WordPress Security Providers Falsely Claimed Cloudflare's Plugin Contained Vulnerability
https://ift.tt/6a05Clo
Submitted February 05, 2024 at 11:55PM by PluginVulns
via reddit https://ift.tt/iKI3MHU
https://ift.tt/6a05Clo
Submitted February 05, 2024 at 11:55PM by PluginVulns
via reddit https://ift.tt/iKI3MHU
Plugin Vulnerabilities
WordPress Security Providers Falsely Claimed Cloudflare’s Plugin Contained Vulnerability
Rust Won't Save Us: An Analysis of 2023's Known Exploited Vulnerabilities – Horizon3.ai
https://ift.tt/7LsVzwj
Submitted February 06, 2024 at 04:48PM by scopedsecurity
via reddit https://ift.tt/Z96AIwG
https://ift.tt/7LsVzwj
Submitted February 06, 2024 at 04:48PM by scopedsecurity
via reddit https://ift.tt/Z96AIwG
Horizon3.ai
Rust Won’t Save Us: An Analysis of 2023’s Known Exploited Vulnerabilities
A technical and root cause analysis of CISA’s Known Exploited Vulnerabilities from 2023.
Trends in Phishing, Fraud, 'Dark AI Models', and how to better protect yourself.
https://ift.tt/TtqCwes
Submitted February 06, 2024 at 10:27PM by Seaerkin2
via reddit https://ift.tt/bY4cEdQ
https://ift.tt/TtqCwes
Submitted February 06, 2024 at 10:27PM by Seaerkin2
via reddit https://ift.tt/bY4cEdQ
Guardyourdomain
DomainGuard | Threat Visibility Platform
We guard your domain, so you have peace of mind. Threat Visibility Platform.
Using Scapy for Network Fuzzing on Vsftpd
https://ift.tt/CfYxQwL
Submitted February 07, 2024 at 12:08AM by Altrntiv-to-security
via reddit https://ift.tt/z03KDTI
https://ift.tt/CfYxQwL
Submitted February 07, 2024 at 12:08AM by Altrntiv-to-security
via reddit https://ift.tt/z03KDTI
DARKRELAY
Unleashing the Power of Scapy for Protocol Fuzzing
Scapy's comprehensive set of features enables the creation of customized network traffic, making it an ideal tool for fuzzing.
NTLM Relay Gat: Automating Mass Exploitation of ntlmrelayx Authenticated Sessions
https://ift.tt/pky1bVx
Submitted February 07, 2024 at 01:27AM by ad0nis
via reddit https://ift.tt/BwmGsxA
https://ift.tt/pky1bVx
Submitted February 07, 2024 at 01:27AM by ad0nis
via reddit https://ift.tt/BwmGsxA
GitHub
GitHub - ad0nis/ntlm_relay_gat
Contribute to ad0nis/ntlm_relay_gat development by creating an account on GitHub.
apk.sh makes reverse engineering Android apps easier, automating some repetitive tasks like pulling, decoding, rebuilding and patching an APK.
https://ift.tt/Ug6fn5C
Submitted February 07, 2024 at 03:08AM by recovo_recovo
via reddit https://ift.tt/fL2HoR6
https://ift.tt/Ug6fn5C
Submitted February 07, 2024 at 03:08AM by recovo_recovo
via reddit https://ift.tt/fL2HoR6
GitHub
GitHub - ax/apk.sh: apk.sh makes reverse engineering Android apps easier, automating some repetitive tasks like pulling, decoding…
apk.sh makes reverse engineering Android apps easier, automating some repetitive tasks like pulling, decoding, rebuilding and patching an APK. - ax/apk.sh
How to create a Secure, Random Password with JavaScript
https://ift.tt/qwY4Jby
Submitted February 07, 2024 at 12:09PM by hannob
via reddit https://ift.tt/vPu1AoG
https://ift.tt/qwY4Jby
Submitted February 07, 2024 at 12:09PM by hannob
via reddit https://ift.tt/vPu1AoG
Enumerate AWS tags, account ids, and org ids of accessible AWS resources
https://ift.tt/jW8XoB3
Submitted February 07, 2024 at 08:32AM by dagrz-cloudsec
via reddit https://ift.tt/24V6eJt
https://ift.tt/jW8XoB3
Submitted February 07, 2024 at 08:32AM by dagrz-cloudsec
via reddit https://ift.tt/24V6eJt
Plerion
Conditional Love for AWS Metadata Enumeration
How would you feel if an attacker could read your AWS resource tags? Turns out they can! Find out how and test your environment with our tool.
