bOt@zerobytes.monsterM · 1 day ago60-pages guide on how to use Bettercap on Androidplus-squarewww.mobile-hacker.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link60-pages guide on how to use Bettercap on Androidplus-squarewww.mobile-hacker.combOt@zerobytes.monsterM · 1 day agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoIntroducing keycred: A cross-platform tool for handling Active Directory Shadow Credentials/msDS-KeyCredentialLinkplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIntroducing keycred: A cross-platform tool for handling Active Directory Shadow Credentials/msDS-KeyCredentialLinkplus-squaregithub.combOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoTop Hacking Tools and Skills You Need to Learn in 2025plus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTop Hacking Tools and Skills You Need to Learn in 2025plus-squaremedium.combOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days ago300% increase in endpoint malware detections - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link300% increase in endpoint malware detections - Help Net Securityplus-squarewww.helpnetsecurity.combOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoRANsacked: Over 100 Security Flaws Found in LTE/5G Network Implementationsplus-squarecellularsecurity.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRANsacked: Over 100 Security Flaws Found in LTE/5G Network Implementationsplus-squarecellularsecurity.orgbOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoNew Java Runtime Reverse Engineering Tool (Injected DLL, Runtime Bytecode & Heap Analysis)plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Java Runtime Reverse Engineering Tool (Injected DLL, Runtime Bytecode & Heap Analysis)plus-squaregithub.combOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoHow vulnerable are company leaders to phishing attacks ? Results of our studyplus-squarewww.hackmosphere.frexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow vulnerable are company leaders to phishing attacks ? Results of our studyplus-squarewww.hackmosphere.frbOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoHow to prove false statements? (Part 3)plus-squareblog.cryptographyengineering.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to prove false statements? (Part 3)plus-squareblog.cryptographyengineering.combOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 3 days agoAchieving RCE in famous Japanese chat tool with an obsolete Electron featureplus-squareflatt.techexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAchieving RCE in famous Japanese chat tool with an obsolete Electron featureplus-squareflatt.techbOt@zerobytes.monsterM · 3 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 3 days agoIvanti Endpoint Manager Credential Coercion Vulnerabilities Deep-Diveplus-squarewww.horizon3.aiexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIvanti Endpoint Manager Credential Coercion Vulnerabilities Deep-Diveplus-squarewww.horizon3.aibOt@zerobytes.monsterM · 3 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 3 days agoReinventing PowerShell in C/C++plus-squareblog.scrt.chexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkReinventing PowerShell in C/C++plus-squareblog.scrt.chbOt@zerobytes.monsterM · 3 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 days agoEveryday Ghidra: How Platform Choice Influences Ghidra’s Binary Analysisplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEveryday Ghidra: How Platform Choice Influences Ghidra’s Binary Analysisplus-squaremedium.combOt@zerobytes.monsterM · 4 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 days agoMicrosoft Edge Developer VM Remote Code Executionplus-squareinfosec.rm-it.deexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft Edge Developer VM Remote Code Executionplus-squareinfosec.rm-it.debOt@zerobytes.monsterM · 4 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 days agoPasskey Raider: Burp Suite Extension for Pentesting Passkey (Pentest & Bug Bounty)plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPasskey Raider: Burp Suite Extension for Pentesting Passkey (Pentest & Bug Bounty)plus-squaregithub.combOt@zerobytes.monsterM · 4 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 days agoArechclient2 (sectopRAT) Analysis – A Highly Obfuscated .NET RAT with Malicious Chrome Extensionplus-squaremalwr-analysis.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkArechclient2 (sectopRAT) Analysis – A Highly Obfuscated .NET RAT with Malicious Chrome Extensionplus-squaremalwr-analysis.combOt@zerobytes.monsterM · 4 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 5 days agoInteractive demo of an SSH honeypot using AI (open-source)plus-squaretrapster.cloudexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInteractive demo of an SSH honeypot using AI (open-source)plus-squaretrapster.cloudbOt@zerobytes.monsterM · 5 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 5 days agoAnnouncing the Incident response program pack 1.5plus-squarewww.sectemplates.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnnouncing the Incident response program pack 1.5plus-squarewww.sectemplates.combOt@zerobytes.monsterM · 5 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 6 days agoHow to approach network protocol fuzzingplus-squareboofuzz.readthedocs.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to approach network protocol fuzzingplus-squareboofuzz.readthedocs.iobOt@zerobytes.monsterM · 6 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 7 days agoPyCript WebSocket - Burp Suite extension for bypassing client-side encryption in Web Socket Messagesplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPyCript WebSocket - Burp Suite extension for bypassing client-side encryption in Web Socket Messagesplus-squaregithub.combOt@zerobytes.monsterM · 7 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 8 days agoApplied for an OSINT Job—Turns Out It Never Existedplus-squarehetheringtongroup.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkApplied for an OSINT Job—Turns Out It Never Existedplus-squarehetheringtongroup.combOt@zerobytes.monsterM · 8 days agomessage-square0fedilink