HackerOne
@HackerOne
11K
subscribers
644
photos
31
videos
79
files
2.74K
links
Community :
@Sec0x01
@Bug0x
Download Telegram
Join
HackerOne
11K subscribers
HackerOne
https://securityaffairs.co/wordpress/71181/hacking/cve-2018-0171-russia-iran-attacks.html
Security Affairs
Vigilante hackers strike Russia and Iran Networks exploiting Cisco CVE-2018-0171 flaw
Last week, the hacking crew "JHT" launched a hacking campaign exploiting Cisco CVE-2018-0171 flaw against network infrastructure in Russia and Iran.
HackerOne
https://benkowlab.blogspot.dk/2018/04/sorry-not-sorry-1ms0rry-atsamaz-gatsoev.html
benkowlab.blogspot.co.uk
Sorry. Not sorry 1ms0rry. Atsamaz Gatsoev malware business
Hey! Here we go for another write up, but this time with some friends :D This is the work of MalwareMustDie feat NibbleHunters! Greetz to...
HackerOne
New Phishing
HackerOne
https://thehackernews.com/2018/04/enterprise-password-vault.html
The Hacker News
Critical Code Execution Flaw Found in CyberArk Enterprise Password Vault
A critical remote code execution vulnerability has been discovered in CyberArk Enterprise Password Vault application that could allow an attacker to gain unauthorised access to the system with the privileges of the web application.
HackerOne
👆
poc
https://github.com/pwntester/ysoserial.net
GitHub
GitHub - pwntester/ysoserial.net: Deserialization payload generator for a variety of .NET formatters
Deserialization payload generator for a variety of .NET formatters - pwntester/ysoserial.net
HackerOne
https://github.com/sigalor/whatsapp-web-reveng
GitHub
GitHub - sigalor/whatsapp-web-reveng: Reverse engineering WhatsApp Web.
Reverse engineering WhatsApp Web. Contribute to sigalor/whatsapp-web-reveng development by creating an account on GitHub.
HackerOne
HackerOne
https://xmpp.is
HackerOne
http://www.primalsecurity.net/tutorials/exploit-tutorials/
HackerOne
https://www.uperesia.com/buffer-overflow-explained
HackerOne
https://desc0n0cid0.blogspot.se/2016/09/stack-based-buffer-overflow.html
desc0n0cid0.blogspot.co.uk
Part 1 | Stack-based Buffer Overflow exploitation to shell by example
There are a lot of tutorials out there about exploitation of memory corruption bugs, but I struggled to find step-by-step ones, that would s...
HackerOne
https://desc0n0cid0.blogspot.se/2016/09/stack-based-buffer-overflow_28.html
Blogspot
Part 2 | Stack-based Buffer Overflow exploitation to shell by example
In part 1 we've covered basic mechanisms of exploitation, but there is one caveat about example from part 1, that is we are not executing ou...
HackerOne
https://desc0n0cid0.blogspot.se/2016/09/stack-based-buffer-overflow_29.html
Blogspot
Part 3 | Stack-based Buffer Overflow exploitation to shell by example
This is continuation of my guide on binary exploitation, in this part we are going to cover return-to-libc attack which was invented to defe...
HackerOne
https://www.reddit.com/r/hacking/comments/3a3igs/madmouses_biannual_codelovetarlzma_enjoy_loves_d/
reddit
MadMouse's bi-annual codelove.tar.lzma enjoy loves :D • r/hacking
5 points and 3 comments so far on reddit
HackerOne
https://sigint.sh/#/holeybeep
HackerOne
https://drive.google.com/drive/folders/0ByWO0aO1eI_MV0lhX1dkUlQ3YUk
PHP Development Courses
HackerOne
https://mega.nz/#F!gaYwVJJT!CZQwj1cS46NnMUyZ2H04Xg!UDxnEIRK
BitcoinStealer 2018 source
mega.nz
MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 20GB now
HackerOne
from webamooz channel
HackerOne
https://threatpost.com/word-attachment-delivers-formbook-malware-no-macros-required/131075/
Threat Post
Word Attachment Delivers FormBook Malware, No Macros Required
A new wave of document attacks targeting inboxes do not require enabling macros in order for adversaries to trigger an infection chain that ultimately delivers FormBook malware.
HackerOne
https://www.youtube.com/watch?v=t5uaBkuUX4E
YouTube
Unpacking RCryptor 2.0 with Ollydbg
HackerOne
@privatix
TWeb.init({scrollToPost:'HackerOne/1849'});