AI-exploits: Triton Inference Server RCE exploit
https://ift.tt/kPLlpoJ
Submitted January 25, 2024 at 11:30PM by FlyingTriangle
via reddit https://ift.tt/PEqzop2
https://ift.tt/kPLlpoJ
Submitted January 25, 2024 at 11:30PM by FlyingTriangle
via reddit https://ift.tt/PEqzop2
Protectai
Triton Inference Server - Arbitrary File Overwrite
On September 20th, 2023 a member of the huntr community reported an issue in Triton where a file traversal vulnerability lead to the ability to overwrite any file on the server when Triton is run using a non-default configuration option.
CVE-2024-23897 Jenkins CLI PoC
https://ift.tt/Jm5ALeX
Submitted January 26, 2024 at 04:06PM by gquere
via reddit https://ift.tt/K5H3JQ1
https://ift.tt/Jm5ALeX
Submitted January 26, 2024 at 04:06PM by gquere
via reddit https://ift.tt/K5H3JQ1
GitHub
pwn_jenkins/README.md at master · gquere/pwn_jenkins
Notes about attacking Jenkins servers. Contribute to gquere/pwn_jenkins development by creating an account on GitHub.
AsyncRAT config decryption using CyberChef - Recipe 0x2 - Securityinbits
https://ift.tt/xEbuc0A
Submitted January 26, 2024 at 05:36PM by securityinbits
via reddit https://ift.tt/1JR6PTm
https://ift.tt/xEbuc0A
Submitted January 26, 2024 at 05:36PM by securityinbits
via reddit https://ift.tt/1JR6PTm
Securityinbits
AsyncRAT config decryption using CyberChef - Recipe 0x2 - Securityinbits
Decrypt AsyncRAT configurations effortlessly using CyberChef with our step-by-step guide. Dive into the recipe and enhance your malware analysis skills.
How I hacked chess.com
https://ift.tt/omSU1pV
Submitted January 26, 2024 at 09:47PM by J_ake20o4
via reddit https://ift.tt/K0BeNDi
https://ift.tt/omSU1pV
Submitted January 26, 2024 at 09:47PM by J_ake20o4
via reddit https://ift.tt/K0BeNDi
Skii.dev
Rook to XSS: How I hacked chess.com with a rookie exploit
Playing Chess is one of the many hobbies I like to do in my spare time, apart from tinkering around with technology. However, I'm not very good at it, and after losing many games, I decided to see if I could do something I'm much better at; hacking the system!
Building a password cracker in 2024 [Deep Dive]
https://ift.tt/gf8Hb0E
Submitted January 27, 2024 at 06:28AM by hpo1n7
via reddit https://ift.tt/mt7bFoC
https://ift.tt/gf8Hb0E
Submitted January 27, 2024 at 06:28AM by hpo1n7
via reddit https://ift.tt/mt7bFoC
SEVN-X | Cybersecurity
How to Build a Password Cracker
A step by step blog on how to build a password cracker for professional cracking.
CSIRT-CTI - Stately Taurus Targets Myanmar Amidst Concerns over Military Junta’s Handling of Rebel Attacks
https://ift.tt/AkaL2UH
Submitted January 27, 2024 at 09:47PM by 0x5h4un
via reddit https://ift.tt/BtPcKfZ
https://ift.tt/AkaL2UH
Submitted January 27, 2024 at 09:47PM by 0x5h4un
via reddit https://ift.tt/BtPcKfZ
NMAP-formatter: convert NMAP results to HTML, CSV, JSON, graphviz (dot), SQLite
https://ift.tt/53FSbdc
Submitted January 28, 2024 at 12:22AM by netsec_burn
via reddit https://ift.tt/tTSIKzW
https://ift.tt/53FSbdc
Submitted January 28, 2024 at 12:22AM by netsec_burn
via reddit https://ift.tt/tTSIKzW
GitHub
GitHub - vdjagilev/nmap-formatter: A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot)…
A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot) or sqlite. Simply put it's nmap converter. - GitHub - vdjagilev/nmap-formatter: A tool that allow...
