⚠️ Unpacking Pyarmor v8+ Scripts: Analyzing a #Malware Campaign
https://undercodetesting.com/unpacking-pyarmor-v8-scripts-analyzing-a-malware-campaign/
@Undercode_testing
https://undercodetesting.com/unpacking-pyarmor-v8-scripts-analyzing-a-malware-campaign/
@Undercode_testing
Undercode Testing
Unpacking Pyarmor v8+ Scripts: Analyzing a Malware Campaign - Undercode Testing
2025-02-13 In a recent collaboration, my colleague Leonard Rapp and I analyzed a sophisticated malware campaign that utilized Pyarmor v8+ […]
📱 Alias Mapping and Page Remapping: Bypassing Anti-Cheats with Self-Referencing Page Table Entries
https://undercodetesting.com/alias-mapping-and-page-remapping-bypassing-anti-cheats-with-self-referencing-page-table-entries/
@Undercode_testing
https://undercodetesting.com/alias-mapping-and-page-remapping-bypassing-anti-cheats-with-self-referencing-page-table-entries/
@Undercode_testing
Undercode Testing
Alias Mapping and Page Remapping: Bypassing Anti-Cheats with Self-Referencing Page Table Entries - Undercode Testing
2025-02-13 In the world of low-level system exploitation, one of the most fascinating techniques involves manipulating memory mappings to bypass […]
🛡️ #AI and Zero Trust in Cybersecurity: A Deep Dive
https://undercodetesting.com/ai-and-zero-trust-in-cybersecurity-a-deep-dive/
@Undercode_testing
https://undercodetesting.com/ai-and-zero-trust-in-cybersecurity-a-deep-dive/
@Undercode_testing
Undercode Testing
AI and Zero Trust in Cybersecurity: A Deep Dive - Undercode Testing
2025-02-13 In the ever-evolving landscape of cybersecurity, AI and Zero Trust architectures have become critical components in defending against sophisticated […]
📊 Discovering and Mitigating Vulnerabilities in Opensearch Dashboards
https://undercodetesting.com/discovering-and-mitigating-vulnerabilities-in-opensearch-dashboards/
@Undercode_testing
https://undercodetesting.com/discovering-and-mitigating-vulnerabilities-in-opensearch-dashboards/
@Undercode_testing
Undercode Testing
Discovering and Mitigating Vulnerabilities in Opensearch Dashboards - Undercode Testing
2025-02-13 During a security assessment for a client, I identified a stored Cross-Site Scripting (XSS) vulnerability in Opensearch Dashboards-reporting version […]
🛡️ How to Build a Security Operations Center (SOC) - Basic Guide
https://undercodetesting.com/how-to-build-a-security-operations-center-soc-basic-guide/
@Undercode_testing
https://undercodetesting.com/how-to-build-a-security-operations-center-soc-basic-guide/
@Undercode_testing
Undercode Testing
How to Build a Security Operations Center (SOC) - Basic Guide - Undercode Testing
2025-02-13 Building a Security Operations Center (SOC) is a critical step for organizations aiming to enhance their cybersecurity posture. A […]
🛡️ Free SIEM Trainings 2025: A Comprehensive Guide to Mastering Security Information and Event Management
https://undercodetesting.com/free-siem-trainings-2025-a-comprehensive-guide-to-mastering-security-information-and-event-management/
@Undercode_testing
https://undercodetesting.com/free-siem-trainings-2025-a-comprehensive-guide-to-mastering-security-information-and-event-management/
@Undercode_testing
Undercode Testing
Free SIEM Trainings 2025: A Comprehensive Guide to Mastering Security Information and Event Management - Undercode Testing
2025-02-13 SIEM (Security Information and Event Management) is a critical component in modern cybersecurity, especially within Security Operations Centers (SOCs). […]
📱 Medusa by Dimitrios Valsamaras: A Game-Changer for Mobile Bug Hunters
