You can be a kernel hacker!
https://jvns.ca/blog/2014/09/18/you-can-be-a-kernel-hacker/
https://jvns.ca/blog/2014/09/18/you-can-be-a-kernel-hacker/
Forwarded from Bug Bounty (Amir Kiani)
YouTube
BSidesMCR 2018: Practical Web Cache Poisoning: Redefining 'Unexploitable' by James Kettle
Request Encoding to bypass web application firewalls
https://soroush.secproject.com/blog/2017/09/additional-notes-on-a-forgotten-http-invisibility-cloak-talk/
https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2017/august/request-encoding-to-bypass-web-application-firewalls/
https://www.slideshare.net/SoroushDalili/waf-bypass-techniques-using-http-standard-and-web-servers-behaviour
https://soroush.secproject.com/blog/2017/09/additional-notes-on-a-forgotten-http-invisibility-cloak-talk/
https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2017/august/request-encoding-to-bypass-web-application-firewalls/
https://www.slideshare.net/SoroushDalili/waf-bypass-techniques-using-http-standard-and-web-servers-behaviour
SlideShare
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour - Download as a PDF or view online for free
Bug Bounty
https://www.youtube.com/watch?v=iSDoUGjfW3Q
HackerOne
GSA Bounty disclosed on HackerOne: Defacement of catalog.data.gov...
An attacker can deface various pages on catalog.data.gov, leading to them executing malicious JavaScript when visited by a normal user.
The root problem is that the server trusts the...
The root problem is that the server trusts the...
https://github.com/whid-injector/WHID
Opensource Low Cost Hacking Tool for Conducting HID Attacks and Bypass AirGapped Environments
Opensource Low Cost Hacking Tool for Conducting HID Attacks and Bypass AirGapped Environments
GitHub
GitHub - whid-injector/WHID: WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.
WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids. - whid-injector/WHID