bOt@zerobytes.monsterM · 10 months agoCommand Injection - Compressive Guide & Payloads | VeryLazyTechplus-squarewww.verylazytech.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCommand Injection - Compressive Guide & Payloads | VeryLazyTechplus-squarewww.verylazytech.combOt@zerobytes.monsterM · 10 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 10 months agoThe Burn Notice, Part 2/5 | How We Uncovered a Critical Vulnerability in a Leading AI Agent Frameworkplus-squaremedium.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Burn Notice, Part 2/5 | How We Uncovered a Critical Vulnerability in a Leading AI Agent Frameworkplus-squaremedium.combOt@zerobytes.monsterM · 10 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 10 months agoSleeping Beauty Vulnerability: Bypassing CrowdStrike Falcon With One Simple Trickplus-squaresec-consult.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSleeping Beauty Vulnerability: Bypassing CrowdStrike Falcon With One Simple Trickplus-squaresec-consult.combOt@zerobytes.monsterM · 10 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 10 months agoSitecore: Unsafe Deserialisation Again! (CVE-2025-27218)plus-squareslcyber.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSitecore: Unsafe Deserialisation Again! (CVE-2025-27218)plus-squareslcyber.iobOt@zerobytes.monsterM · 10 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 10 months agoZen and the Art of Microcode Hackingplus-squarebughunters.google.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkZen and the Art of Microcode Hackingplus-squarebughunters.google.combOt@zerobytes.monsterM · 10 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 10 months agoSecurity ROI Explained: “Why Investing in Penetration Testing Saves Your Business” - Laburityplus-squarelaburity.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSecurity ROI Explained: “Why Investing in Penetration Testing Saves Your Business” - Laburityplus-squarelaburity.combOt@zerobytes.monsterM · 10 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 10 months agoMultiple backdoors injected using frontend JSplus-squarecside.devexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMultiple backdoors injected using frontend JSplus-squarecside.devbOt@zerobytes.monsterM · 10 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 10 months agoCase Study: Analyzing macOS IONVMeFamily Driver Denial of Service Issueplus-squareafine.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCase Study: Analyzing macOS IONVMeFamily Driver Denial of Service Issueplus-squareafine.combOt@zerobytes.monsterM · 10 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 10 months agoUnderstanding and Mitigating TOCTOU Vulnerabilities in C# Applicationsplus-squareafine.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUnderstanding and Mitigating TOCTOU Vulnerabilities in C# Applicationsplus-squareafine.combOt@zerobytes.monsterM · 10 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 10 months agoCase study - Getting access to the internal network through a physical pentestplus-squarewww.hackmosphere.frexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCase study - Getting access to the internal network through a physical pentestplus-squarewww.hackmosphere.frbOt@zerobytes.monsterM · 10 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 10 months agoEvilLoader: Yesterday was published PoC for unpatched Vulnerability affecting Telegram for Androidplus-squarewww.mobile-hacker.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEvilLoader: Yesterday was published PoC for unpatched Vulnerability affecting Telegram for Androidplus-squarewww.mobile-hacker.combOt@zerobytes.monsterM · 10 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 10 months agoCase Study: Traditional CVSS scoring missed this actively exploited vulnerability (CVE-2024-50302)plus-squarekston83.github.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCase Study: Traditional CVSS scoring missed this actively exploited vulnerability (CVE-2024-50302)plus-squarekston83.github.iobOt@zerobytes.monsterM · 10 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 10 months agoNew Method to Leverage Unsafe Reflection and Deserialisation to RCE on Railsplus-squarewww.elttam.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Method to Leverage Unsafe Reflection and Deserialisation to RCE on Railsplus-squarewww.elttam.combOt@zerobytes.monsterM · 10 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 10 months ago!exploitable Episode Two - Enter the Matrix. SSHD exploit used by Trinity in the movie The Matrix Reloadedplus-squareblog.doyensec.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link!exploitable Episode Two - Enter the Matrix. SSHD exploit used by Trinity in the movie The Matrix Reloadedplus-squareblog.doyensec.combOt@zerobytes.monsterM · 10 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 10 months agoTechlore video review of BusKill (Open-Source Dead Man Switch) 🔒plus-squarewww.buskill.inexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTechlore video review of BusKill (Open-Source Dead Man Switch) 🔒plus-squarewww.buskill.inbOt@zerobytes.monsterM · 10 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 10 months agoCommunity powered, shift-left, security frameworkplus-squaredocs.thefirewall.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCommunity powered, shift-left, security frameworkplus-squaredocs.thefirewall.orgbOt@zerobytes.monsterM · 10 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 10 months agoHybrid Analysis Deep Dive Into Allegedly AI-Generated FunkSec Ransomwareplus-squarehybrid-analysis.blogspot.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHybrid Analysis Deep Dive Into Allegedly AI-Generated FunkSec Ransomwareplus-squarehybrid-analysis.blogspot.combOt@zerobytes.monsterM · 10 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 10 months agoWe Deliberately Exposed AWS Keys on Developer Forums: Attackers Exploited One in 10 Hoursplus-squarewww.clutch.securityexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWe Deliberately Exposed AWS Keys on Developer Forums: Attackers Exploited One in 10 Hoursplus-squarewww.clutch.securitybOt@zerobytes.monsterM · 10 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 10 months agoDocusnap Inventory Files Encrypted With Static Keyplus-squarewww.redteam-pentesting.deexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDocusnap Inventory Files Encrypted With Static Keyplus-squarewww.redteam-pentesting.debOt@zerobytes.monsterM · 10 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 10 months agoClient-Side Path Traversal - Penetesting guide | @VeryLazyTechplus-squarewww.verylazytech.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkClient-Side Path Traversal - Penetesting guide | @VeryLazyTechplus-squarewww.verylazytech.combOt@zerobytes.monsterM · 10 months agomessage-square0linkfedilink