https://undercodetesting.com/medusa-by-dimitrios-valsamaras-a-game-changer-for-mobile-bug-hunters/
@Undercode_testing
https://undercodetesting.com/medusa-by-dimitrios-valsamaras-a-game-changer-for-mobile-bug-hunters/
@Undercode_testing
Undercode Testing
Medusa by Dimitrios Valsamaras: A Game-Changer for Mobile Bug Hunters - Undercode Testing
2025-02-13 Medusa, developed by Dimitrios Valsamaras, is revolutionizing the field of mobile bug hunting. Powered by FRIDA, this framework automates […]
Understanding the OSI Layers & Protocols
https://undercodetesting.com/understanding-the-osi-layers-protocols/
@Undercode_testing
https://undercodetesting.com/understanding-the-osi-layers-protocols/
@Undercode_testing
Undercode Testing
Understanding the OSI Layers & Protocols - Undercode Testing
2025-02-13 The OSI (Open Systems Interconnection) model is a conceptual framework used to understand and implement standard protocols in network […]
#Github Dorks Generator by Mantas Sabeckis (aka Ott3rly)
https://undercodetesting.com/github-dorks-generator-by-mantas-sabeckis-aka-ott3rly/
@Undercode_testing
https://undercodetesting.com/github-dorks-generator-by-mantas-sabeckis-aka-ott3rly/
@Undercode_testing
Undercode Testing
Github Dorks Generator by Mantas Sabeckis (aka Ott3rly) - Undercode Testing
2025-02-13 The Github Dorks Generator by Mantas Sabeckis (aka Ott3rly) is a powerful tool for cybersecurity professionals and ethical hackers. […]
🚨 #CVE-2025-23369: SAML Authentication Bypass on #GitHub Enterprise Server
https://undercodetesting.com/cve-2025-23369-saml-authentication-bypass-on-github-enterprise-server/
@Undercode_testing
https://undercodetesting.com/cve-2025-23369-saml-authentication-bypass-on-github-enterprise-server/
@Undercode_testing
Undercode Testing
CVE-2025-23369: SAML Authentication Bypass on GitHub Enterprise Server - Undercode Testing
2025-02-13 Just finished my writeup about CVE-2025-23369, an interesting SAML authentication bypass on GitHub Enterprise Server I reported last year. […]
🚨 Bug Bounty Vulnerability: Sensitive Data Exposure - Admin Credentials Leaked
https://undercodetesting.com/bug-bounty-vulnerability-sensitive-data-exposure-admin-credentials-leaked/
@Undercode_testing
https://undercodetesting.com/bug-bounty-vulnerability-sensitive-data-exposure-admin-credentials-leaked/
@Undercode_testing
Undercode Testing
Bug Bounty Vulnerability: Sensitive Data Exposure - Admin Credentials Leaked - Undercode Testing
2025-02-13 In a recent discovery, a critical vulnerability was identified involving the exposure of sensitive data, specifically admin credentials that […]
🛡️ Global Cybersecurity Outlook 2025
https://undercodetesting.com/global-cybersecurity-outlook-2025/
@Undercode_testing
https://undercodetesting.com/global-cybersecurity-outlook-2025/
@Undercode_testing
Undercode Testing
Global Cybersecurity Outlook 2025 - Undercode Testing
2025-02-13 Twitter: https://lnkd.in/g_ZhPNse The Global Cybersecurity Outlook 2025 provides a comprehensive look into the evolving landscape of cybersecurity. As threats […]
🛡️ Bug Bounty Training Program: A Comprehensive Guide to Cybersecurity
https://undercodetesting.com/bug-bounty-training-program-a-comprehensive-guide-to-cybersecurity/
@Undercode_testing
https://undercodetesting.com/bug-bounty-training-program-a-comprehensive-guide-to-cybersecurity/
@Undercode_testing
Undercode Testing
Bug Bounty Training Program: A Comprehensive Guide to Cybersecurity - Undercode Testing
2025-02-13 🔗 Register here: https://lnkd.in/dJ-dBA4 Table of Content � to WAPT & OWASP Top 10 🛠️ Pentest Lab Setup 🔍 […]
