Integrate VirusTotal with your threat data warehouse using SQL
https://ift.tt/36FZJuM
Submitted July 16, 2021 at 12:31AM by CloudSpout
via reddit https://ift.tt/3raYrSd
https://ift.tt/36FZJuM
Submitted July 16, 2021 at 12:31AM by CloudSpout
via reddit https://ift.tt/3raYrSd
GitHub
GitHub - turbot/steampipe-plugin-virustotal: Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.
Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal. - GitHub - turbot/steampipe-plugin-virustotal: Use SQL to instantly query file, domain, URL and IP scanning res...
Threat Hunting Dune themed scenario I made in my home lab that’s beginner friendly.
https://ift.tt/3yXuWWo
Submitted July 16, 2021 at 02:21AM by m_edmondson
via reddit https://ift.tt/3wFQ6H7
https://ift.tt/3yXuWWo
Submitted July 16, 2021 at 02:21AM by m_edmondson
via reddit https://ift.tt/3wFQ6H7
Marcus Edmondson | Threat Hunting | Information Security
To Catch a Hacker in My Home Lab – Noabar
Today I wanted to write a blog post to answer the questions to the Noabar scenario located here: A little background on what Noabar is, this is a Windows machine in my home lab that I attacked to c…
What every CISO and security engineer should know about Intel CSME
https://ift.tt/2UktCOJ
Submitted July 16, 2021 at 09:41AM by hardenedvault
via reddit https://ift.tt/3B9ddNO
https://ift.tt/2UktCOJ
Submitted July 16, 2021 at 09:41AM by hardenedvault
via reddit https://ift.tt/3B9ddNO
Remote code execution in cdnjs of Cloudflare
https://ift.tt/2UfFxxn
Submitted July 16, 2021 at 12:03PM by _vavkamil_
via reddit https://ift.tt/3kn4i5t
https://ift.tt/2UfFxxn
Submitted July 16, 2021 at 12:03PM by _vavkamil_
via reddit https://ift.tt/3kn4i5t
blog.ryotak.me
Remote code execution in cdnjs of Cloudflare
Preface (日本語版も公開されています。) Cloudflare, which runs cdnjs, is running a “Vulnerability Disclosure Program” on HackerOne, which allows hackers to perform vulnerability assessments. This article describes vulnerabilities reported through this program and published…
Shakti - small bash noscript to fix long repetitive tasks/commads
https://ift.tt/3ko5lSA
Submitted July 16, 2021 at 11:52AM by spajky_yt
via reddit https://ift.tt/3wNVfgd
https://ift.tt/3ko5lSA
Submitted July 16, 2021 at 11:52AM by spajky_yt
via reddit https://ift.tt/3wNVfgd
Amit Merchant - Software Engineer
Shakti - More than alias
Introduction
OpenSecurityTraining2 public betas of refreshed classes on x86-64 assembly, x86-64 OS internals, and coreboot are now open
https://ost2.fyi
Submitted July 16, 2021 at 04:59PM by BIOS4breakfast
via reddit https://ift.tt/2U8UBwR
https://ost2.fyi
Submitted July 16, 2021 at 04:59PM by BIOS4breakfast
via reddit https://ift.tt/2U8UBwR
reddit
OpenSecurityTraining2 public betas of refreshed classes on x86-64...
Posted in r/netsec by u/BIOS4breakfast • 29 points and 1 comment
Mitmproxy 7 released, now with TCP and TLS-over-TLS support.
https://ift.tt/2VKukoR
Submitted July 16, 2021 at 05:54PM by mhils
via reddit https://ift.tt/2UUzEp6
https://ift.tt/2VKukoR
Submitted July 16, 2021 at 05:54PM by mhils
via reddit https://ift.tt/2UUzEp6
ppfuzz v1.0 released! Now, if it's indeed vulnerable: it'll fingerprint the noscript gadgets used and then display additional payload info that could potentially escalate its impact to XSS, bypass/cookie injection.