ExecIT: Evasive DLL-Based Shellcode Loader
https://ift.tt/Glg63La
Submitted January 28, 2024 at 04:05PM by florilsk
via reddit https://ift.tt/q5BChJP
https://ift.tt/Glg63La
Submitted January 28, 2024 at 04:05PM by florilsk
via reddit https://ift.tt/q5BChJP
GitHub
GitHub - florylsk/ExecIT: Execute shellcode files with rundll32
Execute shellcode files with rundll32. Contribute to florylsk/ExecIT development by creating an account on GitHub.
TyphoonCon 2024 early bird ticket are now on sale!
https://ift.tt/dxBhPtT
Submitted January 28, 2024 at 09:50PM by Straight-Zombie-646
via reddit https://ift.tt/Vwcmti3
https://ift.tt/dxBhPtT
Submitted January 28, 2024 at 09:50PM by Straight-Zombie-646
via reddit https://ift.tt/Vwcmti3
Eventbrite
TyphoonCon 2024
TyphoonCon conference and training focus on highly technical offensive security topics.
The event is organized by SSD Secure Disclosure.
The event is organized by SSD Secure Disclosure.
“Scammers Paradise” —Exploring Telegram’s Dark Markets, Breeding Ground for Modern Phishing Operations
https://ift.tt/KT9tgIU
Submitted January 29, 2024 at 08:33PM by figgymmr
via reddit https://ift.tt/hBtPGKi
https://ift.tt/KT9tgIU
Submitted January 29, 2024 at 08:33PM by figgymmr
via reddit https://ift.tt/hBtPGKi
Medium
“Scammers Paradise” —Exploring Telegram’s Dark Markets, Breeding Ground for Modern Phishing Operations
By Oleg Zaytsev, Nati Tal (Guardio Labs)
Buzzing on Christmas Eve: Trigona Ransomware in 3 Hours
https://ift.tt/exZjTpY
Submitted January 29, 2024 at 07:58PM by TheDFIRReport
via reddit https://ift.tt/JpKmkaw
https://ift.tt/exZjTpY
Submitted January 29, 2024 at 07:58PM by TheDFIRReport
via reddit https://ift.tt/JpKmkaw
The DFIR Report
Buzzing on Christmas Eve: Trigona Ransomware in 3 Hours
Key Takeaways In late December 2022, we observed threat actors exploiting a publicly exposed Remote Desktop Protocol (RDP) host, leading to data exfiltration and the deployment of Trigona ransomwar…
Sys:All: How A Simple Loophole in Google Kubernetes Engine Puts Clusters at Risk of Compromise
https://ift.tt/4QOJZSp
Submitted January 29, 2024 at 09:16PM by shulginlegacy
via reddit https://ift.tt/tkajWfC
https://ift.tt/4QOJZSp
Submitted January 29, 2024 at 09:16PM by shulginlegacy
via reddit https://ift.tt/tkajWfC
Orca Security
Sys:All: How A Simple Loophole in Google Kubernetes Engine Puts Clusters at Risk of Compromise
The Orca Research Pod has discovered a risk in Google Kubernetes Engine (GKE) that would allow an attacker with any Google account to take over a Kubernetes cluster. Learn about this risk dubbed Sys:All and the recommended actions to take.
Your Firewalls and Proxies are about to be blind to real TLS destinations: Learn about Encrypted Client Hello
https://ift.tt/Jmo7HGn
Submitted January 30, 2024 at 12:14AM by Shu_asha
via reddit https://ift.tt/EcGIPw4
https://ift.tt/Jmo7HGn
Submitted January 30, 2024 at 12:14AM by Shu_asha
via reddit https://ift.tt/EcGIPw4
Most leaked keys aren't revoked, learn about API key rotation
https://ift.tt/aJ4EUTB
Submitted January 30, 2024 at 12:08AM by Phorcez
via reddit https://ift.tt/PAtB5vw
https://ift.tt/aJ4EUTB
Submitted January 30, 2024 at 12:08AM by Phorcez
via reddit https://ift.tt/PAtB5vw
Trufflesecurity
How to Remediate Leaked Secrets ◆ Truffle Security Co.
This webinar will focus on strategies for remediating leaked keys, managing key rotation, and handling platform-specific processes for the leading SaaS providers.
Using client-side JavaScript to build a tool for Port-scanning and LAN Host Detection.
https://blog.vsim.xyz/article/east-west-client.html
Submitted January 30, 2024 at 12:44AM by Vsimpro
via reddit https://ift.tt/iMf71gI
https://blog.vsim.xyz/article/east-west-client.html
Submitted January 30, 2024 at 12:44AM by Vsimpro
via reddit https://ift.tt/iMf71gI
Reddit
From the netsec community on Reddit: Using client-side JavaScript to build a tool for Port-scanning and LAN Host Detection.
Posted by Vsimpro - 3 votes and 1 comment
LLM Assisted Jailbreak & Doxing
https://ift.tt/sWh92mC
Submitted January 30, 2024 at 01:49AM by katahdinsecurity
via reddit https://ift.tt/3AxtPhw
https://ift.tt/sWh92mC
Submitted January 30, 2024 at 01:49AM by katahdinsecurity
via reddit https://ift.tt/3AxtPhw
Import Device Tree Information onto your Ghidra memory map in order to simplify bootloader, kernel and driver reverse engineering
https://ift.tt/zocxbL2
Submitted January 30, 2024 at 01:35AM by AssociationTop7723
via reddit https://ift.tt/z4N8qPc
https://ift.tt/zocxbL2
Submitted January 30, 2024 at 01:35AM by AssociationTop7723
via reddit https://ift.tt/z4N8qPc
GitHub
GitHub - antoniovazquezblanco/GhidraDeviceTreeBlob: Import Device Tree Information onto your Ghidra memory map
Import Device Tree Information onto your Ghidra memory map - antoniovazquezblanco/GhidraDeviceTreeBlob
Exploring secureCodeBox — An Open-Source Continuous Security Testing Solution for DevSecOps
https://ift.tt/EkIYSde
Submitted January 30, 2024 at 02:36AM by theowni
via reddit https://ift.tt/U2rAqVX
https://ift.tt/EkIYSde
Submitted January 30, 2024 at 02:36AM by theowni
via reddit https://ift.tt/U2rAqVX
Medium
Exploring secureCodeBox — An Open-Source Continuous Security Testing Solution for DevSecOps
A Comprehensive Review of secureCodeBox — an Open-Source Platform for Continuous Security Utilizing Popular Testing Tools. Presenting…
bof-launcher: Beacon Object File (BOF) launcher - library for executing BOF files in C/C++/Zig applications
https://ift.tt/qTbykNp
Submitted January 30, 2024 at 02:02PM by mzet-
via reddit https://ift.tt/YrgDQ0S
https://ift.tt/qTbykNp
Submitted January 30, 2024 at 02:02PM by mzet-
via reddit https://ift.tt/YrgDQ0S
GitHub
GitHub - The-Z-Labs/bof-launcher: Beacon Object File (BOF) launcher - library for executing BOF files in C/C++/Zig applications
Beacon Object File (BOF) launcher - library for executing BOF files in C/C++/Zig applications - The-Z-Labs/bof-launcher
Is Your SAP Cloud Connector Safe? The Risk You Can't Ignore
https://ift.tt/7eZYsKP
Submitted January 30, 2024 at 02:00PM by vah_13
via reddit https://ift.tt/lYQOJGb
https://ift.tt/7eZYsKP
Submitted January 30, 2024 at 02:00PM by vah_13
via reddit https://ift.tt/lYQOJGb
RedRays - Your SAP Security Solution
Is Your SAP Cloud Connector Safe? The Risk You Can't Ignore
Learn how to enhance the security of your SAP Cloud Connector (SAP CC) deployment on Windows. Discover essential role management strategies, mitigate security risks, and gain insights into securing your SAP infrastructure. Explore best practices to protect…
Hunting for (Un)authenticated n-days in Asus Routers - Shielder
https://ift.tt/wLl6qrc
Submitted January 30, 2024 at 07:04PM by smaury
via reddit https://ift.tt/90RU128
https://ift.tt/wLl6qrc
Submitted January 30, 2024 at 07:04PM by smaury
via reddit https://ift.tt/90RU128
Shielder
Shielder - Hunting for ~~Un~~authenticated n-days in Asus Routers
Notes on patch diffing, reverse engineering and exploiting CVE-2023-39238, CVE-2023-39239, and CVE-2023-39240.