Unpack RedLine stealer to extract config using pe-sieve -Part 2 - Securityinbits
https://ift.tt/0cnSsqI
Submitted February 07, 2024 at 06:52PM by securityinbits
via reddit https://ift.tt/53KG67S
https://ift.tt/0cnSsqI
Submitted February 07, 2024 at 06:52PM by securityinbits
via reddit https://ift.tt/53KG67S
Securityinbits
Unpack RedLine stealer to extract config using pe-sieve -Part 2 - Securityinbits
Unpack RedLine stealer to extract config using pe-sieve. pe-sieve dumps then unpacked files from memory. Then, extract the config from the dumped file.
ShmooCon 2024 Videos are up!
https://ift.tt/WgD4Vim
Submitted February 08, 2024 at 01:51AM by mubix
via reddit https://ift.tt/usa95Lr
https://ift.tt/WgD4Vim
Submitted February 08, 2024 at 01:51AM by mubix
via reddit https://ift.tt/usa95Lr
Internet Archive
Shmoocon 2024 : ShmooCon : Free Download, Borrow, and Streaming : Internet Archive
ShmooCon 2024by Shmoo Group, various presentersThe videos in this collection are from ShmooCon 2024, which occurred on 12 - 14 January 2024, at the Washington...
Shellcode evasion using Wasm/Wat and Rust
https://ift.tt/muNstbg
Submitted February 08, 2024 at 03:26PM by flamedpt
via reddit https://ift.tt/mWJAwYx
https://ift.tt/muNstbg
Submitted February 08, 2024 at 03:26PM by flamedpt
via reddit https://ift.tt/mWJAwYx
Balwurk
Shellcode evasion using WebAssembly and Rust - Balwurk
Everyone in InfoSec knows Metasploit and the importance this tool has had on many professionals and in the field itself, either be it for awareness purposes, education, CTFs or actual live penetration tests, odds are the reader has encountered and used Metasploit…
New TOTOLINK vulnerability allows remote unauthenticated attackers to become authenticated due to a stack overflow vulnerability in the web interface!
https://ift.tt/8I4sBAd
Submitted February 08, 2024 at 04:03PM by Status_Resolve2971
via reddit https://ift.tt/CYR3Z1r
https://ift.tt/8I4sBAd
Submitted February 08, 2024 at 04:03PM by Status_Resolve2971
via reddit https://ift.tt/CYR3Z1r
SSD Secure Disclosure
SSD Advisory - TOTOLINK LR1200GB Auth Bypass - SSD Secure Disclosure
Summary A vulnerability in TOTOLINK LR1200GB allows remote unauthenticated attackers to become authenticated due to a stack overflow vulnerability in the web interface. Additional post-auth vulnerabilities in the product allow for command injection and their…
Java applet + serialization in 2024! What could go wrong?
https://ift.tt/8M9JBpE
Submitted February 08, 2024 at 07:06PM by 0xdea
via reddit https://ift.tt/Asbz4pc
https://ift.tt/8M9JBpE
Submitted February 08, 2024 at 07:06PM by 0xdea
via reddit https://ift.tt/Asbz4pc
hn security
Java applet + serialization in 2024! What could go wrong? - hn security
Recently, during a red team engagement […]
Form Tools Remote Code Execution: We Need To Talk About PHP - watchTowr Labs
https://ift.tt/NWpkAOs
Submitted February 09, 2024 at 07:32AM by dx7r__
via reddit https://ift.tt/5rSgVeP
https://ift.tt/NWpkAOs
Submitted February 09, 2024 at 07:32AM by dx7r__
via reddit https://ift.tt/5rSgVeP
watchTowr Labs - Blog
Form Tools Remote Code Execution: We Need To Talk About PHP
When looking across the attack surface of large enterprises, the expectation is the utilisation of well-known heavy-hitting software and appliances. Think your Citrix's, Cisco's, MOVEit's, and other such excitement.