https://ift.tt/3ijgcdL
Submitted July 15, 2021 at 08:29PM by dwisiswant0
via reddit https://ift.tt/3rbOdAY
https://ift.tt/3ijgcdL
Submitted July 15, 2021 at 08:29PM by dwisiswant0
via reddit https://ift.tt/3rbOdAY
GitHub
GitHub - dwisiswant0/ppfuzz: A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀
A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀 - GitHub - dwisiswant0/ppfuzz: A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀
Security Analysis of Telegram (Symmetric Part)
https://ift.tt/3BcMyzu
Submitted July 16, 2021 at 09:28PM by giuliomagnifico
via reddit https://ift.tt/3z7a674
https://ift.tt/3BcMyzu
Submitted July 16, 2021 at 09:28PM by giuliomagnifico
via reddit https://ift.tt/3z7a674
reddit
Security Analysis of Telegram (Symmetric Part)
Posted in r/netsec by u/giuliomagnifico • 116 points and 9 comments
Packet-Editing Games and Binary Protocols in Go
https://ift.tt/2UiK6XM
Submitted July 16, 2021 at 11:57PM by netsecfriends
via reddit https://ift.tt/3rgzLYz
https://ift.tt/2UiK6XM
Submitted July 16, 2021 at 11:57PM by netsecfriends
via reddit https://ift.tt/3rgzLYz
remyhax.xyz
Packet-Editing Games in Golang
It’s easy to set up an IDS or other infrastructure to drop packets that match rules. There are many tools for real-time inspection of connections that can handle higher level protocols like HTTP or TLS.
RCE vulnerability in fail2ban mailing action using mailutils (mail-whois)
https://ift.tt/3Bdd9Na
Submitted July 17, 2021 at 12:20PM by 0xdea
via reddit https://ift.tt/3BegoDJ
https://ift.tt/3Bdd9Na
Submitted July 17, 2021 at 12:20PM by 0xdea
via reddit https://ift.tt/3BegoDJ
GitHub
Possible RCE vulnerability in mailing action using mailutils (mail-whois)
### Discovered-by
Jakub Żoczek
### Impact
Possible remote code execution vulnerability in mailing action mail-whois
### Summary
Command `mail` from mailutils package used in mail actions...
Jakub Żoczek
### Impact
Possible remote code execution vulnerability in mailing action mail-whois
### Summary
Command `mail` from mailutils package used in mail actions...
A new PowerShell obfuscation tool for AMSI bypass written in Python
https://ift.tt/342Bd65
Submitted July 17, 2021 at 01:00PM by R3dCr0wn
via reddit https://ift.tt/3ktic5W
https://ift.tt/342Bd65
Submitted July 17, 2021 at 01:00PM by R3dCr0wn
via reddit https://ift.tt/3ktic5W
GitHub
GitHub - klezVirus/chameleon: PowerShell Script Obfuscator
PowerShell Script Obfuscator. Contribute to klezVirus/chameleon development by creating an account on GitHub.
Set of tools for lateral movement (DCOM, SM, PS Remoting, MSSQL and RDP)
https://ift.tt/3z42WkX
Submitted July 17, 2021 at 12:54PM by R3dCr0wn
via reddit https://ift.tt/2UkdGw2
https://ift.tt/3z42WkX
Submitted July 17, 2021 at 12:54PM by R3dCr0wn
via reddit https://ift.tt/2UkdGw2
GitHub
GitHub - klezVirus/CheeseTools: Self-developed tools for Lateral Movement/Code Execution
Self-developed tools for Lateral Movement/Code Execution - klezVirus/CheeseTools
OG-Sadpanda/SharpExcelibur
https://ift.tt/2VUHGPy
Submitted July 18, 2021 at 12:01AM by RNBnoscripting
via reddit https://ift.tt/3ijpPct
https://ift.tt/2VUHGPy
Submitted July 18, 2021 at 12:01AM by RNBnoscripting
via reddit https://ift.tt/3ijpPct
GitHub
GitHub - OG-Sadpanda/SharpExcelibur: Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly
Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly - GitHub - OG-Sadpanda/SharpExcelibur: Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly
