The art of subdomain monitoring
https://medium.com/@muhannadahmed042/the-art-of-subdomain-monitoring-da610a0f8031
https://medium.com/@muhannadahmed042/the-art-of-subdomain-monitoring-da610a0f8031
🔥4
SMTP Smuggling - Spoofing E-Mails Worldwide
https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
SEC Consult
SMTP Smuggling - Spoofing E-Mails Worldwide
Introducing a novel technique for e-mail spoofing
✍3🔥2👍1👏1
By combining Frida with an enhanced version of Tenet, Frinet facilitates the study of large programs, vulnerability research and root-cause analysis on iOS, Android, Windows and most architectures.
https://www.synacktiv.com/publications/frinet-reverse-engineering-made-easier
https://www.synacktiv.com/publications/frinet-reverse-engineering-made-easier
Synacktiv
Frinet: reverse-engineering made easier
Ghidriff: Ghidra Binary Diffing Engine
https://clearbluejar.github.io/posts/ghidriff-ghidra-binary-diffing-engine/
https://clearbluejar.github.io/posts/ghidriff-ghidra-binary-diffing-engine/
clearbluejar
Ghidriff: Ghidra Binary Diffing Engine
As seen in most security blog posts today, binary diffing tools are essential for reverse engineering, vulnerability research, and malware analysis. Patch diffing is a technique widely used to identify changes across versions of binaries as related to security…
Amass: New Config File Update
https://medium.com/@hackerassociate/amass-new-config-file-update-e95d09b6eb70
https://medium.com/@hackerassociate/amass-new-config-file-update-e95d09b6eb70
Medium
Amass: New Config File Update
Bug Bounty Tutorial
🔥4👏1
Breaking Fortinet Firmware Encryption
https://bishopfox.com/blog/breaking-fortinet-firmware-encryption
https://bishopfox.com/blog/breaking-fortinet-firmware-encryption
Bishop Fox
Breaking Fortinet Firmware Encryption
Review our latest Fortinet analysis that breaks encryption on firmware images, leading to improved detection, fingerprinting, and exploit development.
🔥2
Path traversal to RCE in Android — Mobile Hacking Lab ‘Document Viewer’ write-up
https://ajmal-moochingal.medium.com/path-traversal-to-rce-in-android-mobile-hacking-lab-document-viewer-write-up-ef9226aea1ac
https://ajmal-moochingal.medium.com/path-traversal-to-rce-in-android-mobile-hacking-lab-document-viewer-write-up-ef9226aea1ac
Medium
Path traversal to RCE in Android — Mobile Hacking Lab ‘Document Viewer’ write-up
During my preparation for eMAPT, I came across Mobile Hacking Lab — and their free hacking labs which I felt would help me for practice…
Fuzz Everything, Everywhere, All at Once - Advanced QEMU-based fuzzing
https://media.ccc.de/v/37c3-12102-fuzz_everything_everywhere_all_at_once
https://media.ccc.de/v/37c3-12102-fuzz_everything_everywhere_all_at_once
media.ccc.de
Fuzz Everything, Everywhere, All at Once
The maintainers of the AFLplusplus open-source project show crazy new ways to (ab)use QEMU to explore difficult, binary-only targets thro...
👍1
Scheduled Task Tampering
https://ipurple.team/2024/01/03/scheduled-task-tampering/
https://github.com/netero1010/GhostTask
https://ipurple.team/2024/01/03/scheduled-task-tampering/
https://github.com/netero1010/GhostTask
Purple Team
Scheduled Task Tampering
The HAFNIUM threat actor is using an unconventional method to tamper scheduled tasks in order to establish persistence via modification of registry keys in their malware called Tarrask. The benefit…
From Google Dorking to Unauthorized AWS Account Access and Account Takeover
https://medium.com/@ar_hawk/from-google-dorking-to-unauthorized-aws-account-access-and-account-takeover-89eb2b9d284f
https://medium.com/@ar_hawk/from-google-dorking-to-unauthorized-aws-account-access-and-account-takeover-89eb2b9d284f
Medium
From Google Dorking to Unauthorized AWS Account Access and Account Takeover
Ending 2023 with good note, I came up with another misconfiguration due to a parameter that leads to exposure of AWS credentials and access…
Bot helps to keep up to date with new CVEs and search new POC's
@pocfather_bot
@pocfather_bot
🔥3
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
https://github.com/MegaManSec/SSH-Snake
https://github.com/MegaManSec/SSH-Snake
GitHub
GitHub - MegaManSec/SSH-Snake: SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation…
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery. - MegaManSec/SSH-Snake
CVE-2023-49070/51467 - Attacking & Defending Apache OFBiz
https://www.prio-n.com/blog/cve-2023-49070-51467-attacking-defending-Apache-OFBiz
https://www.prio-n.com/blog/cve-2023-49070-51467-attacking-defending-Apache-OFBiz