These products are enterprise-grade, in…
These products are enterprise-grade, in…
IncludeSec's part 2 of understanding of prompt injection via the internals of transformer-based LLMs
https://ift.tt/R3YeZBh
Submitted February 09, 2024 at 07:09AM by 907jessejones
via reddit https://ift.tt/I8gQEvh
https://ift.tt/R3YeZBh
Submitted February 09, 2024 at 07:09AM by 907jessejones
via reddit https://ift.tt/I8gQEvh
Include Security Research Blog
Improving LLM Security Against Prompt Injection: AppSec Guidance For Pentesters and Developers - Part 2 - Include Security Research…
In Part 2 of our series focusing on improving LLM security against prompt injection we’re doing a deeper dive into transformers, attention, and how these topics play a role in prompt injection attacks. This post aims to provide more under-the-hood context…
Ivanti Connect Secure CVE-2024-22024 - Are We Now Part Of Ivanti? - watchTowr Labs
https://ift.tt/cDo1l0b
Submitted February 09, 2024 at 10:31AM by dx7r__
via reddit https://ift.tt/w7XSeNP
https://ift.tt/cDo1l0b
Submitted February 09, 2024 at 10:31AM by dx7r__
via reddit https://ift.tt/w7XSeNP
watchTowr Labs
Ivanti Connect Secure CVE-2024-22024 - Are We Now Part Of Ivanti?
As astute readers of our Twitter account (https://twitter.com/watchtowrcyber) and blog will know, we’ve recently been heavily involved in understanding the recent spatter of vulnerabilities in Ivanti products - most recently, their Connect Secure product…
Distributed rate limiting, a new approach to prevent Bruteforce, DDOS, Credential Stuffing, etc.
https://ift.tt/kbv5ZRx
Submitted February 09, 2024 at 11:41AM by gitcommitshow
via reddit https://ift.tt/3pzvDVc
https://ift.tt/kbv5ZRx
Submitted February 09, 2024 at 11:41AM by gitcommitshow
via reddit https://ift.tt/3pzvDVc
Fluxninja
Introduction | FluxNinja Aperture
Aperture is a distributed load management platform designed for rate limiting,
Blog - Github PoC Exploits Data Analysis "Prediction" for the year 2024
https://ift.tt/sFR6Guw
Submitted February 09, 2024 at 02:07PM by gfekkas
via reddit https://ift.tt/7g0z5CZ
https://ift.tt/sFR6Guw
Submitted February 09, 2024 at 02:07PM by gfekkas
via reddit https://ift.tt/7g0z5CZ
PRIOn - AI Driven Vulnerablity Analysis & Prioritization
Blog - Deep dive into GitHub Proof of Concept (PoC) Exploits Data and a "Prediction" for the year 2024 - PRIOn
In this blog we delve into a timeseries analysis by trying to answer various questions related to GitHub exploit PoC repositories. A future prediction was made.
JSON Smuggling: A far-fetched intrusion detection evasion technique
https://ift.tt/WFtLq0h
Submitted February 09, 2024 at 03:46PM by Robbedoes_
via reddit https://ift.tt/jB0kMdH
https://ift.tt/WFtLq0h
Submitted February 09, 2024 at 03:46PM by Robbedoes_
via reddit https://ift.tt/jB0kMdH
Medium
JSON Smuggling: A far-fetched intrusion detection evasion technique
TL:DR Insignificant whitespaces in the JSON standard can be used to encode data without breaking the format. This could aid malicious…
I Know What Your Password Was Last Summer...
https://ift.tt/Wnzoctx
Submitted February 10, 2024 at 12:16AM by ZephrX112
via reddit https://ift.tt/SmC9bqP
https://ift.tt/Wnzoctx
Submitted February 10, 2024 at 12:16AM by ZephrX112
via reddit https://ift.tt/SmC9bqP
Lares Labs
I Know What Your Password Was Last Summer...
We have spent the last six months researching on the previous two years of prior cracked passwords and built some tools to understand password creation strategies better. Here are the results.
How is the NVD being used by security analysts? Are there any problems with the NVD? Help us in an academic survey!
https://ift.tt/VKTdiye
Submitted February 08, 2024 at 10:41PM by faui1-study
via reddit https://ift.tt/NQ2Ebav
https://ift.tt/VKTdiye
Submitted February 08, 2024 at 10:41PM by faui1-study
via reddit https://ift.tt/NQ2Ebav
www.cs1.tf.fau.de
Survey on usage of NVD › IT Security Infrastructures Lab
The lab is conducting a research study to investigate the usage and possible issues of the NVD (National Vulnerability Database). If you ...