OG-Sadpanda/SharpSword
https://ift.tt/3z8Hcnl
Submitted July 18, 2021 at 12:01AM by RNBnoscripting
via reddit https://ift.tt/2UdPcVl
https://ift.tt/3z8Hcnl
Submitted July 18, 2021 at 12:01AM by RNBnoscripting
via reddit https://ift.tt/2UdPcVl
GitHub
GitHub - OG-Sadpanda/SharpSword: Read the contents of DOCX files using Cobalt Strike's Execute-Assembly
Read the contents of DOCX files using Cobalt Strike's Execute-Assembly - GitHub - OG-Sadpanda/SharpSword: Read the contents of DOCX files using Cobalt Strike's Execute-Assembly
Frida 15.0 Released
https://ift.tt/3z8A6ir
Submitted July 18, 2021 at 04:42AM by oleavr
via reddit https://ift.tt/3iiKvl6
https://ift.tt/3z8A6ir
Submitted July 18, 2021 at 04:42AM by oleavr
via reddit https://ift.tt/3iiKvl6
Frida • A world-class dynamic instrumentation framework
Frida 15.0 Released
Inject JavaScript to explore native apps on Windows, macOS, GNU/Linux, iOS, Android, and QNX
You should turn off autofill in your password manager
https://ift.tt/3zbC55A
Submitted July 18, 2021 at 02:20PM by _vavkamil_
via reddit https://ift.tt/3kqdR3A
https://ift.tt/3zbC55A
Submitted July 18, 2021 at 02:20PM by _vavkamil_
via reddit https://ift.tt/3kqdR3A
Marektoth
You should turn off autofill in your password manager
Penetration Tester | Ethical Hacker | Web Application Security
Ecuador's state-run CNT under attack via RansomEXX Ransomware | Secure Blink
https://ift.tt/3hMPV8T
Submitted July 18, 2021 at 04:27PM by vishalthevaxus
via reddit https://ift.tt/3BiTgEb
https://ift.tt/3hMPV8T
Submitted July 18, 2021 at 04:27PM by vishalthevaxus
via reddit https://ift.tt/3BiTgEb
Secure Blink
Ecuador's state-run CNT under attack via RansomEXX Ransomware | Secure Blink
CNT hit by RansomEXX ransomware. Customer and corporate data compromised and hosted on the breached website. 190 GB of data supposedly stolen...
Q&A with one of the Richest Bug Bounty hunters who made over $2M in bounties
https://ift.tt/2TeQSgz
Submitted July 18, 2021 at 08:58PM by Single_Diamond
via reddit https://ift.tt/3z7N3co
https://ift.tt/2TeQSgz
Submitted July 18, 2021 at 08:58PM by Single_Diamond
via reddit https://ift.tt/3z7N3co
SaveBreach | Cyber Security, InfoSec, Bug Bounty, Pentesting & more...
Q&A with one of the Richest Bug Bounty hunters who made over $2M in bounties
Q&A with one of the richest bug bounty hunters in the world, Cosmin who made over $2M in bug bounties. What is his advice for the new bug bounty hunters?
Meet WiFiDemon: iOS WiFi RCE 0-Day Vulnerability & a 'Zero-Click' Vulnerability That was Silently Patched
https://ift.tt/3xPcOhh
Submitted July 18, 2021 at 09:20PM by evilsocket
via reddit https://ift.tt/3evXAWO
https://ift.tt/3xPcOhh
Submitted July 18, 2021 at 09:20PM by evilsocket
via reddit https://ift.tt/3evXAWO
Jamf
Jamf Threat Labs | Blog
How to catch NSO Group’s Pegasus
https://ift.tt/2UUMUu2
Submitted July 18, 2021 at 09:59PM by DonnchaOC
via reddit https://ift.tt/3ind1lp
https://ift.tt/2UUMUu2
Submitted July 18, 2021 at 09:59PM by DonnchaOC
via reddit https://ift.tt/3ind1lp
Amnesty International
Forensic Methodology Report: How to catch NSO Group’s Pegasus
NSO Group claims that its Pegasus spyware is only used to “investigate terrorism and crime” and “leaves no traces whatsoever”. This Forensic Methodology Report shows that neither of these statements are true. This report accompanies the release of the Pegasus…