HackerOne – Telegram
HackerOne
11K subscribers
644 photos
31 videos
79 files
2.74K links
Community : @Sec0x01
@Bug0x
Download Telegram
Android StrandHogg vulnerability

Vulnerability allows malicious app to masquerade as any other app on the device.
So, if you launch Facebook, malware is executed.
https://promon.co/security-news/strandhogg/
Video demo: https://twitter.com/LukasStefanko/status/1201597521560244225
Burp Suite Secret Finder - Burp Suite Extension To Discover Apikeys/Tokens From HTTP Response

https://ift.tt/34LHNwt
Hiding Shell using PrependMigrate -Metasploit
https://www.hackingarticles.in/hiding-shell-using-prependmigrate-metasploit/

In this article, you will get to know about the strength of mfsvenom along with PrependMigrate. You will also learn how to migrate the created payload into processes currently running on the targeted machine so, the victim unable to find the malicious file. It is very important to migrate your backdoor payload because if the... Continue reading →
The post Hiding Shell using PrependMigrate -Metasploit
(https://www.hackingarticles.in/hiding-shell-using-prependmigrate-metasploit/) appeared first on Hacking Articles (https://www.hackingarticles.in/).
Forwarded from CTF Community | Hints
Heavy-duty and Advanced Cross Site Scripting Scanner

https://github.com/haroonawanofficial/XSS-Finder
#web #xss #tool
@ctfplay
Abusing ImageMagick to obtain RCE

Remote Code Execution because of an image source? Is it Possible? Yes! Definitely. Here in this blog post, a Strynx team member found a variation of Remote Code Execution AKA RCE through ImageMagick which earned him a generous bounty of $5000. Amazingly, some tweaks inside the image source exfiltrated the data over DNS (also called side-channel attacks). Let’s see how was it done after a short introduction to ImageMagick.

https://strynx.org/imagemagick-rce/