Facebook's ImageTragick Remote Code Execution
RT : Facebook's ImageTragick Remote Code Execution , see more
from twitter
yesterday
GitHub - wtsxDev/List-of-web-application-security: List of web application security
List of web application security
This list is for anyone wishing to learn about web application security …
from twitter_favs
2 days ago
Twitter
RT : Hooking Android System Calls for Pleasure and Benefit : cc
from twitter
2 days ago
Vantage Point Security
RT : Hooking Android System Calls for Pleasure and Benefit : cc
from twitter
2 days ago
Twitter
RT : Stealing passwords from McDonald's users through an AngularJS sandbox escape : cc
from twitter
2 days ago
Stealing passwords from McDonald's users - Tijme Gommers
RT : Stealing passwords from McDonald's users through an AngularJS sandbox escape : cc
from twitter
2 days ago
Untitled (https://dl.packetstormsecurity.net/papers/win/windows-reversing.pdf)
RT : With the leak of Equation's EventLogEdit these docs on event manipulation seem appropriate:
from twitter
2 days ago
Untitled (https://www.ernw.de/download/EventManipulation.pdf)
RT : With the leak of Equation's EventLogEdit these docs on event manipulation seem appropriate:
from twitter
2 days ago
Twitter
RT : Hardening Windows 10 with 0-day exploit mitigations :
from twitter
2 days ago
Twitter
rePy2exe - A Reverse Engineering Tool for py2exe applications
rePy2exe  Python  Linux  from twitter_favs
3 days ago
GitHub - tkmru/nao: No-meaning Assembly Omitter for IDA pro
RT : nao - is dead code eliminator plugin for IDA pro. Based on IDAPython, Unicorn.
from twitter
4 days ago
Mazin Ahmed's Blog: Exploiting Misconfigured Apache server-status Instances with server-status_PWN
Exploiting Misconfigured Apache server-status Instances with server-status_PWN to leak information
from twitter_favs
4 days ago
[SANS ISC Diary] Backup Files Are Good but Can Be Evil - /dev/random
/dev/random | [SANS ISC Diary] Backup Files Are Good but Can Be Evil
from twitter_favs
4 days ago
Twitter
Google Infrastructure Security Design Overview (PDF)
infrastructure  security  Google  from twitter_favs
5 days ago
Google Groups
RT : Pwned a device managed w/ Ansible? Pivot to the central node and pwn the whole infrastructure! -2016-9587
CVE-2016-9587  from twitter
6 days ago
Twitter
some fun trivia about Sonic the Hedgehog! The reason the waterfalls look the way they do is so they would shimmer w…
from twitter_favs
6 days ago
Twitter
Attacking UEFI Runtime Services and Linux : , Demo : ,…
from twitter_favs
7 days ago
Attacking UEFI Runtime Services and Linux - YouTube
Attacking UEFI Runtime Services and Linux : , Demo : ,…
from twitter_favs
7 days ago
Twitter
Art of Anti Detection – Intro to AV & Detection : , Part 2 – PE Backdoor Manufacturing :…
from twitter_favs
7 days ago
Art of Anti Detection 1 – Introduction to AV & Detection Techniques – Pentest Blog
Art of Anti Detection – Intro to AV & Detection : , Part 2 – PE Backdoor Manufacturing :…
from twitter_favs
7 days ago
Never-Ending Security: Virtual Memory, Page Tables, and One Bit - CVE-2016-7255
Walkthrough of CVE-2016-7255 (PrivEsc) with working POC for Windows 7, 8.1, 10, and 2012 R2
from twitter_favs
8 days ago
Twitter
Edge has enabled another new exploit mitigation in Windows 10 build 15002 thanks to . Exports are now inva…
from twitter_favs
9 days ago
Tapping into the core
RT : Tapping into the core - - video Jtag Over USB3 (wut.)
from twitter
9 days ago
Tapping into the core [33c3] - YouTube
RT : Tapping into the core - - video Jtag Over USB3 (wut.)
from twitter
9 days ago
Twitter
My first two HEVD exploits in C :
StackOverflow:
StackCookie /GS Bypass:…
from twitter_favs
9 days ago
SSH_VPN - Community Help Wiki
This seems to cover the same thing, perhaps better:
from twitter_favs
11 days ago
Layer 2 VPN’s using SSH | Hacks by Brandon:
Anyone had success with a setup like this? Need to host servers on crappy nat'd inet via eth bridge to a vps.
from twitter_favs
11 days ago
Twitter
Reverse Engineering / Cracking Sublime Text 3 :
from twitter_favs
11 days ago
Cracking Sublime Text 3
Reverse Engineering / Cracking Sublime Text 3 :
from twitter_favs
11 days ago
Twitter
Chromebackdoor - Backdoor C&C for Populars Browsers
CampC  Browsers  Backdoor  from twitter_favs
11 days ago
GitHub - payatu/EMFFuzzer: Enhanced Meta File Fuzzer based on Peach Fuzzing Framework
RT : EMFFuzzer: Enhanced Meta File (Partial EMF+ & EMFSPOOL) Fuzzer based on Peach Fuzzing Framework --
Exploitation  from twitter
20 days ago
(500) https://rails-sqli.org/
SQLi News: Rails SQL Injection Examples , see more
from twitter_favs
22 days ago
Untitled (http://tweetedtimes.com/v/1943)
SQLi News: Rails SQL Injection Examples , see more
from twitter_favs
22 days ago
MKSB(en): XSS Auditor bypass using obscure <param> tag
Blogged! XSS Auditor bypass using <param>
(日本語)
(English)
from twitter_favs
22 days ago
Twitter
