bOt@zerobytes.monsterM · 1 year agoApache Superset Part II: RCE, Credential Harvesting and Moreplus-squarewww.horizon3.aiexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkApache Superset Part II: RCE, Credential Harvesting and Moreplus-squarewww.horizon3.aibOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoAndroid 14 blocks all modification of system certificates, even as rootplus-squarehttptoolkit.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAndroid 14 blocks all modification of system certificates, even as rootplus-squarehttptoolkit.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoLive API Keys and Source Code Leaked in 4,500 of the Top Alexa Sitesplus-squaretrufflesecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLive API Keys and Source Code Leaked in 4,500 of the Top Alexa Sitesplus-squaretrufflesecurity.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoFlaws in IBM Security Verify allows hackers to steal sensitive informationplus-squaredeform.coexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFlaws in IBM Security Verify allows hackers to steal sensitive informationplus-squaredeform.cobOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoImproving nmap's service scanning accuracy and speed with nmap-service-probes dataplus-squarejoshua.huexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkImproving nmap's service scanning accuracy and speed with nmap-service-probes dataplus-squarejoshua.hubOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoLFI/RCE Vulnerability in WordPress Media Library Assistant Plugin - CVE-2023-4634 - Patrowlplus-squarepatrowl.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLFI/RCE Vulnerability in WordPress Media Library Assistant Plugin - CVE-2023-4634 - Patrowlplus-squarepatrowl.iobOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoVulnHub Kioptrix Level 1.1 CTF Walkthrough - Step-by-step with Explanationsplus-squarekongwenbin.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVulnHub Kioptrix Level 1.1 CTF Walkthrough - Step-by-step with Explanationsplus-squarekongwenbin.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoChepy 6.0.0 released with lots of new changes, capabilities etc. Cyberchef in pure pythonplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChepy 6.0.0 released with lots of new changes, capabilities etc. Cyberchef in pure pythonplus-squaregithub.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoUncovering Web Cache Deception: A Missed Vulnerability in the Most Unexpected Placesplus-squareblog.agilehunt.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUncovering Web Cache Deception: A Missed Vulnerability in the Most Unexpected Placesplus-squareblog.agilehunt.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoNascent Malware Campaign Targets npm, PyPI, and RubyGems Developersplus-squareblog.phylum.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNascent Malware Campaign Targets npm, PyPI, and RubyGems Developersplus-squareblog.phylum.iobOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoUsing Open Source Software Composition Analysis Tool From Google. Presenting the usage of the osv-scanner tool in real-life Python and Java projects. A tool review with pros and cons.plus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUsing Open Source Software Composition Analysis Tool From Google. Presenting the usage of the osv-scanner tool in real-life Python and Java projects. A tool review with pros and cons.plus-squaremedium.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoA full report of penetration test of OPNsense (an open source, FreeBSD based firewall and routing platform).plus-squarelogicaltrust.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA full report of penetration test of OPNsense (an open source, FreeBSD based firewall and routing platform).plus-squarelogicaltrust.netbOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoArbitrary Configuration Injection 💉 (intro)plus-squaresim4n6.beehiiv.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkArbitrary Configuration Injection 💉 (intro)plus-squaresim4n6.beehiiv.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoWordPress website fingerprint techniquesplus-squareblog.sicuranext.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWordPress website fingerprint techniquesplus-squareblog.sicuranext.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoMicrosoft Edge Forensics: Screenshot Historyplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft Edge Forensics: Screenshot Historyplus-squaremedium.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoChina-linked cybercriminals bypass Barracuda’s security patchplus-squaredeform.coexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChina-linked cybercriminals bypass Barracuda’s security patchplus-squaredeform.cobOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoNew advisory: File History Service (fhsvc.dll) Elevation of Privilege - SSD Secure Disclosureplus-squaressd-disclosure.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew advisory: File History Service (fhsvc.dll) Elevation of Privilege - SSD Secure Disclosureplus-squaressd-disclosure.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoSecure FastAPI with eBPFplus-squareavi-lumelsky.medium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSecure FastAPI with eBPFplus-squareavi-lumelsky.medium.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoAnnoying Apple Fans: The Flipper Zero Bluetooth Prank Revealedplus-squaretechryptic.github.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnnoying Apple Fans: The Flipper Zero Bluetooth Prank Revealedplus-squaretechryptic.github.iobOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoSession Hijacking Visual Exploitation (SHVE). New tool for XSS Exploitationplus-squareblog.doyensec.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSession Hijacking Visual Exploitation (SHVE). New tool for XSS Exploitationplus-squareblog.doyensec.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink