We’re gonna need a bigger boat: An analysis of recently caught phishing kits
https://ift.tt/3wB7Bsg
Submitted July 15, 2021 at 09:49PM by securehoney
via reddit https://ift.tt/3emWFIx
https://ift.tt/3wB7Bsg
Submitted July 15, 2021 at 09:49PM by securehoney
via reddit https://ift.tt/3emWFIx
Nortonlifelock
We’re gonna need a bigger boat: An analysis of recently caught phishing kits
Anatomy of a phishing attack
Integrate VirusTotal with your threat data warehouse using SQL
https://ift.tt/36FZJuM
Submitted July 16, 2021 at 12:31AM by CloudSpout
via reddit https://ift.tt/3raYrSd
https://ift.tt/36FZJuM
Submitted July 16, 2021 at 12:31AM by CloudSpout
via reddit https://ift.tt/3raYrSd
GitHub
GitHub - turbot/steampipe-plugin-virustotal: Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.
Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal. - GitHub - turbot/steampipe-plugin-virustotal: Use SQL to instantly query file, domain, URL and IP scanning res...
Threat Hunting Dune themed scenario I made in my home lab that’s beginner friendly.
https://ift.tt/3yXuWWo
Submitted July 16, 2021 at 02:21AM by m_edmondson
via reddit https://ift.tt/3wFQ6H7
https://ift.tt/3yXuWWo
Submitted July 16, 2021 at 02:21AM by m_edmondson
via reddit https://ift.tt/3wFQ6H7
Marcus Edmondson | Threat Hunting | Information Security
To Catch a Hacker in My Home Lab – Noabar
Today I wanted to write a blog post to answer the questions to the Noabar scenario located here: A little background on what Noabar is, this is a Windows machine in my home lab that I attacked to c…
What every CISO and security engineer should know about Intel CSME
https://ift.tt/2UktCOJ
Submitted July 16, 2021 at 09:41AM by hardenedvault
via reddit https://ift.tt/3B9ddNO
https://ift.tt/2UktCOJ
Submitted July 16, 2021 at 09:41AM by hardenedvault
via reddit https://ift.tt/3B9ddNO
Remote code execution in cdnjs of Cloudflare
https://ift.tt/2UfFxxn
Submitted July 16, 2021 at 12:03PM by _vavkamil_
via reddit https://ift.tt/3kn4i5t
https://ift.tt/2UfFxxn
Submitted July 16, 2021 at 12:03PM by _vavkamil_
via reddit https://ift.tt/3kn4i5t
blog.ryotak.me
Remote code execution in cdnjs of Cloudflare
Preface (日本語版も公開されています。) Cloudflare, which runs cdnjs, is running a “Vulnerability Disclosure Program” on HackerOne, which allows hackers to perform vulnerability assessments. This article describes vulnerabilities reported through this program and published…
Shakti - small bash noscript to fix long repetitive tasks/commads
https://ift.tt/3ko5lSA
Submitted July 16, 2021 at 11:52AM by spajky_yt
via reddit https://ift.tt/3wNVfgd
https://ift.tt/3ko5lSA
Submitted July 16, 2021 at 11:52AM by spajky_yt
via reddit https://ift.tt/3wNVfgd
Amit Merchant - Software Engineer
Shakti - More than alias
Introduction
OpenSecurityTraining2 public betas of refreshed classes on x86-64 assembly, x86-64 OS internals, and coreboot are now open
https://ost2.fyi
Submitted July 16, 2021 at 04:59PM by BIOS4breakfast
via reddit https://ift.tt/2U8UBwR
https://ost2.fyi
Submitted July 16, 2021 at 04:59PM by BIOS4breakfast
via reddit https://ift.tt/2U8UBwR
reddit
OpenSecurityTraining2 public betas of refreshed classes on x86-64...
