New graph capabilities and MCP server for CTI / OSINT analysis
https://ift.tt/BukHYC6
Submitted May 27, 2025 at 03:25PM by stan_frbd
via reddit https://ift.tt/09BkxGq
https://ift.tt/BukHYC6
Submitted May 27, 2025 at 03:25PM by stan_frbd
via reddit https://ift.tt/09BkxGq
The Single-Packet Shovel: Digging for Desync-Powered Request Tunnelling
https://ift.tt/cANaUf8
Submitted May 27, 2025 at 06:12PM by t0xodile
via reddit https://ift.tt/BIH36zy
https://ift.tt/cANaUf8
Submitted May 27, 2025 at 06:12PM by t0xodile
via reddit https://ift.tt/BIH36zy
Assured AB
The Single-Packet Shovel: Digging for Desync-Powered Request Tunnelling
In this paper I will reveal the discovery of wide-spread cases of request tunnelling in applications powered by popular servers including IIS, Azure Front Door and AWS' application load balancer including the creation of a novel detection technique that combined…
Have I Been Squatted — Analyze (open beta, free)
https://ift.tt/CdVSjA9
Submitted May 27, 2025 at 06:03PM by JDBHub
via reddit https://ift.tt/LMw2chC
https://ift.tt/CdVSjA9
Submitted May 27, 2025 at 06:03PM by JDBHub
via reddit https://ift.tt/LMw2chC
Haveibeensquatted
Have I Been Squatted? — Check if your domain has been typosquatted
A fast domain and typosquatting discovery tool
Remote Prompt Injection in GitLab Duo Leads to Source Code Theft
https://ift.tt/baT4s0j
Submitted May 27, 2025 at 01:53PM by Proofix
via reddit https://ift.tt/jzoBYy4
https://ift.tt/baT4s0j
Submitted May 27, 2025 at 01:53PM by Proofix
via reddit https://ift.tt/jzoBYy4
Legitsecurity
Remote Prompt Injection in GitLab Duo Leads to Source Code Theft
The Legit research team unearthed vulnerabilities in GitLab Duo.
Remote Code Execution on Evertz SDVN (CVE-2025-4009 - Full Disclosure)
https://ift.tt/J4vfWaG
Submitted May 28, 2025 at 02:42PM by g_e_r_h_a_r_d
via reddit https://ift.tt/jpCZgrS
https://ift.tt/J4vfWaG
Submitted May 28, 2025 at 02:42PM by g_e_r_h_a_r_d
via reddit https://ift.tt/jpCZgrS
Onekey
Security Advisory: Remote Code Execution on Evertz SDVN (CVE-2025-4009) | ONEKEY Research | Research | ONEKEY
Explore ONEKEY Research Lab's security advisory detailing a critical vulnerability in Evertz SDVN. Learn about the risks and recommended actions.
Open-source red teaming for AI, Kubernetes, APIs
https://ift.tt/To5YzDZ
Submitted May 28, 2025 at 06:02PM by whyhatcry
via reddit https://ift.tt/oYtqnFz
https://ift.tt/To5YzDZ
Submitted May 28, 2025 at 06:02PM by whyhatcry
via reddit https://ift.tt/oYtqnFz
Help Net Security
Woodpecker: Open-source red teaming for AI, Kubernetes, APIs
Woodpecker is an open-source tool that automates red teaming, making advanced security testing easier and more accessible. It helps teams find and fix
Decoding TCP SYN for Stronger Network Security
https://ift.tt/HiLfDou
Submitted May 28, 2025 at 07:14PM by jtkchicago
via reddit https://ift.tt/uZ2b4R5
https://ift.tt/HiLfDou
Submitted May 28, 2025 at 07:14PM by jtkchicago
via reddit https://ift.tt/uZ2b4R5
NETSCOUT
Decoding TCP SYN for Stronger Network Security | NETSCOUT
Executive SummaryAnalyzing transmission control protocol (TCP) SYN segments,
The post you couldn’t scan for is back.
https://ift.tt/l5gTBuD
Submitted May 28, 2025 at 11:22PM by CLKnDGGR
via reddit https://ift.tt/HENJ4yl
https://ift.tt/l5gTBuD
Submitted May 28, 2025 at 11:22PM by CLKnDGGR
via reddit https://ift.tt/HENJ4yl
Medium
The Threat You Can’t Scan For: Why I Built Veriduct
How a solo inventor, a storage experiment, and a refusal to accept “encrypted” as good enough led to a new kind of data defense.
