Reflected XSS on ws-na.amazon-adsystem.com(Amazon) – newp_th – Medium
https://medium.com/@newp_th/reflected-xss-on-ws-na-amazon-adsystem-com-amazon-f1e55f1d24cf
https://medium.com/@newp_th/reflected-xss-on-ws-na-amazon-adsystem-com-amazon-f1e55f1d24cf
Medium
Reflected XSS on ws-na.amazon-adsystem.com(Amazon)
This is @newp_th.This issue is very similar to my previous report on Reflected XSS on Stack Overflow.
Advanced Threat Tactics – Course and Notes | Strategic Cyber LLC
https://blog.cobaltstrike.com/2015/09/30/advanced-threat-tactics-course-and-notes/
https://blog.cobaltstrike.com/2015/09/30/advanced-threat-tactics-course-and-notes/
Expert published a PoC exploit code for RCE flaw in Microsoft Edge
https://securityaffairs.co/wordpress/79264/hacking/microsoft-edge-poc-exploit.html
https://securityaffairs.co/wordpress/79264/hacking/microsoft-edge-poc-exploit.html
Security Affairs
Expert published a PoC exploit code for RCE flaw in Microsoft Edge
The security researcher Bruno Keith from the Phoenhex group published a PoC code for a remote code execution flaw in Microsoft Edge browser (CVE-2018-8629).
Automating AD Enumeration – InfoSec Write-ups – Medium
https://medium.com/bugbountywriteup/automating-ad-enumeration-with-frameworks-f8c7449563be
https://medium.com/bugbountywriteup/automating-ad-enumeration-with-frameworks-f8c7449563be
Medium
Automating AD Enumeration
Doing everything manually is cool, but how do we save time and money? A lot of times most of the enumeration stuff can be automated. But…
Introduction · Dostoevskylabs Pentest Notes
https://dostoevskylabs.gitbooks.io/dostoevskylabs-pentest-notes/content/
https://dostoevskylabs.gitbooks.io/dostoevskylabs-pentest-notes/content/
dostoevskylabs.gitbooks.io
Introduction · Dostoevskylabs Pentest Notes
Exploit Development - InfoSec Reference
https://rmusser.net/docs/Exploit%20Development.html
https://rmusser.net/docs/Exploit%20Development.html
Hunting for Privilege Escalation in Windows Environment - Speaker Deck
https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment
https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment
Speaker Deck
Hunting for Privilege Escalation in Windows Environment
Slides from my talk at the OFFZONE 2018 conference (https://www.offzone.moscow/report/hunting-for-privilege-escalation-in-windows-environment/)
GitHub - sundowndev/hacker-roadmap: A guide for amateurs pen testers and a collection of hacking tools, resources and references to practice ethical hacking, pen testing and web security.
https://github.com/sundowndev/hacker-roadmap
https://github.com/sundowndev/hacker-roadmap
GitHub
GitHub - sundowndev/hacker-roadmap: A collection of hacking tools, resources and references to practice ethical hacking.
A collection of hacking tools, resources and references to practice ethical hacking. - sundowndev/hacker-roadmap
The Enigmatic “Roma225” Campaign – Yoroi Blog
https://blog.yoroi.company/research/the-enigmatic-roma225-campaign/
https://blog.yoroi.company/research/the-enigmatic-roma225-campaign/
Yoroi
The Enigmatic “Roma225” Campaign - Yoroi
Introduction The Cybaze-Yoroi ZLab researchers investigated a recent espionage malware implant weaponized to target companies in the Italian automotive sector. The malware was spread through well written phishing email trying to impersonate a senior partner…
How I was able to delete Google Gallery Data [IDOR]
https://medium.com/@yogeshtantak7788/how-i-was-able-to-delete-google-gallery-data-idor-53d2f303efff
https://medium.com/@yogeshtantak7788/how-i-was-able-to-delete-google-gallery-data-idor-53d2f303efff
Medium
How I was able to delete Google Gallery Data [IDOR]
Hi, This is Yogesh Tantak a Security Researcher from India. Today I am writing about a critical bug that I found in Google’s new Product…
Bypassing Windows User Account Control – d3struct0 – Medium
https://www.peerlyst.com/posts/bypassing-windows-user-account-control-ian-barwise-m-s-cissp-ceh-cnda
https://www.peerlyst.com/posts/bypassing-windows-user-account-control-ian-barwise-m-s-cissp-ceh-cnda
How to bypass AMSI and execute ANY malicious Powershell code | zc00l blog
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
zc00l blog
How to bypass AMSI and execute ANY malicious Powershell code
Hello again. In my previous posts I detailed how to manually get SYSTEM shell from Local Administrators users. That’s interesting but very late game during a penetration assessment as it is presumed that you already owned the target machine.
How to perform the static analysis of website source code with the browser — the beginner’s bug…
https://medium.com/@_bl4de/how-to-perform-the-static-analysis-of-website-source-code-with-the-browser-the-beginners-bug-d674828c8d9a
https://medium.com/@_bl4de/how-to-perform-the-static-analysis-of-website-source-code-with-the-browser-the-beginners-bug-d674828c8d9a
Yes, More Callbacks — The Kernel Extension Mechanism
https://medium.com/yarden-shafir/yes-more-callbacks-the-kernel-extension-mechanism-c7300119a37a
https://medium.com/yarden-shafir/yes-more-callbacks-the-kernel-extension-mechanism-c7300119a37a
Medium
Yes, More Callbacks — The Kernel Extension Mechanism
Recently I had to write a kernel-mode driver. This has made a lot of people very angry and been widely regarded as a bad move. (Douglas…
A Review of my Bug Hunting Journey - My Learning Journey
https://kongwenbin.com/a-review-of-my-bug-hunting-journey/
https://kongwenbin.com/a-review-of-my-bug-hunting-journey/
My Learning Journey
A Review of my Bug Hunting Journey
A review of my bug hunting journey so far, from when I started, to the point where I made it into the Top 200 bug hunters on Bugcrowd after two years.
Sputnik — An Open Source Intelligence Browser Extension
https://medium.com/bugbountywriteup/sputnik-an-open-source-intelligence-browser-extension-da2f2c22c8ec
https://medium.com/bugbountywriteup/sputnik-an-open-source-intelligence-browser-extension-da2f2c22c8ec
Medium
Sputnik — An Open Source Intelligence Browser Extension
Summary
Bash Cookbook for Everyone — Part 1 – ehsahil – Medium
https://medium.com/ehsahil/bash-cookbook-for-everyone-part-1-cc98251e2887
https://medium.com/ehsahil/bash-cookbook-for-everyone-part-1-cc98251e2887
Medium
Bash for Everyone — Part 1
Hi Guys,
Bash Cookbook for Everyone — Part 2 – ehsahil – Medium
https://medium.com/ehsahil/bash-cookbook-for-everyone-part-2-b70d40610025
https://medium.com/ehsahil/bash-cookbook-for-everyone-part-2-b70d40610025
Medium
Bash for Everyone — Part 2
Part-1