Posted in r/netsec by u/BIOS4breakfast • 29 points and 1 comment
Mitmproxy 7 released, now with TCP and TLS-over-TLS support.
https://ift.tt/2VKukoR
Submitted July 16, 2021 at 05:54PM by mhils
via reddit https://ift.tt/2UUzEp6
https://ift.tt/2VKukoR
Submitted July 16, 2021 at 05:54PM by mhils
via reddit https://ift.tt/2UUzEp6
ppfuzz v1.0 released! Now, if it's indeed vulnerable: it'll fingerprint the noscript gadgets used and then display additional payload info that could potentially escalate its impact to XSS, bypass/cookie injection.
https://ift.tt/3ijgcdL
Submitted July 15, 2021 at 08:29PM by dwisiswant0
via reddit https://ift.tt/3rbOdAY
https://ift.tt/3ijgcdL
Submitted July 15, 2021 at 08:29PM by dwisiswant0
via reddit https://ift.tt/3rbOdAY
GitHub
GitHub - dwisiswant0/ppfuzz: A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀
A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀 - GitHub - dwisiswant0/ppfuzz: A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀
Security Analysis of Telegram (Symmetric Part)
https://ift.tt/3BcMyzu
Submitted July 16, 2021 at 09:28PM by giuliomagnifico
via reddit https://ift.tt/3z7a674
https://ift.tt/3BcMyzu
Submitted July 16, 2021 at 09:28PM by giuliomagnifico
via reddit https://ift.tt/3z7a674
reddit
Security Analysis of Telegram (Symmetric Part)
Posted in r/netsec by u/giuliomagnifico • 116 points and 9 comments
Packet-Editing Games and Binary Protocols in Go
https://ift.tt/2UiK6XM
Submitted July 16, 2021 at 11:57PM by netsecfriends
via reddit https://ift.tt/3rgzLYz
https://ift.tt/2UiK6XM
Submitted July 16, 2021 at 11:57PM by netsecfriends
via reddit https://ift.tt/3rgzLYz
remyhax.xyz
Packet-Editing Games in Golang
It’s easy to set up an IDS or other infrastructure to drop packets that match rules. There are many tools for real-time inspection of connections that can handle higher level protocols like HTTP or TLS.
RCE vulnerability in fail2ban mailing action using mailutils (mail-whois)
https://ift.tt/3Bdd9Na
Submitted July 17, 2021 at 12:20PM by 0xdea
via reddit https://ift.tt/3BegoDJ
https://ift.tt/3Bdd9Na
Submitted July 17, 2021 at 12:20PM by 0xdea
via reddit https://ift.tt/3BegoDJ
GitHub
Possible RCE vulnerability in mailing action using mailutils (mail-whois)
### Discovered-by
Jakub Żoczek
### Impact
Possible remote code execution vulnerability in mailing action mail-whois
### Summary
Command `mail` from mailutils package used in mail actions...
Jakub Żoczek
### Impact
Possible remote code execution vulnerability in mailing action mail-whois
### Summary
Command `mail` from mailutils package used in mail actions...
A new PowerShell obfuscation tool for AMSI bypass written in Python
https://ift.tt/342Bd65
Submitted July 17, 2021 at 01:00PM by R3dCr0wn
via reddit https://ift.tt/3ktic5W
https://ift.tt/342Bd65
Submitted July 17, 2021 at 01:00PM by R3dCr0wn
via reddit https://ift.tt/3ktic5W
GitHub
GitHub - klezVirus/chameleon: PowerShell Script Obfuscator
PowerShell Script Obfuscator. Contribute to klezVirus/chameleon development by creating an account on GitHub.
