botM to Security DiscussionsEnglish · 16 hours agoHow to extract useful info from Microsoft Deployment Toolkit MDT Shares on Red Teamsplus-squaretrustedsec.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to extract useful info from Microsoft Deployment Toolkit MDT Shares on Red Teamsplus-squaretrustedsec.combotM to Security DiscussionsEnglish · 16 hours agomessage-square0linkfedilink
botM to Security DiscussionsEnglish · 1 day agoNew Vulnerabilities in Foscam X5plus-squaressd-disclosure.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Vulnerabilities in Foscam X5plus-squaressd-disclosure.combotM to Security DiscussionsEnglish · 1 day agomessage-square0linkfedilink
botM to Security DiscussionsEnglish · 2 days agoFinding Heap Overflows with AFL Unicorn Modeplus-squaremedium.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFinding Heap Overflows with AFL Unicorn Modeplus-squaremedium.combotM to Security DiscussionsEnglish · 2 days agomessage-square0linkfedilink
botM to Security DiscussionsEnglish · 2 days agoCache poisoning via race-condition in Next.jsplus-squarezhero-web-sec.github.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCache poisoning via race-condition in Next.jsplus-squarezhero-web-sec.github.iobotM to Security DiscussionsEnglish · 2 days agomessage-square0linkfedilink
botM to Security DiscussionsEnglish · 3 days agoIntroducing EntraFalcon A Tool to Enumerate Entra ID Objects and Assignmentsplus-squareblog.compass-security.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIntroducing EntraFalcon A Tool to Enumerate Entra ID Objects and Assignmentsplus-squareblog.compass-security.combotM to Security DiscussionsEnglish · 3 days agomessage-square0linkfedilink
botM to Security DiscussionsEnglish · 3 days agoO2 VoLTE locating any customer with a phone callmastdatabase.co.ukexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkO2 VoLTE locating any customer with a phone callmastdatabase.co.ukbotM to Security DiscussionsEnglish · 3 days agomessage-square0linkfedilink
botM to Security DiscussionsEnglish · 4 days agoFrida 17 is outfrida.reexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFrida 17 is outfrida.rebotM to Security DiscussionsEnglish · 4 days agomessage-square0linkfedilink
botM to Security DiscussionsEnglish · 4 days agoStateful Connection With Spoofed Source IP NetImpostorplus-squaretastypepperoni.medium.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkStateful Connection With Spoofed Source IP NetImpostorplus-squaretastypepperoni.medium.combotM to Security DiscussionsEnglish · 4 days agomessage-square0linkfedilink
botM to Security DiscussionsEnglish · 5 days agoSkitnetBossnet Malware Analysisplus-squarecatalyst.prodaft.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSkitnetBossnet Malware Analysisplus-squarecatalyst.prodaft.combotM to Security DiscussionsEnglish · 5 days agomessage-square0linkfedilink
botM to Security DiscussionsEnglish · 5 days agoAnnouncing the Official Parity Release of Volatility 3!plus-squarevolatilityfoundation.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnnouncing the Official Parity Release of Volatility 3!plus-squarevolatilityfoundation.orgbotM to Security DiscussionsEnglish · 5 days agomessage-square0linkfedilink
botM to Security DiscussionsEnglish · 5 days agoCommit Stomping - Manipulating Git Histories to Obscure the Truthplus-squareblog.zsec.ukexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCommit Stomping - Manipulating Git Histories to Obscure the Truthplus-squareblog.zsec.ukbotM to Security DiscussionsEnglish · 5 days agomessage-square0linkfedilink
botM to Security DiscussionsEnglish · 5 days agoExpression Payloads Meet Mayhem - Ivanti EPMM Unauth RCE Chain CVE-2025-4427 and CVE-2025-4428 - watchTowr Labslabs.watchtowr.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkExpression Payloads Meet Mayhem - Ivanti EPMM Unauth RCE Chain CVE-2025-4427 and CVE-2025-4428 - watchTowr Labslabs.watchtowr.combotM to Security DiscussionsEnglish · 5 days agomessage-square0linkfedilink
botM to Security DiscussionsEnglish · 5 days agoIntegrate LDAP into Keycloak to modernize rather than delete itplus-squarewww.cloud-iam.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIntegrate LDAP into Keycloak to modernize rather than delete itplus-squarewww.cloud-iam.combotM to Security DiscussionsEnglish · 5 days agomessage-square0linkfedilink
botM to Security DiscussionsEnglish · 5 days agoCVE-2025-47916 Invision Community 5.0.6 customCss Remote Code Executionplus-squarekarmainsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCVE-2025-47916 Invision Community 5.0.6 customCss Remote Code Executionplus-squarekarmainsecurity.combotM to Security DiscussionsEnglish · 5 days agomessage-square0linkfedilink
botM to Security DiscussionsEnglish · 5 days agoAzure Managed Identities Abuse Security Research - Defense strategiesplus-squarewww.hunters.securityexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAzure Managed Identities Abuse Security Research - Defense strategiesplus-squarewww.hunters.securitybotM to Security DiscussionsEnglish · 5 days agomessage-square0linkfedilink
botM to Security DiscussionsEnglish · 5 days agoStatistical Analysis to Detect Uncommon Codeplus-squaresynthesis.toexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkStatistical Analysis to Detect Uncommon Codeplus-squaresynthesis.tobotM to Security DiscussionsEnglish · 5 days agomessage-square0linkfedilink
botM to Security DiscussionsEnglish · 5 days agoHow I ruined my vacation by reverse engineering WSCplus-squareblog.es3n1n.euexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow I ruined my vacation by reverse engineering WSCplus-squareblog.es3n1n.eubotM to Security DiscussionsEnglish · 5 days agomessage-square0linkfedilink
botM to Security DiscussionsEnglish · 5 days agoOne-Click RCE in ASUSs Preinstalled Driver Softwaremrbruh.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOne-Click RCE in ASUSs Preinstalled Driver Softwaremrbruh.combotM to Security DiscussionsEnglish · 5 days agomessage-square0linkfedilink
botM to Security DiscussionsEnglish · 5 days agoStealthy .NET Malware Hiding Malicious Payloads as Bitmap Resourcesplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkStealthy .NET Malware Hiding Malicious Payloads as Bitmap Resourcesplus-squareunit42.paloaltonetworks.combotM to Security DiscussionsEnglish · 5 days agomessage-square0linkfedilink
botM to Security DiscussionsEnglish · 5 days agoSCIM Hunting. Finding bugs in SCIM implementationsplus-squareblog.doyensec.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSCIM Hunting. Finding bugs in SCIM implementationsplus-squareblog.doyensec.combotM to Security DiscussionsEnglish · 5 days agomessage-square0linkfedilink