🔐 Uncovering OAuth App Attacks: A Deep Dive into Malicious Service Principals and Tenants
https://undercodetesting.com/uncovering-oauth-app-attacks-a-deep-dive-into-malicious-service-principals-and-tenants/
@Undercode_testing
https://undercodetesting.com/uncovering-oauth-app-attacks-a-deep-dive-into-malicious-service-principals-and-tenants/
@Undercode_testing
Undercode Testing
Uncovering OAuth App Attacks: A Deep Dive into Malicious Service Principals and Tenants - Undercode Testing
2025-02-13 Matt Kiely, Principal Cybersecurity Researcher at Huntress, has spent six months researching OAuth app attacks, uncovering startling findings across […]
⚠️ #MALWARE ANALYSIS: HOW MINTSLOADER GENERATES RANDOM C2 DOMAINS DYNAMICALLY FOR COMMUNICATION
https://undercodetesting.com/malware-analysis-how-mintsloader-generates-random-c2-domains-dynamically-for-communication/
@Undercode_testing
https://undercodetesting.com/malware-analysis-how-mintsloader-generates-random-c2-domains-dynamically-for-communication/
@Undercode_testing
Undercode Testing
MALWARE ANALYSIS: HOW MINTSLOADER GENERATES RANDOM C2 DOMAINS DYNAMICALLY FOR COMMUNICATION - Undercode Testing
2025-02-13 In early January 2025, researchers identified a malicious campaign involving MintsLoader, a PowerShell-based malware loader. This loader was observed […]
Identify Endpoints with Critical Logged-On Users and Shares with Everyone Permission
https://undercodetesting.com/identify-endpoints-with-critical-logged-on-users-and-shares-with-everyone-permission/
@Undercode_testing
https://undercodetesting.com/identify-endpoints-with-critical-logged-on-users-and-shares-with-everyone-permission/
@Undercode_testing
Undercode Testing
Identify Endpoints with Critical Logged-On Users and Shares with Everyone Permission - Undercode Testing
2025-02-13 This KQL query is designed to identify security risks on endpoints by detecting critical users logged into devices and […]
🛡️ Getting Started with #Cisco Firewalls
https://undercodetesting.com/getting-started-with-cisco-firewalls/
@Undercode_testing
https://undercodetesting.com/getting-started-with-cisco-firewalls/
@Undercode_testing
Undercode Testing
Getting Started with Cisco Firewalls - Undercode Testing
2025-02-13 Cisco firewalls are essential for securing network infrastructure. This guide will walk you through the basics of setting up […]
⚡️ Top PLC Vendors and Their Cybersecurity Features in Industrial Automation
https://undercodetesting.com/top-plc-vendors-and-their-cybersecurity-features-in-industrial-automation/
@Undercode_testing
https://undercodetesting.com/top-plc-vendors-and-their-cybersecurity-features-in-industrial-automation/
@Undercode_testing
Undercode Testing
Top PLC Vendors and Their Cybersecurity Features in Industrial Automation - Undercode Testing
2025-02-13 In the realm of Industrial Control Systems (ICS) and Operational Technology (OT), Programmable Logic Controllers (PLCs) play a pivotal […]
🛡️ How the Community Ecosystem is Shaping Kerala to Evolve as a Cybersecurity Hub
https://undercodetesting.com/how-the-community-ecosystem-is-shaping-kerala-to-evolve-as-a-cybersecurity-hub/
@Undercode_testing
https://undercodetesting.com/how-the-community-ecosystem-is-shaping-kerala-to-evolve-as-a-cybersecurity-hub/
@Undercode_testing
Undercode Testing
How the Community Ecosystem is Shaping Kerala to Evolve as a Cybersecurity Hub - Undercode Testing
2025-02-13 Kerala, renowned for its high literacy rate and technological advancements, is swiftly emerging as a cybersecurity hub. This is […]