(Im)perfectProject(or) - Hacking a small WiFi connected projector for fun and to learn hard lessons
https://axelp.io/ImperfectProjector
https://axelp.io/ImperfectProjector
How I Prevented a Mass Data Breach - $15,000 bounty
https://bxmbn.medium.com/how-i-prevented-a-mass-data-breach-15-000-bounty-bxmbn-1096e6400e3d
https://bxmbn.medium.com/how-i-prevented-a-mass-data-breach-15-000-bounty-bxmbn-1096e6400e3d
Ghost in the Web Shell: Introducing ShellSweep
https://www.splunk.com/en_us/blog/security/ghost-in-the-web-shell-introducing-shellsweep
https://www.splunk.com/en_us/blog/security/ghost-in-the-web-shell-introducing-shellsweep
APT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399)
https://medium.com/cyberscribers-exploring-cybersecurity/apt28-from-initial-damage-to-domain-controller-threats-in-an-hour-cert-ua-8399-1944dd6edcdf
https://medium.com/cyberscribers-exploring-cybersecurity/apt28-from-initial-damage-to-domain-controller-threats-in-an-hour-cert-ua-8399-1944dd6edcdf
A collection of malware families and malware samples which use the Rust programming language
https://github.com/cxiao/rust-malware-gallery
https://github.com/cxiao/rust-malware-gallery
Payload-Generator: An aggressor script that can help automate payload building in Cobalt Strike
https://github.com/Workingdaturah/Payload-Generator
https://github.com/Workingdaturah/Payload-Generator
Moriarty combines the capabilities of Watson and Sherlock, adding enhanced scanning for newer vulnerabilities and integrating additional checks
https://github.com/BC-SECURITY/Moriarty
https://github.com/BC-SECURITY/Moriarty
Hide Your CobaltStrike with CloudFlared Tunnel and Microsoft 100 Traffic%
https://github.com/EvilGreys/Hide-CobaltStrike
https://github.com/EvilGreys/Hide-CobaltStrike
Roles allowing to abuse Entra ID federation for persistence and privilege escalation
https://medium.com/tenable-techblog/roles-allowing-to-abuse-entra-id-federation-for-persistence-and-privilege-escalation-df9ca6e58360
https://medium.com/tenable-techblog/roles-allowing-to-abuse-entra-id-federation-for-persistence-and-privilege-escalation-df9ca6e58360
The Story Behind My First Bug
https://blog.paniago.io/the-history-behind-my-first-bug-539b913b9667
BUG BOUNTY HUNTING (METHODOLOGY , TOOLS , TIPS & TRICKS , Blogs, Books)
https://infosecwriteups.com/bug-bounty-hunting-methodology-tools-tips-tricks-blogs-books-6f84cda7ce34
https://blog.paniago.io/the-history-behind-my-first-bug-539b913b9667
BUG BOUNTY HUNTING (METHODOLOGY , TOOLS , TIPS & TRICKS , Blogs, Books)
https://infosecwriteups.com/bug-bounty-hunting-methodology-tools-tips-tricks-blogs-books-6f84cda7ce34
How to hack IP Cameras easy and fast
https://medium.com/@Threat_Intelligence/how-to-hack-ip-cameras-easy-and-fast-72344c969f80
Hacking APIs: Authentication & Authorization Attacks
https://iaraoz.medium.com/hacking-apis-authentication-authorization-attacks-731902f58b12
https://medium.com/@Threat_Intelligence/how-to-hack-ip-cameras-easy-and-fast-72344c969f80
Hacking APIs: Authentication & Authorization Attacks
https://iaraoz.medium.com/hacking-apis-authentication-authorization-attacks-731902f58b12
I received a Bank offer in my mailbox and discovered an IDOR vulnerability - $5,000 bounty
https://medium.com/@bxmbn/i-received-a-bank-offer-in-my-mailbox-and-discovered-an-idor-vulnerability-5-000-bounty-bxmbn-5209cab1fba8
500$ Access Control Bug: Performed Restricted Actions in Developer Settings by low level user
https://medium.com/@a13h1/500-access-control-bug-performed-restricted-actions-in-developer-settings-by-low-level-user-b4ecaa6d1aa1
https://medium.com/@bxmbn/i-received-a-bank-offer-in-my-mailbox-and-discovered-an-idor-vulnerability-5-000-bounty-bxmbn-5209cab1fba8
500$ Access Control Bug: Performed Restricted Actions in Developer Settings by low level user
https://medium.com/@a13h1/500-access-control-bug-performed-restricted-actions-in-developer-settings-by-low-level-user-b4ecaa6d1aa1
Cybersecurity’s Defining Moments | 7 Lessons from History’s Most Infamous Breaches
https://www.sentinelone.com/blog/cybersecuritys-defining-moments-7-lessons-from-historys-most-infamous-breaches
https://www.sentinelone.com/blog/cybersecuritys-defining-moments-7-lessons-from-historys-most-infamous-breaches
Unveiling Mobile App Secrets: A 6-Month Deep Dive into Surprising Behavior Patterns
https://www.bitdefender.com/blog/labs/unveiling-mobile-app-secrets-a-6-month-deep-dive-into-surprising-behavior-patterns
https://www.bitdefender.com/blog/labs/unveiling-mobile-app-secrets-a-6-month-deep-dive-into-surprising-behavior-patterns
Bob the Smuggler: A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The tool would compress your binary (EXE/DLL) into 7z/zip file format, then XOR encrypt the archive and then hides inside PNG/GIF image file format (Image Polyglots)
https://github.com/TheCyb3rAlpha/BobTheSmuggler
https://github.com/TheCyb3rAlpha/BobTheSmuggler
Breaking the Flash Encryption Feature of Espressif's Parts
https://courk.cc/breaking-flash-encryption-of-espressif-parts
https://courk.cc/breaking-flash-encryption-of-espressif-parts
Thousands of Sites with Popup Builder Compromised by Balada Injector
https://blog.sucuri.net/2024/01/thousands-of-sites-with-popup-builder-compromised-by-balada-injector
https://blog.sucuri.net/2024/01/thousands-of-sites-with-popup-builder-compromised-by-balada-injector
CVE-2023-7028 | Account-Take-Over Gitlab
https://github.com/Vozec/CVE-2023-7028
CVE-2023-36003 (Windows LPE XAML diagnostics API)
https://github.com/m417z/CVE-2023-36003-POC
CVE-2024-20656: Windows LPE in the VSStandardCollectorService150 service
https://github.com/Wh04m1001/CVE-2024-20656
https://github.com/Vozec/CVE-2023-7028
CVE-2023-36003 (Windows LPE XAML diagnostics API)
https://github.com/m417z/CVE-2023-36003-POC
CVE-2024-20656: Windows LPE in the VSStandardCollectorService150 service
https://github.com/Wh04m1001/CVE-2024-20656
swarm: Formerly known as axiom, swarm is the next generation of distributed cloud scanning and attack surface monitoring
https://github.com/swarmsecurity/swarm
https://github.com/swarmsecurity/swarm
Hunting for SSRF Bugs in PDF Generators
https://www.blackhillsinfosec.com/hunting-for-ssrf-bugs-in-pdf-generators
https://www.blackhillsinfosec.com/hunting-for-ssrf-bugs-in-pdf-generators