|
vxunderground | 原文
Re This is our HQ. We upcycle computer parts because it is cool and badass😎 |
|
INTIGRITI
|
intigriti | 原文
Re @x1m_martijn 😎😎😎 |
|
☣ KitPloit - Hacker Tools
|
KitPloit | 原文
Kali Linux 2023.4 - Penetration Testing and Ethical Hacking Linux Distribution http://dlvr.it/SzpBgY |
|
ghostlulz
|
ghostlulz1337 | 原文
Any USA based penetration testers looking to do some freelance contractor work for Red Sentry(@redsentry_tech )? DM me for more information. We have l... |
|
renniepak
|
renniepak | 原文
Bug Bounty hunters when they accidentally find a 0-day. |
|
Elliot
|
ElliotKillick | 原文
What is Loader Lock? 🤔 Going BEYOND undocumented, we delve into the heart of the modern Windows loader investigating some internals for the first t... |
|
INTIGRITI
|
intigriti | 原文
Re @IntelSecurity Tune for our next one... can you guess where it will be??? |
|
Emad Shanab - أبو عبد الله
|
Alra3ees | 原文
Re @0xElkomy أعوذ بكلمات الله التامات من شر ما خلق. |
|
Emad Shanab - أبو عبد الله
|
Alra3ees | 原文
If you don’t have money to purchase a VPS. Use https://www.thc.org/segfault/ A free kali linux VPS. You can run the GUI on chrome or Firefox go hack ... |
|
Emad Shanab - أبو عبد الله
|
Alra3ees | 原文
NucleiFuzzer Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications https://github.com/0xKayala/Nucle... |
|
Emad Shanab - أبو عبد الله
|
Alra3ees | 原文
If you want to find third parties domains for your target. Go to @securitytrails and on the search write your keyword. Example your target is indeed .... |
|
Emad Shanab - أبو عبد الله
|
Alra3ees | 原文
“Fuzzing APIs” by hackysterio https://hackysterio.medium.com/fuzzing-apis-73d9f5cdf156 |
|
Emad Shanab - أبو عبد الله
|
Alra3ees | 原文
“RCE | XSS via Image Exif metadata” by Gokulvinesh https://gokulvinesh.medium.com/rce-xss-via-image-exif-metadata-dddf33dadb41 |
|
Emad Shanab - أبو عبد الله
|
Alra3ees | 原文
“Exploiting SSRF Vulnerability to Gain Unauthorized Access to AWS Data” by theUnixe https://medium.com/@theUnixe/exploiting-ssrf-vulnerability-to-ga... |
|
Emad Shanab - أبو عبد الله
|
Alra3ees | 原文
“The Importance of Burp Suite History Analysis to Bypass 403 Error” by REDFISH IA VEN https://redfishiaven.medium.com/the-importance-of-burp-suite-h... |
|
Emad Shanab - أبو عبد الله
|
Alra3ees | 原文
“My $1000 Bounty Bug: How I Stopped Companies from Losing Money with an IDOR Flaw” by Abhi Sharma https://infosecwriteups.com/my-1000-bounty-bug-how... |
|
Emad Shanab - أبو عبد الله
|
Alra3ees | 原文
“🔍 The Ultimate Guide to Find S3 Buckets: Basic to Advance🔓🔎” by Qasim Mahmood Khalid https://medium.com/@qaafqasim/the-ultimate-guide-to-h... |
|
Emad Shanab - أبو عبد الله
|
Alra3ees | 原文
“How i got more than 100 vulnerabilities in just one site? (zseano-challenge)” by Mohamed Anani https://0xm5awy.medium.com/how-i-got-more-than-100-v... |
|
Emad Shanab - أبو عبد الله
|
Alra3ees | 原文
“Hacking Microsoft IIS : IIS Enumeration” by Mudasser Hussain https://medium.com/@mudasserhussain1111/hacking-microsoft-iis-enumerating-iis-for-v-39... |
|
Emad Shanab - أبو عبد الله
|
Alra3ees | 原文
“Mastering API Penetration Testing: A Comprehensive Guide for Security Pentesters” by Suprajabaskaran https://infosecwriteups.com/mastering-api-pene... |
|
Emad Shanab - أبو عبد الله
|
Alra3ees | 原文
“XSS via Chat bot — Cloudflare Bypassed” by theUnixe https://medium.com/@theUnixe/xss-via-chat-bot-cloudflare-bypassed-239ee65feef |
|
Emad Shanab - أبو عبد الله
|
Alra3ees | 原文
“Hack WordPress sites in 10 Minutes” by Mohamed Thoufeeq https://medium.com/@mohammedthoufeeq_25137/hack-wordpress-sites-in-10-minutes-407c8b5689b3 |
|
Emad Shanab - أبو عبد الله
|
Alra3ees | 原文
“LFI using Automation tool and Google Dorking” by Kushal Shrestha https://medium.com/@kushalshrestha77/lfi-using-automation-tool-and-google-dorking-... |
|
Emad Shanab - أبو عبد الله
|
Alra3ees | 原文
