android dictionary
https://www.uret.in/topic/2173-android-dictionary-for-noobs-like-me/
https://www.uret.in/topic/2173-android-dictionary-for-noobs-like-me/
🗣
How to become a Bug Bounty Hunter 💪
https://forum.bugcrowd.com/t/researcher-resources-how-to-become-a-bug-bounty-hunter
How to become a Bug Bounty Hunter 💪
https://forum.bugcrowd.com/t/researcher-resources-how-to-become-a-bug-bounty-hunter
Additional Exercises in Reverse Engineering
https://leotindall.com/tutorial/additional-exercises-in-reverse-engineering/
https://leotindall.com/tutorial/additional-exercises-in-reverse-engineering/
#love_linux_kernel_function
panic() => Halts the kernel
BUG_ON() => Kills the threads, print a message before panicking
WARN_ON() => Prints warning level messages
panic() => Halts the kernel
BUG_ON() => Kills the threads, print a message before panicking
WARN_ON() => Prints warning level messages
SMBv3 Null Pointer Dereference vulnerability (CVE-2018-0833)
https://krbtgt.pw/smbv3-null-pointer-dereference-vulnerability/amp/?__twitter_impression=true
https://krbtgt.pw/smbv3-null-pointer-dereference-vulnerability/amp/?__twitter_impression=true
got 0day?
SMBv3 Null Pointer Dereference vulnerability (CVE-2018-0833)
Table of contents Intro Root cause analysis Proof-of-Concept Intro Late last year while setting up a fuzzer to target the SMB protocol, I discovered a vulnerability so simple yet so effective in disrupting large enterprises. TL;DR: A Denial-of-Service bug…
https://www.owasp.org/index.php/Category:OWASP_Joomla_Vulnerability_Scanner_Project
git : https://github.com/rezasp/joomscan
git : https://github.com/rezasp/joomscan
GitHub
GitHub - OWASP/joomscan: OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/
OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/ - OWASP/joomscan
Forwarded from Bug Bounty
HackerOne
Shopify disclosed on HackerOne: Access to Private Photos of Apps in...
@vijay_kumar1110 reported an Insecure Direct Object Reference vulnerability on our Exchange app. This issue could have allowed an attacker to iterate over the shops' screenshot IDs in order to...