botM to NetSecEnglish · 6 hours agoGiving an LLM Command Line Access to Nmapplus-squarehackertarget.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGiving an LLM Command Line Access to Nmapplus-squarehackertarget.combotM to NetSecEnglish · 6 hours agomessage-square0linkfedilink
botM to NetSecEnglish · 18 hours agoBatteries included collaborative knowledge management solution for threat intelligence researchersplus-squarecradle.shexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBatteries included collaborative knowledge management solution for threat intelligence researchersplus-squarecradle.shbotM to NetSecEnglish · 18 hours agomessage-square0linkfedilink
botM to NetSecEnglish · 1 day agoInfluencing LLM Output using logprobs and Token Distributionblog.sicuranext.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInfluencing LLM Output using logprobs and Token Distributionblog.sicuranext.combotM to NetSecEnglish · 1 day agomessage-square0linkfedilink
botM to NetSecEnglish · 2 days agoIntroducing GitHub Device Code Phishingplus-squarewww.praetorian.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIntroducing GitHub Device Code Phishingplus-squarewww.praetorian.combotM to NetSecEnglish · 2 days agomessage-square0linkfedilink
botM to NetSecEnglish · 2 days agoMillions of Vulnerabilities One Checklist to Kill The Noisesecurityautopsy.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMillions of Vulnerabilities One Checklist to Kill The Noisesecurityautopsy.combotM to NetSecEnglish · 2 days agomessage-square0linkfedilink
botM to NetSecEnglish · 3 days agoMeta is able to track its users via WebRTC on Android including private mode and behind VPNplus-squarewww.zeropartydata.esexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMeta is able to track its users via WebRTC on Android including private mode and behind VPNplus-squarewww.zeropartydata.esbotM to NetSecEnglish · 3 days agomessage-square0linkfedilink
botM to NetSecEnglish · 3 days agoStryker - Android pentesting app with premium access is now free until 2050plus-squarewww.mobile-hacker.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkStryker - Android pentesting app with premium access is now free until 2050plus-squarewww.mobile-hacker.combotM to NetSecEnglish · 3 days agomessage-square0linkfedilink
botM to NetSecEnglish · 4 days agoWeaponized Google OAuth Triggers Malicious WebSocketplus-squarecside.devexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWeaponized Google OAuth Triggers Malicious WebSocketplus-squarecside.devbotM to NetSecEnglish · 4 days agomessage-square0linkfedilink
botM to NetSecEnglish · 4 days agoGetting RCE on Monero forums with wrapwrapplus-squareswap.gsexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGetting RCE on Monero forums with wrapwrapplus-squareswap.gsbotM to NetSecEnglish · 4 days agomessage-square0linkfedilink
botM to NetSecEnglish · 5 days agoLes comptes machines dans Active Directoryplus-squaremobeta.frexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLes comptes machines dans Active Directoryplus-squaremobeta.frbotM to NetSecEnglish · 5 days agomessage-square0linkfedilink
botM to NetSecEnglish · 5 days agoCVE-2025-33073 A Look in the Mirror - The Reflective Kerberos Relay Attackplus-squareblog.redteam-pentesting.deexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCVE-2025-33073 A Look in the Mirror - The Reflective Kerberos Relay Attackplus-squareblog.redteam-pentesting.debotM to NetSecEnglish · 5 days agomessage-square0linkfedilink
botM to NetSecEnglish · 6 days agoSalesforce Industry Clouds Security Whitepaper 5 CVEs, 15 Security Risksplus-squareappomni.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSalesforce Industry Clouds Security Whitepaper 5 CVEs, 15 Security Risksplus-squareappomni.combotM to NetSecEnglish · 6 days agomessage-square0linkfedilink
botM to NetSecEnglish · 6 days agoLive Forensic Collection from Ivanti EPMM Appliances CVE-2025-4427 CVE-2025-4428plus-squareprofero.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLive Forensic Collection from Ivanti EPMM Appliances CVE-2025-4427 CVE-2025-4428plus-squareprofero.iobotM to NetSecEnglish · 6 days agomessage-square0linkfedilink
botM to NetSecEnglish · 6 days agoAutomating MS-RPC vulnerability researchplus-squarewww.incendium.rocksexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAutomating MS-RPC vulnerability researchplus-squarewww.incendium.rocksbotM to NetSecEnglish · 6 days agomessage-square0linkfedilink
botM to NetSecEnglish · 6 days agoAuthenticated Remote Code Execution in Netwrix Password Secure CVE-2025-26817plus-squarewww.8com.deexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAuthenticated Remote Code Execution in Netwrix Password Secure CVE-2025-26817plus-squarewww.8com.debotM to NetSecEnglish · 6 days agomessage-square0linkfedilink
botM to NetSecEnglish · 6 days agoHow to Enumerate and Exploit CefSharp Thick Clients Using CefEnumplus-squareblog.darkforge.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to Enumerate and Exploit CefSharp Thick Clients Using CefEnumplus-squareblog.darkforge.iobotM to NetSecEnglish · 6 days agomessage-square0linkfedilink
botM to NetSecEnglish · 6 days agoCVE-2024-45332 brings back branch target injection attacks on Intelcomsec.ethz.chexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCVE-2024-45332 brings back branch target injection attacks on Intelcomsec.ethz.chbotM to NetSecEnglish · 6 days agomessage-square0linkfedilink
botM to NetSecEnglish · 6 days agoCVE-2025-26147 Authenticated RCE In Denodo Schedulerplus-squarerhinosecuritylabs.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCVE-2025-26147 Authenticated RCE In Denodo Schedulerplus-squarerhinosecuritylabs.combotM to NetSecEnglish · 6 days agomessage-square0linkfedilink
botM to NetSecEnglish · 6 days agoBadSuccessor Abusing dMSA to Escalate Privileges in Active Directorywww.akamai.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBadSuccessor Abusing dMSA to Escalate Privileges in Active Directorywww.akamai.combotM to NetSecEnglish · 6 days agomessage-square0linkfedilink
botM to NetSecEnglish · 6 days agoEvilWorker a new AiTM attack framework leveraging service workers much more effective, autonomous, and adaptable than Evilginx2?plus-squaremedium.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEvilWorker a new AiTM attack framework leveraging service workers much more effective, autonomous, and adaptable than Evilginx2?plus-squaremedium.combotM to NetSecEnglish · 6 days agomessage-square0linkfedilink