How to perform the static analysis of website source code with the browser — the beginner’s bug…
https://medium.com/@_bl4de/how-to-perform-the-static-analysis-of-website-source-code-with-the-browser-the-beginners-bug-d674828c8d9a
https://medium.com/@_bl4de/how-to-perform-the-static-analysis-of-website-source-code-with-the-browser-the-beginners-bug-d674828c8d9a
Yes, More Callbacks — The Kernel Extension Mechanism
https://medium.com/yarden-shafir/yes-more-callbacks-the-kernel-extension-mechanism-c7300119a37a
https://medium.com/yarden-shafir/yes-more-callbacks-the-kernel-extension-mechanism-c7300119a37a
Medium
Yes, More Callbacks — The Kernel Extension Mechanism
Recently I had to write a kernel-mode driver. This has made a lot of people very angry and been widely regarded as a bad move. (Douglas…
A Review of my Bug Hunting Journey - My Learning Journey
https://kongwenbin.com/a-review-of-my-bug-hunting-journey/
https://kongwenbin.com/a-review-of-my-bug-hunting-journey/
My Learning Journey
A Review of my Bug Hunting Journey
A review of my bug hunting journey so far, from when I started, to the point where I made it into the Top 200 bug hunters on Bugcrowd after two years.
Sputnik — An Open Source Intelligence Browser Extension
https://medium.com/bugbountywriteup/sputnik-an-open-source-intelligence-browser-extension-da2f2c22c8ec
https://medium.com/bugbountywriteup/sputnik-an-open-source-intelligence-browser-extension-da2f2c22c8ec
Medium
Sputnik — An Open Source Intelligence Browser Extension
Summary
Bash Cookbook for Everyone — Part 1 – ehsahil – Medium
https://medium.com/ehsahil/bash-cookbook-for-everyone-part-1-cc98251e2887
https://medium.com/ehsahil/bash-cookbook-for-everyone-part-1-cc98251e2887
Medium
Bash for Everyone — Part 1
Hi Guys,
Bash Cookbook for Everyone — Part 2 – ehsahil – Medium
https://medium.com/ehsahil/bash-cookbook-for-everyone-part-2-b70d40610025
https://medium.com/ehsahil/bash-cookbook-for-everyone-part-2-b70d40610025
Medium
Bash for Everyone — Part 2
Part-1
Phishing NG. Bypassing 2FA with Modlishka. – duszynski.eu – Piotr Duszyński Personal Blog
https://blog.duszynski.eu/phishing-ng-bypassing-2fa-with-modlishka/
https://blog.duszynski.eu/phishing-ng-bypassing-2fa-with-modlishka/
blog.duszynski.eu
Phishing NG. Bypassing 2FA with Modlishka.
This blog post is an introduction to the reverse proxy “Modlishka” tool, that I have just released.
I hope that this software will reinforce the fact that social engineering is a serious threat, and cannot be treated lightly.
I hope that this software will reinforce the fact that social engineering is a serious threat, and cannot be treated lightly.
Turning the frustration of a mobile game into a reverse engineering training
https://medium.com/@xplodwild/turning-the-frustration-of-a-mobile-game-into-a-reverse-engineering-training-a9887043efdf
https://medium.com/@xplodwild/turning-the-frustration-of-a-mobile-game-into-a-reverse-engineering-training-a9887043efdf
Medium
Turning the frustration of a mobile game into a reverse engineering training
Games can be as fun as frustrating, when bugs ruin the fun for half of the player base, and the dev doesn’t care. So, I fixed it myself.
600 free online courses you can take from universities worldwide — Quartz
https://qz.com/1437623/600-free-online-courses-you-can-take-from-universities-worldwide/
https://qz.com/1437623/600-free-online-courses-you-can-take-from-universities-worldwide/
Quartz
190 universities just launched 600 free online courses. Here’s the full list.
If you haven’t heard, universities around the world are offering their courses online for free (or at least partially free). These courses are collectively called MOOCs or Massive Open Online Courses.