“Blind OS Command Injection via Activation Request!!” by theUnixe https://medium.com/@theUnixe/blind-os-command-injection-via-activation-request-2ea... |
|
Emad Shanab - أبو عبد الله
|
Alra3ees | 原文
“Account (of the CEO) Takeover via Password Reset” by Cristi Vlad https://cristivlad.medium.com/account-of-the-ceo-takeover-via-password-reset-7e55c... |
|
Emad Shanab - أبو عبد الله
|
Alra3ees | 原文
“How to find subdomain takeover using httpx + dig” by DrakenKun https://medium.com/@DrakenKun/how-to-find-subdomain-takeover-using-httpx-dig-5c2351d... |
|
Emad Shanab - أبو عبد الله
|
Alra3ees | 原文
RT Rafin Rahman Chy: I just published my first article on Medium! I believe that any level of AppSec professional will be benefited from this write-up... |
|
👑 OFJAAAH 👑
|
ofjaaah | 原文
Re @xssrae @sushicomabacate @codecancare @Jhaddix Precisar de algo, pode contar comigo 🚀 |
|
Security Response
|
msftsecresponse | 原文
Re @AnupamAS01 We're just as excited as you are, Anupam! Your contribution to our customer's security is greatly appreciated. Congratulations! 🎉 |
|
Nicolas Krassas
|
Dinosn | 原文
pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team. https://github.com/knownsec/pocsuite3 |
|
Nicolas Krassas
|
Dinosn | 原文
Security Analysis of a Thirteenth-Century Venetian Election Protocol https://www.schneier.com/blog/archives/2023/12/security-analysis-of-a-thirteenth-... |
|
Nicolas Krassas
|
Dinosn | 原文
+1500 HuggingFace API Tokens were exposed, leaving millions of Meta-Llama, Bloom, and Pythia users vulnerable to supply chain attacks https://www.redd... |
|
Nicolas Krassas
|
Dinosn | 原文
US Aerospace Firm Downed By Spearphishing Attack https://packetstormsecurity.com/news/view/35270/US-Aerospace-Firm-Downed-By-Spearphishing-Attack.html |
|
Nicolas Krassas
|
Dinosn | 原文
Unicode XSS via Combining Characters https://gist.github.com/paj28/86c7b8f37371d89c9a36ed0280fcf450 |
|
Nicolas Krassas
|
Dinosn | 原文
Gadgets Chain In Laravel https://fenrisk.com/publications/blogpost/2023/11/30/gadgets-chain-in-laravel/ |
|
Nicolas Krassas
|
Dinosn | 原文
Reverse engineering the barrel shifter circuit on the Intel 386 processor die http://www.righto.com/2023/12/386-barrel-shifter.html |
|
Nicolas Krassas
|
Dinosn | 原文
Atlassian patches critical RCE flaws across multiple products https://www.bleepingcomputer.com/news/security/atlassian-patches-critical-rce-flaws-acro... |
|
Nicolas Krassas
|
Dinosn | 原文
Navy contractor Austal USA confirms cyberattack after data leak https://www.bleepingcomputer.com/news/security/navy-contractor-austal-usa-confirms-cyb... |
|
Nicolas Krassas
|
Dinosn | 原文
A year on, CISA realizes debunked vuln actually a dud and removes it from must-patch list https://go.theregister.com/feed/www.theregister.com/2023/12/... |
|
![]() |
祝佳音 | 原文
“恐龙雪橇”,挂在恐龙后面! |
|
☣ KitPloit - Hacker Tools
|
KitPloit | 原文
PassBreaker - Command-line Password Cracking Tool Developed In Python http://dlvr.it/Szn6n2 |
|
Costin Raiu
|
craiu | 原文
Re @cyb3rops Just imagine when there are no hashes, domains or IPs, despite the blog claiming to share “extensive IOCs” 🤗 |
|
Costin Raiu
|
craiu | 原文
RT Tal Be'ery: 1/ #Bitcoin is a dark forest (too)! In 2020, @Paradigm researchers @danrobinson @gakonst discovered #Ethereum's Dark forest: bots monit... |
|
Costin Raiu
|
craiu | 原文
RT Tal Be'ery: This attacker has been using this address for a ~ month with ~50 attacks, all in the same pattern: 1. intercepting Tx in mempool 2. Pay... |
|
Rasta Mouse
|
_RastaMouse | 原文
Re @Oddvarmoe alas |
|
Rasta Mouse
|
_RastaMouse | 原文
Re @Jean_Maes_1994 @MarcOverIP lul same. I’ll accept a postal hoodie though 😅 |
|
Rasta Mouse
|
_RastaMouse | 原文
Re @_EthicalChaos_ @FrankMcG @UK_Daniel_Card |
|
renniepak
|
renniepak | 原文
I wish some day I could get a bounty without any discussions prior. |
|
Nicolas Krassas
|
Dinosn | 原文
Nissan is investigating cyberattack and potential data breach https://www.bleepingcomputer.com/news/security/nissan-is-investigating-cyberattack-and-p... |