How to reverse a game and build a cheat from scratch (External/Internal)
https://ift.tt/ciK8x1m
Submitted May 29, 2025 at 12:16AM by AProudMotherOf4
via reddit https://ift.tt/wCDP7kX
https://ift.tt/ciK8x1m
Submitted May 29, 2025 at 12:16AM by AProudMotherOf4
via reddit https://ift.tt/wCDP7kX
adminions.ca
Part 2 - From Reverse ... | ADMinions
Introduction
In this guide, we’ll walk step-by-step through building a fully functional internal che...
In this guide, we’ll walk step-by-step through building a fully functional internal che...
Pakistan Telecommunication Company (PTCL) Targeted by Bitter APT During Heightened Regional Conflict
https://ift.tt/lzD2NR4
Submitted May 28, 2025 at 11:20PM by Malwarebeasts
via reddit https://ift.tt/5i20cf1
https://ift.tt/lzD2NR4
Submitted May 28, 2025 at 11:20PM by Malwarebeasts
via reddit https://ift.tt/5i20cf1
InfoStealers
Pakistan Telecommunication Company (PTCL) Targeted by Bitter APT During Heightened Regional Conflict
EclecticIQ and Hudson Rock researchers assess that Bitter APT very likely used stolen email credentials from Pakistan’s Counter Terrorism Department (CTD) to carry out the attack. The spear phishing campaign targeted PTCL personnel in critical roles, including…
Deguard: turning a T480 into a coreboot laptop (10-min talk + live demo)
https://ift.tt/0AKnCyQ
Submitted May 29, 2025 at 03:55PM by 3mdeb
via reddit https://ift.tt/eR70ryh
https://ift.tt/0AKnCyQ
Submitted May 29, 2025 at 03:55PM by 3mdeb
via reddit https://ift.tt/eR70ryh
3Mdeb
Introduction to deguard Developers vPub 0xE
This talk will introduce the deguard utility, allowing to bypass Intel BootGuard and enabling coreboot development on previously locked down platforms.
🚀 Introducing XAttacker V50 Pro – Automated Web Exploitation Tool for Penetration Testers
https://ift.tt/LJ984jy
Submitted May 30, 2025 at 05:10AM by Alternative-One212
via reddit https://ift.tt/djbPlrp
https://ift.tt/LJ984jy
Submitted May 30, 2025 at 05:10AM by Alternative-One212
via reddit https://ift.tt/djbPlrp
www.xattackerv50.pro
XAttacker V50 Pro - Automated Web Exploitation Tool
Scan and exploit vulnerable web applications at scale with XAttacker V50 Pro — fast, reliable, and powerful.
Living of the file sharing systems
https://www.lolfs.app/
Submitted May 30, 2025 at 09:37AM by Equivalent-Elk-712
via reddit https://ift.tt/AJWpTlU
https://www.lolfs.app/
Submitted May 30, 2025 at 09:37AM by Equivalent-Elk-712
via reddit https://ift.tt/AJWpTlU
Reddit
From the netsec community on Reddit: [ Removed by moderator ]
Posted by Equivalent-Elk-712 - 8 votes and 2 comments
Questionnaire: Enhancing Edge Computing Security with Blockchain Technology
https://ift.tt/CiWxUKQ
Submitted May 30, 2025 at 12:11PM by Realistic-Sector6793
via reddit https://ift.tt/KvxTqw2
https://ift.tt/CiWxUKQ
Submitted May 30, 2025 at 12:11PM by Realistic-Sector6793
via reddit https://ift.tt/KvxTqw2
Google Docs
Questionnaire: Enhancing Edge Computing Security with Blockchain Technology
This questionnaire is part of a research study examining security vulnerabilities in edge computing environments and exploring Ethereum-based blockchain solutions to address these issues.
Your responses are anonymous and will be used solely for academic research…
Your responses are anonymous and will be used solely for academic research…
A detailed guide to Stealth syscall and EDR Bypass
https://ift.tt/Cvfu23F
Submitted May 30, 2025 at 03:19PM by Altrntiv-to-security
via reddit https://ift.tt/AoVEJ7G
https://ift.tt/Cvfu23F
Submitted May 30, 2025 at 03:19PM by Altrntiv-to-security
via reddit https://ift.tt/AoVEJ7G
DarkRelay
Stealth Syscall Execution: Bypassing ETW, Sysmon, and EDR Detection
"Stealth syscalls: Because life's too short to argue with an angry EDR!"
