Finding the real IP behind Cloudflare has never been so easy. Here you are a tool to search on @shodanhq starting from a simple favicon
https://t.co/HAGJo6fuWi
https://t.co/HAGJo6fuWi
GitHub
pielco11/fav-up
IP lookup by favicon using Shodan. Contribute to pielco11/fav-up development by creating an account on GitHub.
Updated course for reverse engineering iOS applications for iOS 12 and added a new .epub file for you to read on your tablet or eReader:
https://t.co/reioa3YglN
https://t.co/reioa3YglN
GitHub
ivRodriguezCA/RE-iOS-Apps
A completely free, open source and online course about Reverse Engineering iOS Applications. - ivRodriguezCA/RE-iOS-Apps
If you love Android security, you will love these 8 new vulnerabilities in Android's VoIP components found by Daoyuan Wu and his team https://t.co/fKupSDh7Xt
He is a very good researcher and his others papers are definitely worth looking https://t.co/7j4LwFN6q8
He is a very good researcher and his others papers are definitely worth looking https://t.co/7j4LwFN6q8
Mobile Pentesting with FRIDA
[SLIDES] https://t.co/APhEluWkYa
[SLIDES] https://t.co/APhEluWkYa
Google Docs
frida_nn2019.pdf
Multiple D-Link Routers Found Vulnerable To Unauthenticated Remote Code Execution (will remian unpatched due to EOL) : https://t.co/RC9UAZIV1M
Fortinet Blog
Multiple D-Link Routers Found Vulnerable To Unauthenticated Remote Code Execution
FortiGuard Labs has discovered an unauthenticated command injection vulnerability in D-Link products that could lead to Remote Code Execution (RCE) upon successful exploitation. Learn more.…
WhatsApp GIF RCE on #android ---> https://t.co/ufQBRi6yMw (poc code in c)
note you will need memory leak vuln in order to have a full remote exploit. This is a local exploit where you have to figure out the address manually.
note you will need memory leak vuln in order to have a full remote exploit. This is a local exploit where you have to figure out the address manually.
GitHub
dorkerdevil/CVE-2019-11932
double-free bug in WhatsApp exploit poc. Contribute to dorkerdevil/CVE-2019-11932 development by creating an account on GitHub.
This aggressor script adds three UAC bypass techniques to Cobalt Strike's interface + beacon console. These include:
https://t.co/zX43xhDGlX
https://t.co/zX43xhDGlX
GitHub
RhinoSecurityLabs/Aggressor-Scripts
Aggregation of Cobalt Strike's aggressor scripts. Contribute to RhinoSecurityLabs/Aggressor-Scripts development by creating an account on GitHub.