bOt@zerobytes.monsterM · 12 hours agoNaN Of Your Business - My Favorite Unintended CTF Solutionplus-squaremaxwelldulin.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNaN Of Your Business - My Favorite Unintended CTF Solutionplus-squaremaxwelldulin.combOt@zerobytes.monsterM · 12 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 21 hours agoVulnerability Archeology: Stealing Passwords with IBM i Access Client Solutionsplus-squareblog.silentsignal.euexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVulnerability Archeology: Stealing Passwords with IBM i Access Client Solutionsplus-squareblog.silentsignal.eubOt@zerobytes.monsterM · 21 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 21 hours agoReverse Engineering Call Of Duty Anti-Cheatplus-squaressno.ccexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkReverse Engineering Call Of Duty Anti-Cheatplus-squaressno.ccbOt@zerobytes.monsterM · 21 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 day agov0.1.0 released - Analyze IoC with OpenCTI, Threat fox and more #FOSSplus-squarecyberbro.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkv0.1.0 released - Analyze IoC with OpenCTI, Threat fox and more #FOSSplus-squarecyberbro.netbOt@zerobytes.monsterM · 1 day agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 day agoThe cost of false positives - how we became a targetplus-squarecside.devexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe cost of false positives - how we became a targetplus-squarecside.devbOt@zerobytes.monsterM · 1 day agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoMalware Analysis of Fake Banking Reward APK Targeting WhatsApp Usersplus-squaremalwr-analysis.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMalware Analysis of Fake Banking Reward APK Targeting WhatsApp Usersplus-squaremalwr-analysis.combOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoTear Down The Castle - Part 1 | dfir.chplus-squaredfir.chexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTear Down The Castle - Part 1 | dfir.chplus-squaredfir.chbOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoLet’s talk about AI and end-to-end encryptionplus-squareblog.cryptographyengineering.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLet’s talk about AI and end-to-end encryptionplus-squareblog.cryptographyengineering.combOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoWindows BitLocker -- Screwed without a Screwdriverplus-squareneodyme.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWindows BitLocker -- Screwed without a Screwdriverplus-squareneodyme.iobOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 days agoFinding SSRFs in Azure DevOpsplus-squarebinarysecurity.noexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFinding SSRFs in Azure DevOpsplus-squarebinarysecurity.nobOt@zerobytes.monsterM · 4 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 days agoBypassing disk encryption on systems with automatic TPM2 unlockplus-squareoddlama.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBypassing disk encryption on systems with automatic TPM2 unlockplus-squareoddlama.orgbOt@zerobytes.monsterM · 4 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 days agoA publicly available OpenCTI connector for IoC analysis FOSS toolplus-squaredemo.cyberbro.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA publicly available OpenCTI connector for IoC analysis FOSS toolplus-squaredemo.cyberbro.netbOt@zerobytes.monsterM · 4 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 6 days agoThe Role of Emulators in OT Researchplus-squareclaroty.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Role of Emulators in OT Researchplus-squareclaroty.combOt@zerobytes.monsterM · 6 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 6 days agoMicrosoft Configuration Manager (ConfigMgr / SCCM) 2403 Unauthenticated SQL injections (CVE-2024-43468)plus-squarewww.synacktiv.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft Configuration Manager (ConfigMgr / SCCM) 2403 Unauthenticated SQL injections (CVE-2024-43468)plus-squarewww.synacktiv.combOt@zerobytes.monsterM · 6 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 6 days agoHow to Create Vulnerable-Looking Endpoints to Detect and Mislead Attackersplus-squareutkusen.substack.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to Create Vulnerable-Looking Endpoints to Detect and Mislead Attackersplus-squareutkusen.substack.combOt@zerobytes.monsterM · 6 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 6 days agoPoC for CVE-2025-0282 published (Ivanti Connect Secure stack bof)plus-squareattackerkb.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPoC for CVE-2025-0282 published (Ivanti Connect Secure stack bof)plus-squareattackerkb.combOt@zerobytes.monsterM · 6 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 6 days agoKarmada Security Audit - Shielderplus-squarewww.shielder.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkKarmada Security Audit - Shielderplus-squarewww.shielder.combOt@zerobytes.monsterM · 6 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 6 days agoEssential BBOT Commands for Reconplus-squaregcollazo.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEssential BBOT Commands for Reconplus-squaregcollazo.combOt@zerobytes.monsterM · 6 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 6 days ago2024 CVEs in Review – Vulnerability Blogplus-squarevulnerability.blogexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link2024 CVEs in Review – Vulnerability Blogplus-squarevulnerability.blogbOt@zerobytes.monsterM · 6 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 6 days agoEvilKnievelnoVNC: scalable and semi-automated MFA-Phishing via "browser-in-the-middle"plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEvilKnievelnoVNC: scalable and semi-automated MFA-Phishing via "browser-in-the-middle"plus-squaregithub.combOt@zerobytes.monsterM · 6 days agomessage-square0fedilink