cookie

ما از کوکی‌ها برای بهبود تجربه مرور شما استفاده می‌کنیم. با کلیک کردن بر روی «پذیرش همه»، شما با استفاده از کوکی‌ها موافقت می‌کنید.

Advertising posts
33 531مشترکین
+4224 ساعت
+2267 روز
+1 01330 روز

در حال بارگیری داده...

معدل نمو المشتركين

در حال بارگیری داده...

Coverage Guided Fuzzing - Extending Instrumentation to Hunt Down Bugs Faster! - Include Security Research Blog https://blog.includesecurity.com/2024/04/coverage-guided-fuzzing-extending-instrumentation/
نمایش همه...
Coverage Guided Fuzzing - Extending Instrumentation to Hunt Down Bugs Faster! - Include Security Research Blog

In our latest blog post, we introduce coverage-guided fuzzing with a brief description of fundamentals and a demonstration of how modifying program instrumentation can be used to more easily track down the source of vulnerabilities and identify interesting fuzzing paths.

3
نمایش همه...

How to achieve a working remote code execution exploit in an embedded phone without any previous access.

1
Hack Me I’m Famous #2 – Live Hacking Event with Louis Vuitton https://www.youtube.com/watch?v=-GRPi9HGD-0
نمایش همه...
Hack Me I’m Famous #2 – Live Hacking Event with Louis Vuitton

On April 4-5, YesWeHack had the absolute pleasure of hosting the second edition of Hack Me I’m Famous with no other than the prestigious luxury brand Louis Vuitton. Held at Louis Vuitton's Parisian headquarters, the live hacking event brought together forty of Europe's most skilled hackers for an exclusive two-day session dedicated to uncovering vulnerabilities in the luxury group's information systems. The final leaderboard is available here:

https://event.yeswehack.com/events/hack-me-im-famous-2

#BugBounty #LiveBugBounty #LiveHackingEvent #LHE #HMIF2 #EthicalHacking #Cybersecurity

3
نمایش همه...
AWS Cloud Security Config Review using Nuclei Templates

We're excited to tell you about Nuclei Templates release v9.8.5! This new version includes newly added AWS cloud review templates. In this blog post, we'll discuss automating cloud misconfiguration review, creating custom AWS checks, and sharing results on the PDCP Cloud for review. The AWS Cloud Security Configuration

👍 1👎 1
نمایش همه...
How i Hacked Globe/Gcash services and manage to get access on multiple databases including ssh…

Hi guys,

نمایش همه...
HackerOne Celebrates Global Work from Home Day

2👎 1
نمایش همه...
Counting Down to Hardly Strictly Security

This week sees the launch of our very first virtual event for the cybersecurity community. Hardly Strictly Security begins on April 25th at 8am PT (check how this works out in your own time zone here), and runs for the entire day, packed with thought-provoking and insightful talks from some

3👍 1
Here’s how to become a top researcher in month by finding vulnerabilities in WordPress plugins. https://medium.com/@zpbrent/from-first-rejection-to-monthly-top-c0dedd4bbc7f
نمایش همه...
My WordPress Bug Bounty Journey on Patchstack

From First Rejection to Monthly Top

1
BlackBerry MDM Has Some Authentication Flaws https://emptynebuli.github.io/tooling/2024/04/22/blackberryMDM.html
نمایش همه...
BlackBerry MDM Has Some Authentication Flaws

After detailing authentication issues with VMWare’s Airwatch and Ivanti’s MobileIron, I began to search other popular Mobile Device Management (MDM) tools for similar logic flaws. One of my primary targets for this effort was the BlackBerry MDM. Black who, you say? I know their solution set is not as popular as it once was but the MDM application is alive and well - BlackBerry MDM. Thinking back, I remember the numerous hours sifting through emails on my small BB device - wishing I had an Android instead. Well, today I am releasing research I had conducted on Android targeting the BlackBerry UEM client - I hope you enjoy it.

GitHub - KTH-LangSec/server-side-prototype-pollution: A collection of Server-Side Prototype Pollution gadgets and exploits https://github.com/KTH-LangSec/server-side-prototype-pollution
نمایش همه...
GitHub - KTH-LangSec/server-side-prototype-pollution: A collection of Server-Side Prototype Pollution gadgets and exploits

A collection of Server-Side Prototype Pollution gadgets and exploits - KTH-LangSec/server-side-prototype-pollution

👍 3