Pentester
2.91K subscribers
119 photos
3 videos
163 files
2.77K links
- Offensive Security (Red Teaming / PenTesting)
- BlueTeam (OperationSec, TreatHunting, DFIR)
- Reverse Engineering / Malware Analisys
- Web Security
Download Telegram
Notes on fuzzing ImageMagick and GraphicsMagick - The Blagoblag
https://alexgaynor.net/2019/feb/05/notes-fuzzing-imagemagick-graphicsmagick/
[PoC] [CVE-2018-18354] Chrome remote code execution attack chain

Ignore Sandbox , Ignore Applock , Ignore download restriction
combined 3 bugs into logical vulnerability attack chain

https://t.co/IUWnx1mgZM
DnsCache. reference example for how to call the Windows API to enumerate cached DNS records in the Windows resolver
https://t.co/YDhPvp9LKU
Discovering and Exploiting a Vulnerability in Android’s Personal Dictionary (CVE-2018-9375) | IOActive
https://ioactive.com/discovering-and-exploiting-a-vulnerability-in-androids-personal-dictionary/
Evil Twin Attack - The Definitive Guide (Updated 2019)
https://rootsh3ll.com/evil-twin-attack/
Introduction to IoT Reverse Engineering - with an example on a home router
[SLIDES]
https://t.co/nzrulHpKsg
Recon-ng Tutorial

Part 1 Install and Setup
https://t.co/6KmMj59yCO

Part 2 Workspaces and Import
https://t.co/kua3VB200g

Part 3 Usage and Reporting
https://t.co/gHBp5lw8KK