The most complex exploit of the century 😐
https://www.exploit-db.com/exploits/45186/
https://www.exploit-db.com/exploits/45186/
Archery is an opensource vulnerability assessment and management tool which helps developers and pentesters to perform scans and manage vulnerabilities. Archery uses popular opensource tools to perform comprehensive scanning for web application and network. It also performs web application dynamic authenticated scanning and covers the whole applications by using selenium. The developers can also utilize the tool for implementation of their DevOps CI/CD environment.
https://github.com/archerysec/archerysec
https://github.com/archerysec/archerysec
GitHub
GitHub - archerysec/archerysec: ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.
ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec. - archerysec/archerysec
Researchers Disclose New Foreshadow (L1TF) Vulnerabilities Affecting Intel CPUs
https://www.bleepingcomputer.com/news/security/researchers-disclose-new-foreshadow-l1tf-vulnerabilities-affecting-intel-cpus/
Academics and private sector researchers have revealed details today about three new vulnerabilities affecting Intel CPUs. [...]
https://www.bleepingcomputer.com/news/security/researchers-disclose-new-foreshadow-l1tf-vulnerabilities-affecting-intel-cpus/
Academics and private sector researchers have revealed details today about three new vulnerabilities affecting Intel CPUs. [...]
BleepingComputer
Researchers Disclose New Foreshadow (L1TF) Vulnerabilities Affecting Intel CPUs
Academics and private sector researchers have revealed details today about three new vulnerabilities affecting Intel CPUs.
Exploring, Exploiting Active Directory Admin Flaws
https://www.darkreading.com/vulnerabilities---threats/exploring-exploiting-active-directory-admin-flaws/d/d-id/1332593?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
Common methods AD administrators use to protect their environments can easily be exploited. Here's how.
https://www.darkreading.com/vulnerabilities---threats/exploring-exploiting-active-directory-admin-flaws/d/d-id/1332593?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
Common methods AD administrators use to protect their environments can easily be exploited. Here's how.
Dark Reading
Exploring, Exploiting Active Directory Admin Flaws
Common methods AD administrators use to protect their environments can easily be exploited. Here's how.
Forwarded from Rayanfam (Sina)
Hypervisor From Scratch – Part 1: Basic Concepts & Configure Testing Environment https://rayanfam.com/topics/hypervisor-from-scratch-part-1/
Rayanfam Blog
Hypervisor From Scratch - Part 1: Basic Concepts & Configure Testing Environment
We write about Windows Internals, Hypervisors, Linux, and Networks.