Set of tools for lateral movement (DCOM, SM, PS Remoting, MSSQL and RDP)
https://ift.tt/3z42WkX
Submitted July 17, 2021 at 12:54PM by R3dCr0wn
via reddit https://ift.tt/2UkdGw2
https://ift.tt/3z42WkX
Submitted July 17, 2021 at 12:54PM by R3dCr0wn
via reddit https://ift.tt/2UkdGw2
GitHub
GitHub - klezVirus/CheeseTools: Self-developed tools for Lateral Movement/Code Execution
Self-developed tools for Lateral Movement/Code Execution - klezVirus/CheeseTools
OG-Sadpanda/SharpExcelibur
https://ift.tt/2VUHGPy
Submitted July 18, 2021 at 12:01AM by RNBnoscripting
via reddit https://ift.tt/3ijpPct
https://ift.tt/2VUHGPy
Submitted July 18, 2021 at 12:01AM by RNBnoscripting
via reddit https://ift.tt/3ijpPct
GitHub
GitHub - OG-Sadpanda/SharpExcelibur: Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly
Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly - GitHub - OG-Sadpanda/SharpExcelibur: Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly
OG-Sadpanda/SharpSword
https://ift.tt/3z8Hcnl
Submitted July 18, 2021 at 12:01AM by RNBnoscripting
via reddit https://ift.tt/2UdPcVl
https://ift.tt/3z8Hcnl
Submitted July 18, 2021 at 12:01AM by RNBnoscripting
via reddit https://ift.tt/2UdPcVl
GitHub
GitHub - OG-Sadpanda/SharpSword: Read the contents of DOCX files using Cobalt Strike's Execute-Assembly
Read the contents of DOCX files using Cobalt Strike's Execute-Assembly - GitHub - OG-Sadpanda/SharpSword: Read the contents of DOCX files using Cobalt Strike's Execute-Assembly
Frida 15.0 Released
https://ift.tt/3z8A6ir
Submitted July 18, 2021 at 04:42AM by oleavr
via reddit https://ift.tt/3iiKvl6
https://ift.tt/3z8A6ir
Submitted July 18, 2021 at 04:42AM by oleavr
via reddit https://ift.tt/3iiKvl6
Frida • A world-class dynamic instrumentation framework
Frida 15.0 Released
Inject JavaScript to explore native apps on Windows, macOS, GNU/Linux, iOS, Android, and QNX
You should turn off autofill in your password manager
https://ift.tt/3zbC55A
Submitted July 18, 2021 at 02:20PM by _vavkamil_
via reddit https://ift.tt/3kqdR3A
https://ift.tt/3zbC55A
Submitted July 18, 2021 at 02:20PM by _vavkamil_
via reddit https://ift.tt/3kqdR3A
Marektoth
You should turn off autofill in your password manager
Penetration Tester | Ethical Hacker | Web Application Security
Ecuador's state-run CNT under attack via RansomEXX Ransomware | Secure Blink
https://ift.tt/3hMPV8T
Submitted July 18, 2021 at 04:27PM by vishalthevaxus
via reddit https://ift.tt/3BiTgEb
https://ift.tt/3hMPV8T
Submitted July 18, 2021 at 04:27PM by vishalthevaxus
via reddit https://ift.tt/3BiTgEb
Secure Blink
Ecuador's state-run CNT under attack via RansomEXX Ransomware | Secure Blink
CNT hit by RansomEXX ransomware. Customer and corporate data compromised and hosted on the breached website. 190 GB of data supposedly stolen...
Q&A with one of the Richest Bug Bounty hunters who made over $2M in bounties
https://ift.tt/2TeQSgz
Submitted July 18, 2021 at 08:58PM by Single_Diamond
via reddit https://ift.tt/3z7N3co
https://ift.tt/2TeQSgz
Submitted July 18, 2021 at 08:58PM by Single_Diamond
via reddit https://ift.tt/3z7N3co
SaveBreach | Cyber Security, InfoSec, Bug Bounty, Pentesting & more...
Q&A with one of the Richest Bug Bounty hunters who made over $2M in bounties
Q&A with one of the richest bug bounty hunters in the world, Cosmin who made over $2M in bug bounties. What is his advice for the new bug bounty hunters?
Meet WiFiDemon: iOS WiFi RCE 0-Day Vulnerability & a 'Zero-Click' Vulnerability That was Silently Patched
https://ift.tt/3xPcOhh
Submitted July 18, 2021 at 09:20PM by evilsocket
via reddit https://ift.tt/3evXAWO
https://ift.tt/3xPcOhh
Submitted July 18, 2021 at 09:20PM by evilsocket
via reddit https://ift.tt/3evXAWO
Jamf
Jamf Threat Labs | Blog