botM to NetSecEnglish · 2 小时前Countering EDRs With The Backing Of Protected Process Light PPLplus-squarewww.zerosalarium.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCountering EDRs With The Backing Of Protected Process Light PPLplus-squarewww.zerosalarium.combotM to NetSecEnglish · 2 小时前message-square0linkfedilink
botM to NetSecEnglish · 2 小时前Silent Harvest Extracting Windows Secrets Under the Radarsud0ru.ghost.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSilent Harvest Extracting Windows Secrets Under the Radarsud0ru.ghost.iobotM to NetSecEnglish · 2 小时前message-square0linkfedilink
botM to NetSecEnglish · 2 小时前CaMeL Security Demonstration - Defending Against most Prompt Injections by Designplus-squarecamel-security.github.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCaMeL Security Demonstration - Defending Against most Prompt Injections by Designplus-squarecamel-security.github.iobotM to NetSecEnglish · 2 小时前message-square0linkfedilink
botM to NetSecEnglish · 2 小时前When a SSRF is enough Full Docker Escape on Windows Docker Desktop CVE-2025-9074plus-squareblog.qwertysecurity.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhen a SSRF is enough Full Docker Escape on Windows Docker Desktop CVE-2025-9074plus-squareblog.qwertysecurity.combotM to NetSecEnglish · 2 小时前message-square0linkfedilink
botM to NetSecEnglish · 2 小时前AI can be used to create working exploits for published CVEs in a few minutes and for a few dollarsplus-squarevalmarelox.substack.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAI can be used to create working exploits for published CVEs in a few minutes and for a few dollarsplus-squarevalmarelox.substack.combotM to NetSecEnglish · 2 小时前message-square0linkfedilink
botM to NetSecEnglish · 2 小时前Azures Weakest Link - Full Cross-Tenant Compromiseplus-squarebinarysecurity.noexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAzures Weakest Link - Full Cross-Tenant Compromiseplus-squarebinarysecurity.nobotM to NetSecEnglish · 2 小时前message-square0linkfedilink
botM to NetSecEnglish · 2 小时前We Put Agentic AI Browsers to the Test - They Clicked, They Paid, They Failedplus-squareguard.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWe Put Agentic AI Browsers to the Test - They Clicked, They Paid, They Failedplus-squareguard.iobotM to NetSecEnglish · 2 小时前message-square0linkfedilink
botM to NetSecEnglish · 2 小时前Commvault plugs holes in backup suite that allow remote code executioplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCommvault plugs holes in backup suite that allow remote code executioplus-squarewww.helpnetsecurity.combotM to NetSecEnglish · 2 小时前message-square0linkfedilink
botM to NetSecEnglish · 2 小时前Engineered to Fail The DNA of Negligent Defenses Operationsreporter.deepspecter.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEngineered to Fail The DNA of Negligent Defenses Operationsreporter.deepspecter.combotM to NetSecEnglish · 2 小时前message-square0linkfedilink
botM to NetSecEnglish · 2 小时前ECScape - Blog Series Black Hat fwdcloudsecplus-squarenaorhaziz.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkECScape - Blog Series Black Hat fwdcloudsecplus-squarenaorhaziz.combotM to NetSecEnglish · 2 小时前message-square0linkfedilink
botM to NetSecEnglish · 2 小时前Guess Who Would Be Stupid Enough To Rob The Same Vault Twice? Pre-Auth RCE Chains in Commvault - watchTowr Labslabs.watchtowr.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGuess Who Would Be Stupid Enough To Rob The Same Vault Twice? Pre-Auth RCE Chains in Commvault - watchTowr Labslabs.watchtowr.combotM to NetSecEnglish · 2 小时前message-square0linkfedilink
botM to NetSecEnglish · 2 小时前Copilot Broke Your Audit Log, but Microsoft Wont Tell Youplus-squarepistachioapp.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCopilot Broke Your Audit Log, but Microsoft Wont Tell Youplus-squarepistachioapp.combotM to NetSecEnglish · 2 小时前message-square0linkfedilink
botM to NetSecEnglish · 2 小时前pyghidra-mcp Headless Ghidra MCP Server for Project-Wide, Multi-Binary Analysisplus-squareclearbluejar.github.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkpyghidra-mcp Headless Ghidra MCP Server for Project-Wide, Multi-Binary Analysisplus-squareclearbluejar.github.iobotM to NetSecEnglish · 2 小时前message-square0linkfedilink
botM to NetSecEnglish · 2 小时前Enumerating AWS the quiet way CloudTrail-free discovery with Resource Explorer Datadog Security Labssecuritylabs.datadoghq.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEnumerating AWS the quiet way CloudTrail-free discovery with Resource Explorer Datadog Security Labssecuritylabs.datadoghq.combotM to NetSecEnglish · 2 小时前message-square0linkfedilink
botM to NetSecEnglish · 2 小时前How We Exploited CodeRabbit From a Simple PR to RCE and Write Access on 1M Repositoriesplus-squareresearch.kudelskisecurity.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow We Exploited CodeRabbit From a Simple PR to RCE and Write Access on 1M Repositoriesplus-squareresearch.kudelskisecurity.combotM to NetSecEnglish · 2 小时前message-square0linkfedilink
botM to NetSecEnglish · 2 小时前Deep learning with leagues championship algorithm based intrusion detectionwww.nature.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDeep learning with leagues championship algorithm based intrusion detectionwww.nature.combotM to NetSecEnglish · 2 小时前message-square0linkfedilink
botM to NetSecEnglish · 2 小时前Beware the false false-positive how to distinguish HTTP pipelining from request smugglingplus-squareportswigger.netexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBeware the false false-positive how to distinguish HTTP pipelining from request smugglingplus-squareportswigger.netbotM to NetSecEnglish · 2 小时前message-square0linkfedilink
botM to NetSecEnglish · 2 小时前Git 2.51 Preparing for the future with SHA-256plus-squarewww.helpnetsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGit 2.51 Preparing for the future with SHA-256plus-squarewww.helpnetsecurity.combotM to NetSecEnglish · 2 小时前message-square0linkfedilink
botM to NetSecEnglish · 2 小时前Trivial C Random Exploitationplus-squareblog.doyensec.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTrivial C Random Exploitationplus-squareblog.doyensec.combotM to NetSecEnglish · 2 小时前message-square0linkfedilink
botM to NetSecEnglish · 2 小时前Phrack 72plus-squarephrack.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPhrack 72plus-squarephrack.orgbotM to NetSecEnglish · 2 小时前message-square0linkfedilink