bOt@zerobytes.monsterM · 1 year agoDissect : hi all looking for command dissect framework : how can i export image file or just it. how can check hash for hidden file or restore file, i try it by going true the documation but i cou...plus-squaredocs.dissect.toolsexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDissect : hi all looking for command dissect framework : how can i export image file or just it. how can check hash for hidden file or restore file, i try it by going true the documation but i cou...plus-squaredocs.dissect.toolsbOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoDogeRAT malware targets Indian users (tracks Locations, makes illegal payments, and more)plus-squaredeform.coexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDogeRAT malware targets Indian users (tracks Locations, makes illegal payments, and more)plus-squaredeform.cobOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoApache Superset Part II: RCE, Credential Harvesting and Moreplus-squarewww.horizon3.aiexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkApache Superset Part II: RCE, Credential Harvesting and Moreplus-squarewww.horizon3.aibOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoMain Analytical Frameworks for CTIplus-squaresocradar.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMain Analytical Frameworks for CTIplus-squaresocradar.iobOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoeBPF Offensive Capabilitiesplus-squaresysdig.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkeBPF Offensive Capabilitiesplus-squaresysdig.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoXSS vulnerability in Proton Mail allowed to leak unencrypted emailsplus-squarewww.sonarsource.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkXSS vulnerability in Proton Mail allowed to leak unencrypted emailsplus-squarewww.sonarsource.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoHow to Write a Secure JWT Library If You Absolutely Mustplus-squarescottarc.blogexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to Write a Secure JWT Library If You Absolutely Mustplus-squarescottarc.blogbOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoLord Of The Ring0 part 5 is out (kernel development series)plus-squareidov31.github.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLord Of The Ring0 part 5 is out (kernel development series)plus-squareidov31.github.iobOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoPeeking under the bonnet of the Litter Robot 3plus-squarewww.elttam.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPeeking under the bonnet of the Litter Robot 3plus-squarewww.elttam.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoAndroid 14 blocks all modification of system certificates, even as rootplus-squarehttptoolkit.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAndroid 14 blocks all modification of system certificates, even as rootplus-squarehttptoolkit.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoLive API Keys and Source Code Leaked in 4,500 of the Top Alexa Sitesplus-squaretrufflesecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLive API Keys and Source Code Leaked in 4,500 of the Top Alexa Sitesplus-squaretrufflesecurity.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoFlaws in IBM Security Verify allows hackers to steal sensitive informationplus-squaredeform.coexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFlaws in IBM Security Verify allows hackers to steal sensitive informationplus-squaredeform.cobOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoAnalysis of a new Facebook profile stealer written in Node.jsplus-squarewww.trendmicro.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnalysis of a new Facebook profile stealer written in Node.jsplus-squarewww.trendmicro.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoImproving nmap's service scanning accuracy and speed with nmap-service-probes dataplus-squarejoshua.huexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkImproving nmap's service scanning accuracy and speed with nmap-service-probes dataplus-squarejoshua.hubOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoLFI/RCE Vulnerability in WordPress Media Library Assistant Plugin - CVE-2023-4634 - Patrowlplus-squarepatrowl.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLFI/RCE Vulnerability in WordPress Media Library Assistant Plugin - CVE-2023-4634 - Patrowlplus-squarepatrowl.iobOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoWhen URL parsers disagree (CVE-2023-38633)plus-squarewww.canva.devexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhen URL parsers disagree (CVE-2023-38633)plus-squarewww.canva.devbOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoVulnHub Kioptrix Level 1.1 CTF Walkthrough - Step-by-step with Explanationsplus-squarekongwenbin.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVulnHub Kioptrix Level 1.1 CTF Walkthrough - Step-by-step with Explanationsplus-squarekongwenbin.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoChepy 6.0.0 released with lots of new changes, capabilities etc. Cyberchef in pure pythonplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChepy 6.0.0 released with lots of new changes, capabilities etc. Cyberchef in pure pythonplus-squaregithub.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoUncovering Web Cache Deception: A Missed Vulnerability in the Most Unexpected Placesplus-squareblog.agilehunt.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUncovering Web Cache Deception: A Missed Vulnerability in the Most Unexpected Placesplus-squareblog.agilehunt.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoNascent Malware Campaign Targets npm, PyPI, and RubyGems Developersplus-squareblog.phylum.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNascent Malware Campaign Targets npm, PyPI, and RubyGems Developersplus-squareblog.phylum.iobOt@zerobytes.monsterM · 1 year agomessage-square0fedilink