bOt@zerobytes.monsterBannedM · 2 years agoA technical analysis of the Quasar-forked RAT called VoidRATplus-squareresources.securityscorecard.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA technical analysis of the Quasar-forked RAT called VoidRATplus-squareresources.securityscorecard.combOt@zerobytes.monsterBannedM · 2 years agomessage-square0linkfedilink
bOt@zerobytes.monsterBannedM · 2 years agoProminent Threat Actor Accidentally Infects Own Computer with Info-Stealerplus-squarewww.hudsonrock.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkProminent Threat Actor Accidentally Infects Own Computer with Info-Stealerplus-squarewww.hudsonrock.combOt@zerobytes.monsterBannedM · 2 years agomessage-square0linkfedilink
bOt@zerobytes.monsterBannedM · 2 years agopromptmap - automatically tests prompt injection attacks on ChatGPT instancesplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkpromptmap - automatically tests prompt injection attacks on ChatGPT instancesplus-squaregithub.combOt@zerobytes.monsterBannedM · 2 years agomessage-square0linkfedilink
bOt@zerobytes.monsterBannedM · 2 years agoHow We Found Another GitHub Actions Environment Injection Vulnerability in a Google Projectplus-squarewww.legitsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow We Found Another GitHub Actions Environment Injection Vulnerability in a Google Projectplus-squarewww.legitsecurity.combOt@zerobytes.monsterBannedM · 2 years agomessage-square0linkfedilink
bOt@zerobytes.monsterBannedM · 2 years agoWelcome New Moderators!plus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareWelcome New Moderators!plus-squarebOt@zerobytes.monsterBannedM · 2 years agomessage-square0linkfedilink
bOt@zerobytes.monsterBannedM · 2 years agoPSC Automation: Using Python to Interact With PortShellCrypter.plus-squarewww.fullspectrum.devexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPSC Automation: Using Python to Interact With PortShellCrypter.plus-squarewww.fullspectrum.devbOt@zerobytes.monsterBannedM · 2 years agomessage-square0linkfedilink
bOt@zerobytes.monsterBannedM · 2 years agoBeyond the Marketing: Assessing Anti-Bot Platforms through a Hacker's Lensplus-squareblog.umasi.devexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBeyond the Marketing: Assessing Anti-Bot Platforms through a Hacker's Lensplus-squareblog.umasi.devbOt@zerobytes.monsterBannedM · 2 years agomessage-square0linkfedilink
bOt@zerobytes.monsterBannedM · 2 years agoVault Range - The Measure and Resilience of Weaponized Exploit Methods for Linuxplus-squarehardenedvault.netexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVault Range - The Measure and Resilience of Weaponized Exploit Methods for Linuxplus-squarehardenedvault.netbOt@zerobytes.monsterBannedM · 2 years agomessage-square0linkfedilink
bOt@zerobytes.monsterBannedM · 2 years agoGitHub - ZephrFish/PotFileUtilsplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGitHub - ZephrFish/PotFileUtilsplus-squaregithub.combOt@zerobytes.monsterBannedM · 2 years agomessage-square0linkfedilink
bOt@zerobytes.monsterBannedM · 2 years agoSatellites lack standard security mechanisms found in mobile phones and laptops - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSatellites lack standard security mechanisms found in mobile phones and laptops - Help Net Securityplus-squarewww.helpnetsecurity.combOt@zerobytes.monsterBannedM · 2 years agomessage-square0linkfedilink
bOt@zerobytes.monsterBannedM · 2 years agoGitHub - FourCoreLabs/LolDriverScan: Scan vulnerable drivers on Windows Systemplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGitHub - FourCoreLabs/LolDriverScan: Scan vulnerable drivers on Windows Systemplus-squaregithub.combOt@zerobytes.monsterBannedM · 2 years agomessage-square0linkfedilink
bOt@zerobytes.monsterBannedM · 2 years agoSonicWall GMS Critical Vulnerabilities Announced | Patches Releasedplus-squarewww.netsurion.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSonicWall GMS Critical Vulnerabilities Announced | Patches Releasedplus-squarewww.netsurion.combOt@zerobytes.monsterBannedM · 2 years agomessage-square0linkfedilink
bOt@zerobytes.monsterBannedM · 2 years agoIAMActionHunter: Identify complex IAM PrivEsc in AWSplus-squarerhinosecuritylabs.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIAMActionHunter: Identify complex IAM PrivEsc in AWSplus-squarerhinosecuritylabs.combOt@zerobytes.monsterBannedM · 2 years agomessage-square0linkfedilink
bOt@zerobytes.monsterBannedM · 2 years agoPass The Salt 2023 Wrap-Up - /dev/randomplus-squareblog.rootshell.beexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPass The Salt 2023 Wrap-Up - /dev/randomplus-squareblog.rootshell.bebOt@zerobytes.monsterBannedM · 2 years agomessage-square0linkfedilink
bOt@zerobytes.monsterBannedM · 2 years agoUpdate: We released version 1.3.0 of the CSTC a few weeks ago. After the review by Portswigger the update is now also available in the BAppStore.plus-squareportswigger.netexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUpdate: We released version 1.3.0 of the CSTC a few weeks ago. After the review by Portswigger the update is now also available in the BAppStore.plus-squareportswigger.netbOt@zerobytes.monsterBannedM · 2 years agomessage-square0linkfedilink
bOt@zerobytes.monsterBannedM · 2 years agoUnveiling the Secrets: LSASS Memory Dump Parsingplus-squarecyvisory.hashnode.devexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUnveiling the Secrets: LSASS Memory Dump Parsingplus-squarecyvisory.hashnode.devbOt@zerobytes.monsterBannedM · 2 years agomessage-square0linkfedilink
bOt@zerobytes.monsterBannedM · 2 years agoUncovering weaknesses in Apple macOS and VMWare vCenter: 12 vulnerabilities in RPC implementationplus-squareblog.talosintelligence.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUncovering weaknesses in Apple macOS and VMWare vCenter: 12 vulnerabilities in RPC implementationplus-squareblog.talosintelligence.combOt@zerobytes.monsterBannedM · 2 years agomessage-square0linkfedilink
bOt@zerobytes.monsterBannedM · 2 years agoPenetrating the Apple: A Deep Dive into macOS Pentestingplus-squarewww.cyberark.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPenetrating the Apple: A Deep Dive into macOS Pentestingplus-squarewww.cyberark.combOt@zerobytes.monsterBannedM · 2 years agomessage-square0linkfedilink
bOt@zerobytes.monsterBannedM · 2 years agoBrute-forcing a macOS user’s real name from a browser using mDNSplus-squarefingerprint.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBrute-forcing a macOS user’s real name from a browser using mDNSplus-squarefingerprint.combOt@zerobytes.monsterBannedM · 2 years agomessage-square0linkfedilink
bOt@zerobytes.monsterBannedM · 2 years agoAgile Approach to Mass Cloud Credential Harvesting and Crypto Mining Sprints Aheadplus-squarepermiso.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAgile Approach to Mass Cloud Credential Harvesting and Crypto Mining Sprints Aheadplus-squarepermiso.iobOt@zerobytes.monsterBannedM · 2 years agomessage-square0linkfedilink