botM to Security DiscussionsEnglish · 21 hours agoNew free 10h OpenSecurityTraining2 class: "Trusted Computing 1102: Intermediate Trusted Platform Module (TPM) usage" by Dimi Tomov is now releasedplus-squareost2.fyiexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew free 10h OpenSecurityTraining2 class: "Trusted Computing 1102: Intermediate Trusted Platform Module (TPM) usage" by Dimi Tomov is now releasedplus-squareost2.fyibotM to Security DiscussionsEnglish · 21 hours agomessage-square0fedilink
botM to Security DiscussionsEnglish · 21 hours agoThe PrintNightmare is not Over Yetplus-squareitm4n.github.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe PrintNightmare is not Over Yetplus-squareitm4n.github.iobotM to Security DiscussionsEnglish · 21 hours agomessage-square0fedilink
botM to Security DiscussionsEnglish · 2 days agoExploiting Visual Studio via dump files - CVE-2024-30052plus-squareynwarcs.github.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkExploiting Visual Studio via dump files - CVE-2024-30052plus-squareynwarcs.github.iobotM to Security DiscussionsEnglish · 2 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 3 days agoBuilt your portable pentesting lab with Pi-Tail that is controlled only by your smartphoneplus-squarewww.mobile-hacker.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBuilt your portable pentesting lab with Pi-Tail that is controlled only by your smartphoneplus-squarewww.mobile-hacker.combotM to Security DiscussionsEnglish · 3 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 3 days agoPwning LLaMA.cpp RPC Server with CVE-2024-42478 and CVE-2024-42479plus-squarepwner.ggexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPwning LLaMA.cpp RPC Server with CVE-2024-42478 and CVE-2024-42479plus-squarepwner.ggbotM to Security DiscussionsEnglish · 3 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 3 days ago/r/netsec's Q4 2024 Information Security Hiring Threadwww.reddit.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link/r/netsec's Q4 2024 Information Security Hiring Threadwww.reddit.combotM to Security DiscussionsEnglish · 3 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 3 days agoWhen AI Gets Hijacked: Exploiting Hosted Models for Dark Roleplayingplus-squarepermiso.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhen AI Gets Hijacked: Exploiting Hosted Models for Dark Roleplayingplus-squarepermiso.iobotM to Security DiscussionsEnglish · 3 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 4 days agoReverse Engineering and Dismantling Kekz Headphonesplus-squarenv1t.github.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkReverse Engineering and Dismantling Kekz Headphonesplus-squarenv1t.github.iobotM to Security DiscussionsEnglish · 4 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 4 days agoClass Pollution in Ruby: A Deep Dive into Exploiting Recursive Mergesplus-squareblog.doyensec.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkClass Pollution in Ruby: A Deep Dive into Exploiting Recursive Mergesplus-squareblog.doyensec.combotM to Security DiscussionsEnglish · 4 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 5 days agoHTTP Parameter Pollution in 2024!plus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHTTP Parameter Pollution in 2024!plus-squaremedium.combotM to Security DiscussionsEnglish · 5 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 5 days agoExploiting AMD atdcm64a.sys arbitrary pointer dereference - Part 2plus-squaresecurity.humanativaspa.itexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkExploiting AMD atdcm64a.sys arbitrary pointer dereference - Part 2plus-squaresecurity.humanativaspa.itbotM to Security DiscussionsEnglish · 5 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 5 days agoExploiting trust: Weaponizing permissive CORS configurationsplus-squareoutpost24.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkExploiting trust: Weaponizing permissive CORS configurationsplus-squareoutpost24.combotM to Security DiscussionsEnglish · 5 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 5 days agoZimbra - Remote Command Execution (CVE-2024-45519)plus-squareblog.projectdiscovery.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkZimbra - Remote Command Execution (CVE-2024-45519)plus-squareblog.projectdiscovery.iobotM to Security DiscussionsEnglish · 5 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 6 days agoVesta Admin Takeover: Exploiting Reduced Seed Entropy in bash $RANDOMplus-squarefortbridge.co.ukexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVesta Admin Takeover: Exploiting Reduced Seed Entropy in bash $RANDOMplus-squarefortbridge.co.ukbotM to Security DiscussionsEnglish · 6 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 6 days agoWhoYouCalling - A tool to get a pcap per process and much more!plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhoYouCalling - A tool to get a pcap per process and much more!plus-squaregithub.combotM to Security DiscussionsEnglish · 6 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 6 days agoFinding classes for exploiting Unsafe Reflection vulnerabilities in Java with Joernplus-squareblog.convisoappsec.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFinding classes for exploiting Unsafe Reflection vulnerabilities in Java with Joernplus-squareblog.convisoappsec.combotM to Security DiscussionsEnglish · 6 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 7 days agoIconv, set the charset to RCE: Exploiting the glibc to hack the PHP engine (part 3)plus-squarewww.ambionics.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIconv, set the charset to RCE: Exploiting the glibc to hack the PHP engine (part 3)plus-squarewww.ambionics.iobotM to Security DiscussionsEnglish · 7 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 8 days agoThe most powerful combination of React ecosystem tools in 2024!plus-squarebeckmoulton.medium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe most powerful combination of React ecosystem tools in 2024!plus-squarebeckmoulton.medium.combotM to Security DiscussionsEnglish · 8 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 9 days agoProbing Slack Workspaces for Authentication Information and other Treatsplus-squarepapermtn.co.ukexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkProbing Slack Workspaces for Authentication Information and other Treatsplus-squarepapermtn.co.ukbotM to Security DiscussionsEnglish · 9 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 9 days agoDNS poisoning in 30M domains caused by the Great Firewallplus-squarewww.assetnote.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDNS poisoning in 30M domains caused by the Great Firewallplus-squarewww.assetnote.iobotM to Security DiscussionsEnglish · 9 days agomessage-square0fedilink