RT : Plasma - an interactive disassembler for x86/ARM/MIPV6 that can generate indented pseudo-code with colored syntax.…
from twitter
23 days ago
Twitter
(SMAP can be useful) Shellcode mapper -
Exploitation  from twitter_favs
23 days ago
Twitter
RT : tapsnoop: A keyboard sniffer sniffer
from twitter
24 days ago
Twitter
build and run a SOC for Incident Response - A Collection of Resources, by
infosec  Howto  from twitter_favs
25 days ago
Twitter
Christmas Eve…from the moon! in 1968, Apollo 8 crew broadcasted live pics of Earth & moon as seen from their s…
OTD  from twitter_favs
25 days ago
Open sourcing WinManipulate – Appsecco
RT : Released WinManipulate on . A tool to manipulate window objects in . Used in a thick client .
pentest  Github  Windows  from twitter
27 days ago
Mitigation bounty — From read-write anywhere to controllable calls
Mitigation Bounty -- Introduction : , From read-write anywhere to controllable calls :
from twitter_favs
29 days ago
Mitigation Bounty — Introduction – Thomas Garnier – Medium
Mitigation Bounty -- Introduction : , From read-write anywhere to controllable calls :
from twitter_favs
29 days ago
« earlier      
#blog #fr #hacking #homepage #js #security 00 01 02 03 05 06 0day 2009 31c3 32c3 44con academic activedirectory adfsl ai alabama analysis androguard android anonym8 anonymous antisandbox antisec apple apps appsec architecture arm arp arpy art ashley aslr asm audit auditingtool awesome aws b2b backdoor backdoors backtrack backup bash belgrade bheu bhusa bigdata binwalk birmingham bitlocker bittorrent blackhat blackhateu blackhole blind_sqli blog blogpost bluetooth bm book books boot boot2root bootkit browser brucon bruteforce bruteforcer bsideschallenge bsideslondon bugbounty burp bypass canvas capstone captcha capture centos charliehebdo chart cheatsheet checkitout checklist chrome cisco ciscotalos civ climber cloud cms cocoa code codebits codebits2011 codetainer coding colorado comedy comic conf crack crawler cronjob crossplatformdisassembler crosssitescripting cryptohaven cryptoparty cryptowall csp csrf css ctf cuckoo curiosity cyber_warfare cybercrime cybersecurity dahboo7 dailywtf dataexfiltrationtoolkit db dbgkit dc4420 deal deals debugger decompiler defcon defense derbycon design det dev devel devops dfir dfirsummit dfrws dirtycow disassembler discover diy dll dns doc docker dockersecurity dominator dos dropbox duqu earth eclipse elasticsearch electronics elf elixirlang emacs emet empire encryption erlang escalating ettercap event exploit exploitkit fail fb firefox flame forensic forensics foss fr framework free freebsd fridayreads fun funny fuzzer fuzzing game gamedev games gaming gdb geek geographyofpoverty git gnome gnu google googleplay graph graphs grrcon gtd gui hack hack2learn hacker hackers hackersonlineclub hacking hackingteam hacklu hackpra hardening hardware hash hashcat heartbleed hitb2016ams hitbgsec homepage honeypot howto html html5 https humor hunter icloud icon icons ida ids ie ie6 ie9 infosec injection ioc ios iphone ipv6 ipython iso it italy itsec j2ee j2eescan java javaone javascript jesuischarlie jobs jquery js jsrat jvm kali kalilinux katoolin kernel keylogger kibana lab learn leopard lfi libsigrokdecode links linux live locky lowpower lynis mac macbook machinelearning mail maltego malware malwareanalysis malwaremustdie manager manual map math mbr metasploit microsoft mimikatz mitm mobile model modeling money monitoring moon movies movp mq msf mysql nasa neo4j netbook netsec network networking news nginx nginxday nmap nodejs noriben notsosecure nsa nsm ntp numpy ohm2013 oldschool oldschoolbackdoors oleoutlook ollydbg opensource openssl oprahssl oracle os oss osx owasp pacsec pandas paper password patch pdf pentest pentesters pentesting pentestlab perceptual persistence personal pestudio pgp phishing php pki plot poc poc2014 portable portugal postgresql powershell privacy processexplorer productivity programming proxy pshitt pwn2own python qt quotes raspberrypi raspberrypi2 rce re realtime recipes recon14 reconmtl regex rehints rekall remwa retrogaming reverse reverse_engineering reverseengineering reversing rodeoide root rop ror rowhammer ruby ructfe sandbox sans sanspentestblog scada scanner screencast screencasts sdo search sec14 security securitymanager seo serbia shellcode shellcoding shellter slides sniffer snippet snmp snowleopard social software source space sqli sqlilab sqlinjection ss7map ssh ssl starttls startups stat stats stuxnet sun suricata svg sync sysadmin syslog tech terminal testbed thn threat tip tips tool tools toolswatch tor tr16 tricks trojan truestory tutorial tv tweak ubuntu ue4 ui unix url usa usb usenix video videos virginia virtualization viz vm voip volatility vpn vulnerability waf web web-dev web2py webapp webdev websec websecurity webvulscan wii win windbg windows windows8 wordpress worldphotographyday wpa writeup wxpython x64dbg xslt xss xxe yara zeronighs zeronights

Copy this bookmark:



description:


tags: