GitHub - Voorivex/pentest-guide: Penetration tests cases, resources and guidelines.
https://github.com/Voorivex/pentest-guide
https://github.com/Voorivex/pentest-guide
GitHub
GitHub - Voorivex/pentest-guide: Penetration tests guide based on OWASP including test cases, resources and examples.
Penetration tests guide based on OWASP including test cases, resources and examples. - Voorivex/pentest-guide
Analysis of a Chrome Zero Day: CVE-2019-5786 | McAfee Blogs
https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/analysis-of-a-chrome-zero-day-cve-2019-5786/
https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/analysis-of-a-chrome-zero-day-cve-2019-5786/
McAfee Blog
Cybersecurity News and Insights to Stay Safe Online | McAfee Blog
Welcome to the McAfee Blog, where we share posts about security solutions and products to keep you and your connected family safe online.
XSS in hidden input fields | Blog
https://portswigger.net/blog/xss-in-hidden-input-fields
https://portswigger.net/blog/xss-in-hidden-input-fields
PortSwigger Research
XSS in hidden input fields
At PortSwigger, we regularly run pre-release builds of Burp Suite against an internal testbed of popular web applications to make sure it's behaving properly. Whilst doing this recently, Liam found a
GitHub - ivRodriguezCA/RE-iOS-Apps: A completely free, open source and online course about Reverse Engineering iOS Applications.
https://github.com/ivRodriguezCA/RE-iOS-Apps
https://github.com/ivRodriguezCA/RE-iOS-Apps
GitHub
GitHub - ivRodriguezCA/RE-iOS-Apps: A completely free, open source and online course about Reverse Engineering iOS Applications.
A completely free, open source and online course about Reverse Engineering iOS Applications. - ivRodriguezCA/RE-iOS-Apps
How I am able to hijack you. – InfoSec Write-ups – Medium
https://medium.com/bugbountywriteup/how-i-am-able-to-hijack-you-1cab793a01d1
https://medium.com/bugbountywriteup/how-i-am-able-to-hijack-you-1cab793a01d1
Medium
How I am able to hijack you.
or rather: How I am able to hijack your autosuggestions in Google Search.
GitHub - NationalSecurityAgency/ghidra: Ghidra is a software reverse engineering (SRE) framework
https://github.com/NationalSecurityAgency/ghidra
https://github.com/NationalSecurityAgency/ghidra
GitHub
GitHub - NationalSecurityAgency/ghidra: Ghidra is a software reverse engineering (SRE) framework
Ghidra is a software reverse engineering (SRE) framework - NationalSecurityAgency/ghidra
Xiaomi URL spoofing w/ SSL vulnerability or, CVE-2019-10875 - Was it intentionally kept in the global versions by Xiaomi? - Andmp | A blog about infosec, bug hunting and more!
https://www.andmp.com/2019/04/xiaomi-url-spoofing-w-ssl-vulnerability.html?m=1
https://www.andmp.com/2019/04/xiaomi-url-spoofing-w-ssl-vulnerability.html?m=1
Andmp | A blog about infosec, bug hunting and more!
Xiaomi URL Address Bar spoofing w/ SSL vulnerability or, CVE-2019-10875 - Was it intentionally kept in the global versions by Xiaomi?
Writeup and PoC for Xiaomi URL spoofing w/ SSL vulnerability or, CVE-2019-10875
Wordpress cve 2019 8942 · Issue #11587 · rapid7/metasploit-framework · GitHub
https://github.com/rapid7/metasploit-framework/pull/11587
https://github.com/rapid7/metasploit-framework/pull/11587
Bypassing Network Restrictions Through RDP Tunneling « Bypassing Network Restrictions Through RDP Tunneling | FireEye Inc
https://www.fireeye.com/blog/threat-research/2019/01/bypassing-network-restrictions-through-rdp-tunneling.html
https://www.fireeye.com/blog/threat-research/2019/01/bypassing-network-restrictions-through-rdp-tunneling.html
Google Cloud Blog
Bypassing Network Restrictions Through RDP Tunneling | Mandiant | Google Cloud Blog
GitHub - sailay1996/eternal-pulsar: Eternalblue-Doublepulsar without Metasploit or python
https://github.com/sailay1996/eternal-pulsar
https://github.com/sailay1996/eternal-pulsar
GitHub
GitHub - sailay1996/eternal-pulsar: Eternalblue-Doublepulsar without Metasploit or python
Eternalblue-Doublepulsar without Metasploit or python - GitHub - sailay1996/eternal-pulsar: Eternalblue-Doublepulsar without Metasploit or python
Mimikatz C# Wrapper
https://t.co/amYFILWWCh
Mimikatz in XSL
https://t.co/TRotg1HPgr
If it can run .NET, or JScript, or VBScript, or ... it can run Mimikatz...
https://t.co/amYFILWWCh
Mimikatz in XSL
https://t.co/TRotg1HPgr
If it can run .NET, or JScript, or VBScript, or ... it can run Mimikatz...
Gist
Updated Katz.cs - Latest Mimikatz, I mean honestly it is 2018...
Updated Katz.cs - Latest Mimikatz, I mean honestly it is 2018... - katz.cs
Lynis : Security auditing tool for Linux, macOS, and UNIX-based systems (Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional ) : https://t.co/JKnJuZXJ2d
Repo : https://t.co/MBl98ddJ4b
Repo : https://t.co/MBl98ddJ4b
Cisofy
Lynis - Security auditing and hardening tool for Linux/Unix
Lynis is an open source security auditing tool. Part of Lynis Enterprise Suite, its main goal is to audit and harden Unix and Linux based systems.
0day Alert: Bypassing CVE-2019-10875 or, Xiaomi's Mint Browser's URL Spoofing patch: Discovered by Renwa - Andmp | A blog about infosec, bug hunting and more!
https://www.andmp.com/2019/04/bypassing-cve-2019-10875-or-xiaomis.html?m=1
https://www.andmp.com/2019/04/bypassing-cve-2019-10875-or-xiaomis.html?m=1
Andmp | A blog about infosec, bug hunting and more!
0day Alert: Bypassing CVE-2019-10875 or, Xiaomi's Mint Browser's URL Spoofing patch: Discovered by Renwa
Infosec ramblings. Bug Bounty, vulnerability research and random things.
A Pentester’s Guide – Part 1 (OSINT – Passive Recon and Discovery of Assets) : https://t.co/JrGxbI6Wew
Part 2 : (OSINT – LinkedIn is Not Just for Jobs) : https://t.co/llKKseBYV4
Part 2 : (OSINT – LinkedIn is Not Just for Jobs) : https://t.co/llKKseBYV4
Sequoia
A Pentester's Guide - Part 1 (OSINT - Passive Recon and Discovery of Assets) | Sequoia
Sequoia Cyber Solutions is now known as NaviSec. Technical articles like this have been moved to delta.navisec.io https://delta.navisec.io/osint-for-p...