botM to Security DiscussionsEnglish · 1 day agoExploring Deserialization Attacks and Their Effectsplus-squarehaymiz.devexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkExploring Deserialization Attacks and Their Effectsplus-squarehaymiz.devbotM to Security DiscussionsEnglish · 1 day agomessage-square0fedilink
botM to Security DiscussionsEnglish · 1 day agoCVE-2024-29847 Deep Dive: Ivanti Endpoint Manager AgentPortal Deserialization of Untrusted Data Remote Code Execution Vulnerability – Horizon3.aiplus-squarewww.horizon3.aiexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCVE-2024-29847 Deep Dive: Ivanti Endpoint Manager AgentPortal Deserialization of Untrusted Data Remote Code Execution Vulnerability – Horizon3.aiplus-squarewww.horizon3.aibotM to Security DiscussionsEnglish · 1 day agomessage-square0fedilink
botM to Security DiscussionsEnglish · 2 days agoAlcaWASM Challenge Writeup - Pwning an In-Browser Lua Interpreterplus-squarededa.lolexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAlcaWASM Challenge Writeup - Pwning an In-Browser Lua Interpreterplus-squarededa.lolbotM to Security DiscussionsEnglish · 2 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 2 days agoCVE-2024-38014 0-day - Microsoft Windows MSI Installer - Repair to SYSTEM + msiscan open-source detection toolplus-squarer.sec-consult.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCVE-2024-38014 0-day - Microsoft Windows MSI Installer - Repair to SYSTEM + msiscan open-source detection toolplus-squarer.sec-consult.combotM to Security DiscussionsEnglish · 2 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 2 days agoBlog Post: Intelligent Adversary Emulation with the Bounty Hunterplus-squarelolcads.github.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBlog Post: Intelligent Adversary Emulation with the Bounty Hunterplus-squarelolcads.github.iobotM to Security DiscussionsEnglish · 2 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 2 days agoSSH Keystroke Obfuscation Bypassplus-squarecrzphil.github.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSSH Keystroke Obfuscation Bypassplus-squarecrzphil.github.iobotM to Security DiscussionsEnglish · 2 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 2 days agoWhy Django’s [DEBUG=True] is a Goldmine for Hackersplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhy Django’s [DEBUG=True] is a Goldmine for Hackersplus-squaremedium.combotM to Security DiscussionsEnglish · 2 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 2 days agoA new TrickMo saga: from Banking Trojan to Victim's Data Leak | Cleafy Labsplus-squarewww.cleafy.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA new TrickMo saga: from Banking Trojan to Victim's Data Leak | Cleafy Labsplus-squarewww.cleafy.combotM to Security DiscussionsEnglish · 2 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 2 days agoWe Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI - watchTowr Labsplus-squarelabs.watchtowr.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWe Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI - watchTowr Labsplus-squarelabs.watchtowr.combotM to Security DiscussionsEnglish · 2 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 2 days agoThe Security Canary Maturity Modelplus-squaretracebit.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Security Canary Maturity Modelplus-squaretracebit.combotM to Security DiscussionsEnglish · 2 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 2 days agoBlog Series on Android Bytecode Exploitationplus-squarelolcads.github.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBlog Series on Android Bytecode Exploitationplus-squarelolcads.github.iobotM to Security DiscussionsEnglish · 2 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 2 days agoFeeld dating app - Your nudes and data were publicly availableplus-squarefortbridge.co.ukexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFeeld dating app - Your nudes and data were publicly availableplus-squarefortbridge.co.ukbotM to Security DiscussionsEnglish · 2 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 4 days agoCloudGoat Official Walkthrough Series: ‘glue_privesc’plus-squarerhinosecuritylabs.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCloudGoat Official Walkthrough Series: ‘glue_privesc’plus-squarerhinosecuritylabs.combotM to Security DiscussionsEnglish · 4 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 4 days agoHijacking SQL Server Credentials using Agent Jobs for Domain Privilege Escalationplus-squarewww.netspi.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHijacking SQL Server Credentials using Agent Jobs for Domain Privilege Escalationplus-squarewww.netspi.combotM to Security DiscussionsEnglish · 4 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 4 days agoBrowser Stored Credentialsplus-squareipurple.teamexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBrowser Stored Credentialsplus-squareipurple.teambotM to Security DiscussionsEnglish · 4 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 5 days agoWhen Certificates Fail: A Story of Bypassed MFA in Remote Accessplus-squareedermi.github.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhen Certificates Fail: A Story of Bypassed MFA in Remote Accessplus-squareedermi.github.iobotM to Security DiscussionsEnglish · 5 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 5 days agoVeeam Backup & Response - RCE With Auth, But Mostly Without Auth (CVE-2024-40711)plus-squarelabs.watchtowr.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVeeam Backup & Response - RCE With Auth, But Mostly Without Auth (CVE-2024-40711)plus-squarelabs.watchtowr.combotM to Security DiscussionsEnglish · 5 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 5 days agoAnalysis of GitHub Enterprise vulnerabilities (CVE-2024-0507/CVE-2024-0200)plus-squareblog.convisoappsec.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnalysis of GitHub Enterprise vulnerabilities (CVE-2024-0507/CVE-2024-0200)plus-squareblog.convisoappsec.combotM to Security DiscussionsEnglish · 5 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 5 days agoCompanion scanner for mockingjay injection - My approach to DLL scanning in search for RWX regionsplus-squarebrunopincho.github.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCompanion scanner for mockingjay injection - My approach to DLL scanning in search for RWX regionsplus-squarebrunopincho.github.iobotM to Security DiscussionsEnglish · 5 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 5 days agoHow EDR works: the (Anti-)EDR Compendiumplus-squareblog.deeb.chexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow EDR works: the (Anti-)EDR Compendiumplus-squareblog.deeb.chbotM to Security DiscussionsEnglish · 5 days agomessage-square0fedilink