GitHub - yeyintminthuhtut/Awesome-Red-Teaming: List of Awesome Red Teaming Resources
https://github.com/yeyintminthuhtut/Awesome-Red-Teaming
https://github.com/yeyintminthuhtut/Awesome-Red-Teaming
GitHub
GitHub - yeyintminthuhtut/Awesome-Red-Teaming: List of Awesome Red Teaming Resources
List of Awesome Red Teaming Resources. Contribute to yeyintminthuhtut/Awesome-Red-Teaming development by creating an account on GitHub.
The how to get the OSCP certification wiki by Peerlyst - peerlyst wiki, CEH, OSWP
https://www.peerlyst.com/posts/the-how-to-get-the-oscp-certification-wiki-peerlyst
https://www.peerlyst.com/posts/the-how-to-get-the-oscp-certification-wiki-peerlyst
GitHub - pentesteracademy/patoolkit: PA Toolkit is a collection of traffic analysis plugins focused on security
https://github.com/pentesteracademy/patoolkit
https://github.com/pentesteracademy/patoolkit
GitHub
GitHub - pentesteracademy/patoolkit: PA Toolkit is a collection of traffic analysis plugins focused on security
PA Toolkit is a collection of traffic analysis plugins focused on security - pentesteracademy/patoolkit
An Introduction to using PGP with ProtonMail – Root ♊ – Medium
https://medium.com/@rootsecdev/an-introduction-to-using-pgp-with-protonmail-a9bb9442e0c9
https://medium.com/@rootsecdev/an-introduction-to-using-pgp-with-protonmail-a9bb9442e0c9
Medium
An Introduction to using PGP with ProtonMail
So I have a free account and until recently I never played around with it much. Mainly because I had originally thought there were some…
Unique phishing method to look out for: the fullscreen API
https://medium.com/mycrypto/unique-phishing-method-to-look-out-for-the-fullscreen-api-e6cd08a6293a
https://medium.com/mycrypto/unique-phishing-method-to-look-out-for-the-fullscreen-api-e6cd08a6293a
Medium
Unique phishing method to look out for: the fullscreen API
Using the browser’s API to fool you into giving up your details.
APT Index • APT Index / Default View • Kumu
https://kumu.io/embed/0b023bf1a971ba32510e86e8f1a38c38#apt-index
https://kumu.io/embed/0b023bf1a971ba32510e86e8f1a38c38#apt-index
Kumu
APT Index
A Kumu Project.
Bypassing PaloAlto Traps EDR Solution
https://www.c0d3xpl0it.com/2019/01/bypassing-paloalto-traps-edr-solution.html
https://www.c0d3xpl0it.com/2019/01/bypassing-paloalto-traps-edr-solution.html
C0D3Xpl0It
Bypassing PaloAlto Traps EDR Solution
In recent Pentest we encountered PaloAlto Traps (EDR Solution) was installed on the compromised machine with WildFire module integrated ...
LeakLooker — Find open databases in a second – Wojciech – Medium
https://medium.com/@woj_ciech/leaklooker-find-open-databases-in-a-second-9da4249c8472
https://medium.com/@woj_ciech/leaklooker-find-open-databases-in-a-second-9da4249c8472
Medium
LeakLooker: Find Open Databases in Seconds
Migrated to new blog
What You Can Learn from Our Simulated Phishing Attack of 45 CEOs
https://blog.rapid7.com/2019/01/07/what-you-can-learn-from-our-successful-simulated-phishing-attack-of-45-ceos/
https://blog.rapid7.com/2019/01/07/what-you-can-learn-from-our-successful-simulated-phishing-attack-of-45-ceos/
Rapid7 Blog
What You Can Learn from Our Simulated Phishing Attack of 45 CEOs
I was recently invited to a cybersecurity event to raise awareness on phishing by simulating targeted campaigns against the CEO attendees. Here's how they fared.