bOt@zerobytes.monsterMB · 1 year agoAnnoying Apple Fans: The Flipper Zero Bluetooth Prank Revealedplus-squaretechryptic.github.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnnoying Apple Fans: The Flipper Zero Bluetooth Prank Revealedplus-squaretechryptic.github.iobOt@zerobytes.monsterMB · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterMB · 1 year agoSession Hijacking Visual Exploitation (SHVE). New tool for XSS Exploitationplus-squareblog.doyensec.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSession Hijacking Visual Exploitation (SHVE). New tool for XSS Exploitationplus-squareblog.doyensec.combOt@zerobytes.monsterMB · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterMB · 1 year agoNew OpenSecurityTraining2 class "Debuggers 3301: HyperDbg" by Sina Karvandi (~16 hours)plus-squareost2.fyiexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew OpenSecurityTraining2 class "Debuggers 3301: HyperDbg" by Sina Karvandi (~16 hours)plus-squareost2.fyibOt@zerobytes.monsterMB · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterMB · 1 year agoNetNTLMv1 Downgrade attacksplus-squarewww.r-tec.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNetNTLMv1 Downgrade attacksplus-squarewww.r-tec.netbOt@zerobytes.monsterMB · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterMB · 1 year agoMashing Enter to bypass Linux full disk encryption with TPM, Clevis, dracut and systemdplus-squarepulsesecurity.co.nzexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMashing Enter to bypass Linux full disk encryption with TPM, Clevis, dracut and systemdplus-squarepulsesecurity.co.nzbOt@zerobytes.monsterMB · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterMB · 1 year agoBypassing Windows Defender LSASS Dump Detection with EvilLsassTwinplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBypassing Windows Defender LSASS Dump Detection with EvilLsassTwinplus-squaregithub.combOt@zerobytes.monsterMB · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterMB · 1 year agoBitLocker, TPM and Pluton | What Are They and How Do They Workplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBitLocker, TPM and Pluton | What Are They and How Do They Workplus-squaregithub.combOt@zerobytes.monsterMB · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterMB · 1 year ago(nodejs) CVEAggregate - Generate and work with EPSS probabilities, CVSS vectors, and CISA-KEV due dates mapped by CVE IDsplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link(nodejs) CVEAggregate - Generate and work with EPSS probabilities, CVSS vectors, and CISA-KEV due dates mapped by CVE IDsplus-squaregithub.combOt@zerobytes.monsterMB · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterMB · 1 year agoA Deep Dive into Brute Ratel C4 payloadsplus-squarecybergeeks.techexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA Deep Dive into Brute Ratel C4 payloadsplus-squarecybergeeks.techbOt@zerobytes.monsterMB · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterMB · 1 year agoUnpinnable Actions: How Malicious Code Can Sneak into Your GitHub Actions Workflowsplus-squarewww.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUnpinnable Actions: How Malicious Code Can Sneak into Your GitHub Actions Workflowsplus-squarewww.paloaltonetworks.combOt@zerobytes.monsterMB · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterMB · 1 year agoConverting Tokens to Session Cookies for Outlook Web Applicationplus-squarelabs.lares.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkConverting Tokens to Session Cookies for Outlook Web Applicationplus-squarelabs.lares.combOt@zerobytes.monsterMB · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterMB · 1 year agoContain Yourself: Staying Undetected Using the Windows Container Isolation Frameworkplus-squarewww.deepinstinct.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkContain Yourself: Staying Undetected Using the Windows Container Isolation Frameworkplus-squarewww.deepinstinct.combOt@zerobytes.monsterMB · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterMB · 1 year agoGitHub - APT64/EternalHushFramework: EternalHush - new free advanced open-source c2 frameworkplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGitHub - APT64/EternalHushFramework: EternalHush - new free advanced open-source c2 frameworkplus-squaregithub.combOt@zerobytes.monsterMB · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterMB · 1 year agoBypassing Defender’s LSASS dump detection and PPL protection In Goplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBypassing Defender’s LSASS dump detection and PPL protection In Goplus-squaregithub.combOt@zerobytes.monsterMB · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterMB · 1 year agoNosyMonkey: API hooking and code injection made easy! - Anvil Secureplus-squarewww.anvilsecure.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNosyMonkey: API hooking and code injection made easy! - Anvil Secureplus-squarewww.anvilsecure.combOt@zerobytes.monsterMB · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterMB · 1 year agoAnti-Deepfake Proposalplus-squarechat.openai.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnti-Deepfake Proposalplus-squarechat.openai.combOt@zerobytes.monsterMB · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterMB · 1 year agoNetHunter Hacker VIII: Wi-Fi hacking using wifite, deauthentication and wardrivingplus-squarewww.mobile-hacker.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNetHunter Hacker VIII: Wi-Fi hacking using wifite, deauthentication and wardrivingplus-squarewww.mobile-hacker.combOt@zerobytes.monsterMB · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterMB · 1 year agoExtending Burp Suite for fun and profit - The Montoya way - Part 4plus-squaresecurity.humanativaspa.itexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkExtending Burp Suite for fun and profit - The Montoya way - Part 4plus-squaresecurity.humanativaspa.itbOt@zerobytes.monsterMB · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterMB · 1 year agonvflashk - Flash any BIOS to NVIDIA GPUs - Safe board ID bypass up to 4xxx seriesplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linknvflashk - Flash any BIOS to NVIDIA GPUs - Safe board ID bypass up to 4xxx seriesplus-squaregithub.combOt@zerobytes.monsterMB · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterMB · 1 year agoAnalysis of Obfuscation Techniques Found in Apple FairPlayplus-squarenicolo.devexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnalysis of Obfuscation Techniques Found in Apple FairPlayplus-squarenicolo.devbOt@zerobytes.monsterMB · 1 year agomessage-square0fedilink