Forwarded from Ghost
active directory hacking stream at https://www.twitch.tv/mantissts if anyone is interested
Twitch
MantisSTS - Twitch
Just someone who breaks things
Forwarded from cKure
■■■■■ Teaching Burp a new HTTP Transport Encoding.
https://www.pentagrid.ch/en/blog/teaching_burp_a_new_http_transport_encoding/
https://www.pentagrid.ch/en/blog/teaching_burp_a_new_http_transport_encoding/
Pentagrid AG
Teaching Burp a new HTTP Transport Encoding
Forwarded from The Bug Bounty Hunter
pipe-intercept
Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools https://github.com/gabriel-sztejnworcel/pipe-intercept
Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools https://github.com/gabriel-sztejnworcel/pipe-intercept
GitHub
GitHub - gabriel-sztejnworcel/pipe-intercept: Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools
Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools - gabriel-sztejnworcel/pipe-intercept
Forwarded from RedBlueTM Hit (Hide01)
Intel Techniques - Open Source Intelligence Techniques (OSINT) 2022
Download For FREE: hide01.ir/open-source-intelligence-techniques
@Hide01 📰
@RedBlueHit 💀👀
@RedBlueTM 🔒
Download For FREE: hide01.ir/open-source-intelligence-techniques
@Hide01 📰
@RedBlueHit 💀👀
@RedBlueTM 🔒
Forwarded from cKure
■■■□□ If you often find yourself dealing with too many Repeater tabs, then you're going to love Burp's new tab grouping feature.
New Repeater features to help you test more efficiently.
https://portswigger.net/blog/new-repeater-features-to-help-you-test-more-efficiently
New Repeater features to help you test more efficiently.
https://portswigger.net/blog/new-repeater-features-to-help-you-test-more-efficiently
PortSwigger Blog
New Repeater features to help you test more efficiently
If you use Burp Suite Professional or Burp Suite Community Edition for manual security testing, then you'll be familiar with tools like Burp Repeater and Burp Intruder. They make life as a tester much
Forwarded from cKure
■■■■■ Zero-Day: Untethered + Unsandboxed code execution haxx as root on iOS 14 - iOS 14.8.1 (dev - @riscv64).
https://github.com/asdfugil/haxx
https://github.com/asdfugil/haxx
GitHub
GitHub - asdfugil/haxx: Untethered + Unsandboxed code execution haxx as root on iOS 14 - iOS 14.8.1.
Untethered + Unsandboxed code execution haxx as root on iOS 14 - iOS 14.8.1. - asdfugil/haxx
#web #burp
Send traffic from VPS to local Burp
You can send requests from your remote server to your local BURP using SSH. To do this, it is enough to perform port forwarding when connecting. Those who play CTF are probably familiar with this.
It is enough to connect to your VPS using the command:
ssh -R 8080:127.0.0.1:8080 root@VPS_IP -f -N
Now on the VPS you can run anything with a proxy and the traffic will go through your local Burp:
curl http://example.com -x http://127.0.0.1:8080
@Library_Sec
Send traffic from VPS to local Burp
You can send requests from your remote server to your local BURP using SSH. To do this, it is enough to perform port forwarding when connecting. Those who play CTF are probably familiar with this.
It is enough to connect to your VPS using the command:
ssh -R 8080:127.0.0.1:8080 root@VPS_IP -f -N
Now on the VPS you can run anything with a proxy and the traffic will go through your local Burp:
curl http://example.com -x http://127.0.0.1:8080
@Library_Sec
Forwarded from Hacking tools collection (Prin sharma #)
Medium
Setting iOS App Testing Environment with Burp-suite & Corellium
Corellium iOS App Testing with Burp-suite
Forwarded from Android Security & Malware
Bypassing advance root detections using Frida
Techniques learned from video:
-presence of SU binary
-SELinux policies
-mountinfo
-attr/prev
-looking for SU bin paths using Supervisor calls
Video: https://youtu.be/7KqPwxlA-00
Scripts and POCs: https://github.com/fatalSec/in-app-protections
Techniques learned from video:
-presence of SU binary
-SELinux policies
-mountinfo
-attr/prev
-looking for SU bin paths using Supervisor calls
Video: https://youtu.be/7KqPwxlA-00
Scripts and POCs: https://github.com/fatalSec/in-app-protections
YouTube
Bypassing advance root detections using Frida
#mobilesecurity #rootdetection #android #mobilepentesting #reverseengineering #radare2 #arm64
Hello everyone, hope you all are doing good.
In this video, we are going to learn various different techniques used by app developers to protect their app from…
Hello everyone, hope you all are doing good.
In this video, we are going to learn various different techniques used by app developers to protect their app from…
Forwarded from The Senior Intern
Yo what's up ! You pretty much know ki Twitter algorithm is going crazy these days.
We Infosec buds, being maniacs mostly want to read and get updates/information about the ongoing trends in Information Security. Thou, We only get to see irrelevant memes/OF stuffs/etc.
We at Hacklido heard those voices and came up with our own Infosec-Social Community where you can
- Post/Tweet
- Reply
- Interact/Chat
- Save posts, etc.
I invite you to https://cybersec.community/
Sign up & Join us at our beta stage and help us grow Infosec community.
We Infosec buds, being maniacs mostly want to read and get updates/information about the ongoing trends in Information Security. Thou, We only get to see irrelevant memes/OF stuffs/etc.
We at Hacklido heard those voices and came up with our own Infosec-Social Community where you can
- Post/Tweet
- Reply
- Interact/Chat
- Save posts, etc.
I invite you to https://cybersec.community/
Sign up & Join us at our beta stage and help us grow Infosec community.