Discover how Stealth Syscall Execution bypasses ETW, Sysmon, and EDR detection. Learn advanced stealth techniques for red teaming in this cybersecurity blog.
Discover how Stealth Syscall Execution bypasses ETW, Sysmon, and EDR detection. Learn advanced stealth techniques for red teaming in this cybersecurity blog.
Finding SSRFs in Azure DevOps - Part 2
https://ift.tt/tZidKU1
Submitted May 30, 2025 at 03:48PM by BinarySecurity
via reddit https://ift.tt/D9cWQhS
https://ift.tt/tZidKU1
Submitted May 30, 2025 at 03:48PM by BinarySecurity
via reddit https://ift.tt/D9cWQhS
Binary Security AS
Finding SSRFs in Azure DevOps - Part 2
Binary Security was previously rewarded for three Server-Side Request Forgery (SSRF) vulnerabilities in Azure DevOps, which you can read about here. Now we have found another SSRF vulnerability that we also reported to Microsoft. We then bypassed Microsoft’s…
Azure Arc - C2aaS
https://ift.tt/H4P3yAh
Submitted May 31, 2025 at 02:46AM by Fit-Cut9562
via reddit https://ift.tt/BwL2amg
https://ift.tt/H4P3yAh
Submitted May 31, 2025 at 02:46AM by Fit-Cut9562
via reddit https://ift.tt/BwL2amg
ZephrSec - Adventures In Information Security
Azure Arc - C2aaS
Exploring Azure Arc’s overlooked C2aaS potential. Attacking and Defending against its usage and exploring usecases.
Wireless Pivots: How Trusted Networks Become Invisible Threat Vectors
https://ift.tt/bLrgHuZ
Submitted May 31, 2025 at 03:52PM by thexerocouk
via reddit https://ift.tt/KWO8qox
https://ift.tt/bLrgHuZ
Submitted May 31, 2025 at 03:52PM by thexerocouk
via reddit https://ift.tt/KWO8qox
TheXero
Wireless Pivots: How Trusted Networks Become Invisible Threat Vectors
Discover how attackers exploit trusted wireless networks using rogue APs, wireless pivots, and legacy protocols to turn secure EAP-TLS deployments into invisible attack surfaces.
Case Study: Real-world WordPress Vulnerability Chain (Found During Passive Testing)
https://ift.tt/iqGYSzy
Submitted May 31, 2025 at 10:01PM by Equivalent-Sir5669
via reddit https://ift.tt/l9AEf8i
https://ift.tt/iqGYSzy
Submitted May 31, 2025 at 10:01PM by Equivalent-Sir5669
via reddit https://ift.tt/l9AEf8i
Medium
How Casual Browsing Uncovered a Chain of Critical Vulnerabilities (and What I Did Next)
Cybersecurity isn’t always glamorous. Sometimes, it’s late nights at your desk, Burp Suite humming in the background, and your mom calling…
Beyond HTTP: InterceptSuite for TCP/TLS Traffic Interception in Windows
https://ift.tt/voTlsIC
Submitted May 31, 2025 at 10:56PM by Ano_F
via reddit https://ift.tt/gvIPd1c
https://ift.tt/voTlsIC
Submitted May 31, 2025 at 10:56PM by Ano_F
via reddit https://ift.tt/gvIPd1c
Medium
Beyond HTTP: InterceptSuite for TCP/TLS Traffic Interception in Windows
InterceptSuite is a tool I created to intercept and analyse network traffic in Windows applications, whether encrypted or not. Unlike…
Experimenting with USB-Based Attacks: Can a Standard USB Become a Bad USB? (Write-up)
https://ift.tt/ZHLC4yW
Submitted May 31, 2025 at 10:50PM by Equivalent-Sir5669
via reddit https://ift.tt/jZ8zNA7
https://ift.tt/ZHLC4yW
Submitted May 31, 2025 at 10:50PM by Equivalent-Sir5669
via reddit https://ift.tt/jZ8zNA7
Medium
Can You Turn a Normal USB into a Bad KB? Exploring the Limits and Cybersecurity Uses
Converting a Normal SanDisk USB into a Bad USB or Rubber Ducky