@repostbot33@lemmy.worldBEnglish • 1 year agoHow to Emulate a Ransomware Attackplus-squarepracticalsecurityanalytics.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to Emulate a Ransomware Attackplus-squarepracticalsecurityanalytics.com@repostbot33@lemmy.worldBEnglish • 1 year agomessage-square0fedilink
@repostbot33@lemmy.worldBEnglish • 1 year agoOpen Source - Terminal based AI Powered Ethical Hacking Assistant.plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOpen Source - Terminal based AI Powered Ethical Hacking Assistant.plus-squaregithub.com@repostbot33@lemmy.worldBEnglish • 1 year agomessage-square0fedilink
@repostbot33@lemmy.worldBEnglish • 1 year agoCVE-2024-1212: Unauthenticated Command Injection In Progress Kemp LoadMasterplus-squarerhinosecuritylabs.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCVE-2024-1212: Unauthenticated Command Injection In Progress Kemp LoadMasterplus-squarerhinosecuritylabs.com@repostbot33@lemmy.worldBEnglish • 1 year agomessage-square0fedilink
@repostbot33@lemmy.worldBEnglish • 1 year agoFrom Error to Entry: Cracking the Code of Password-Spraying Toolsplus-squaretrustedsec.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFrom Error to Entry: Cracking the Code of Password-Spraying Toolsplus-squaretrustedsec.com@repostbot33@lemmy.worldBEnglish • 1 year agomessage-square0fedilink
@repostbot33@lemmy.worldBEnglish • 1 year agoNew Short Episode Podcast ft. Insane Stories from Real Penetration Testsplus-squarewww.youtube.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Short Episode Podcast ft. Insane Stories from Real Penetration Testsplus-squarewww.youtube.com@repostbot33@lemmy.worldBEnglish • 1 year agomessage-square0fedilink
@repostbot33@lemmy.worldBEnglish • 1 year agoWeaponizing Windows Thread Pool APIs: Proxying DLL Loads Using I/O Completion Callbacksplus-squarefin3ss3g0d.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWeaponizing Windows Thread Pool APIs: Proxying DLL Loads Using I/O Completion Callbacksplus-squarefin3ss3g0d.net@repostbot33@lemmy.worldBEnglish • 1 year agomessage-square0fedilink
@repostbot33@lemmy.worldBEnglish • 1 year agoHow Rogue ISPs Tamper With Geofeedsplus-squaremedium.commessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow Rogue ISPs Tamper With Geofeedsplus-squaremedium.com@repostbot33@lemmy.worldBEnglish • 1 year agomessage-square0fedilink
@repostbot33@lemmy.worldBEnglish • 1 year agoMicrosoft AITM honeytoken: warning the victimsplus-squarezolder.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft AITM honeytoken: warning the victimsplus-squarezolder.io@repostbot33@lemmy.worldBEnglish • 1 year agomessage-square0fedilink
@repostbot33@lemmy.worldBEnglish • 1 year agoExploit Development: No Code Execution? No Problem! Living The Age of VBS, HVCI, and Kernel CFGplus-squareconnormcgarr.github.iomessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkExploit Development: No Code Execution? No Problem! Living The Age of VBS, HVCI, and Kernel CFGplus-squareconnormcgarr.github.io@repostbot33@lemmy.worldBEnglish • 1 year agomessage-square0fedilink
@repostbot33@lemmy.worldBEnglish • 1 year agoBypassing USBGuard on Linuxplus-squarepulsesecurity.co.nzmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBypassing USBGuard on Linuxplus-squarepulsesecurity.co.nz@repostbot33@lemmy.worldBEnglish • 1 year agomessage-square0fedilink
@repostbot33@lemmy.worldBEnglish • 1 year agoGaining kernel code execution on an MTE-enabled Pixel 8plus-squaregithub.blogexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGaining kernel code execution on an MTE-enabled Pixel 8plus-squaregithub.blog@repostbot33@lemmy.worldBEnglish • 1 year agomessage-square0fedilink
@repostbot33@lemmy.worldBEnglish • 1 year agoSocial Minefield - a higher stakes game of Minesweeper using Clickjackingplus-squaresocial-minefield.commessage-square0fedilinkarrow-up11arrow-down10cross-posted to: netsec@lemmy.world
arrow-up11arrow-down1external-linkSocial Minefield - a higher stakes game of Minesweeper using Clickjackingplus-squaresocial-minefield.com@repostbot33@lemmy.worldBEnglish • 1 year agomessage-square0fedilinkcross-posted to: netsec@lemmy.world
@repostbot33@lemmy.worldBEnglish • 1 year agoReturn Oriented Programming Buffer Overflow Exploitation Part 1 - In Lab Exerciseplus-squarevandanpathak.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkReturn Oriented Programming Buffer Overflow Exploitation Part 1 - In Lab Exerciseplus-squarevandanpathak.com@repostbot33@lemmy.worldBEnglish • 1 year agomessage-square0fedilink
@repostbot33@lemmy.worldBEnglish • 1 year agoOauth implementation flaws allow access to private repos via ChatGPT pluginsplus-squaresalt.securityexternal-linkmessage-square0fedilinkarrow-up11arrow-down10cross-posted to: netsec@lemmy.worldnetsec@lemmy.worldnetsec@lemmy.worldnetsec@lemmy.worldnetsec@lemmy.world
arrow-up11arrow-down1external-linkOauth implementation flaws allow access to private repos via ChatGPT pluginsplus-squaresalt.security@repostbot33@lemmy.worldBEnglish • 1 year agomessage-square0fedilinkcross-posted to: netsec@lemmy.worldnetsec@lemmy.worldnetsec@lemmy.worldnetsec@lemmy.worldnetsec@lemmy.world