bOt@zerobytes.monsterM · 23 hours agoStop Using Predictable Bucket Names: A Failed Attempt at Hacking Satellitesplus-squarewww.securityrunners.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkStop Using Predictable Bucket Names: A Failed Attempt at Hacking Satellitesplus-squarewww.securityrunners.iobOt@zerobytes.monsterM · 23 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 23 hours agoAzure Detection Engineering: Log idiosyncrasies you should know aboutplus-squaretracebit.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAzure Detection Engineering: Log idiosyncrasies you should know aboutplus-squaretracebit.combOt@zerobytes.monsterM · 23 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 day agoSync or Sink: Navigating the Choppy Waters of the Flipper Zero, and consumer friendly hacking…plus-squareadam-toscher.medium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSync or Sink: Navigating the Choppy Waters of the Flipper Zero, and consumer friendly hacking…plus-squareadam-toscher.medium.combOt@zerobytes.monsterM · 1 day agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoSpelunking in Comments and Documentation for Security Footguns - Include Security Research Blogplus-squareblog.includesecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSpelunking in Comments and Documentation for Security Footguns - Include Security Research Blogplus-squareblog.includesecurity.combOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoAzure CloudQuarry: Searching for secrets in Public VM Imagesplus-squaresecuritycafe.roexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAzure CloudQuarry: Searching for secrets in Public VM Imagesplus-squaresecuritycafe.robOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoSecurity Researchers found 2k high risk vulnerabilities in exposed Fortune 1000 APIsplus-squareescape.techexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSecurity Researchers found 2k high risk vulnerabilities in exposed Fortune 1000 APIsplus-squareescape.techbOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoWormable XSS www.bing.complus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWormable XSS www.bing.complus-squaremedium.combOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days ago[PoC] Critical Authentication Vulnerability in SAP BusinessObjects Business Intelligence Platformplus-squarecommunity.sap.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link[PoC] Critical Authentication Vulnerability in SAP BusinessObjects Business Intelligence Platformplus-squarecommunity.sap.combOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 3 days agoRemediation for CVE-2024-20767 and CVE-2024-21216 Potential Exploitable Bugsplus-squareblog.securelayer7.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRemediation for CVE-2024-20767 and CVE-2024-21216 Potential Exploitable Bugsplus-squareblog.securelayer7.netbOt@zerobytes.monsterM · 3 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 3 days agoExtracting Plaintext Credentials from Palo Alto Global Protectplus-squareshells.systemsexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkExtracting Plaintext Credentials from Palo Alto Global Protectplus-squareshells.systemsbOt@zerobytes.monsterM · 3 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 3 days agoExtending Burp Suite for fun and profit - The Montoya way - Part 7 (Using the Collaborator)plus-squaresecurity.humanativaspa.itexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkExtending Burp Suite for fun and profit - The Montoya way - Part 7 (Using the Collaborator)plus-squaresecurity.humanativaspa.itbOt@zerobytes.monsterM · 3 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 3 days agoPots and Pans, AKA an SSLVPN - Palo Alto PAN-OS CVE-2024-0012 and CVE-2024-9474 - watchTowr Labsplus-squarelabs.watchtowr.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPots and Pans, AKA an SSLVPN - Palo Alto PAN-OS CVE-2024-0012 and CVE-2024-9474 - watchTowr Labsplus-squarelabs.watchtowr.combOt@zerobytes.monsterM · 3 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 days agoOpenBMC Remote OS Deployment: A Simplified Approachplus-squarehardenedvault.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOpenBMC Remote OS Deployment: A Simplified Approachplus-squarehardenedvault.netbOt@zerobytes.monsterM · 4 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 days agoResearch Case Study: Supply Chain Security at Scale – Insights into NPM Account Takeoversplus-squarelaburity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkResearch Case Study: Supply Chain Security at Scale – Insights into NPM Account Takeoversplus-squarelaburity.combOt@zerobytes.monsterM · 4 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 days agoSalamander/MIME – Just because it's encrypted doesn't mean it's secure | Lutra Securityplus-squarelutrasecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSalamander/MIME – Just because it's encrypted doesn't mean it's secure | Lutra Securityplus-squarelutrasecurity.combOt@zerobytes.monsterM · 4 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 days agoReverse Engineering iOS 18 Inactivity Rebootplus-squarenaehrdine.blogspot.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkReverse Engineering iOS 18 Inactivity Rebootplus-squarenaehrdine.blogspot.combOt@zerobytes.monsterM · 4 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 5 days agoExploring the DOMPurify library: Bypasses and Fixesplus-squaremizu.reexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkExploring the DOMPurify library: Bypasses and Fixesplus-squaremizu.rebOt@zerobytes.monsterM · 5 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 5 days ago🌪️Heads up trainers: TyphoonCon 2025 Call for Training is now open!plus-squaretyphooncon.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link🌪️Heads up trainers: TyphoonCon 2025 Call for Training is now open!plus-squaretyphooncon.combOt@zerobytes.monsterM · 5 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 7 days agoUnpatched Remote Code Execution in Gogsplus-squarefysac.github.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUnpatched Remote Code Execution in Gogsplus-squarefysac.github.iobOt@zerobytes.monsterM · 7 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 7 days agoOpen-Source PowerHuntShares.v2 - Find Shares, Extract Passwords, and Fingerprint with LLMplus-squarewww.netspi.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOpen-Source PowerHuntShares.v2 - Find Shares, Extract Passwords, and Fingerprint with LLMplus-squarewww.netspi.combOt@zerobytes.monsterM · 7 days agomessage-square0fedilink