How to Setup Kali Linux on Docker + Create Custom Image & File Share
https://ift.tt/jZao1z3
Submitted June 11, 2025 at 09:43AM by kongwenbin
via reddit https://ift.tt/tLIe2zX
https://ift.tt/jZao1z3
Submitted June 11, 2025 at 09:43AM by kongwenbin
via reddit https://ift.tt/tLIe2zX
My Learning Journey
How to Setup Kali Linux on Docker + Create Custom Image & File Share
Learn how to set up Kali Linux on Docker with a custom image and file sharing. Great for bug bounty beginners and ethical hackers.
Best Open Source Security Tools in 2025
https://ift.tt/QJw5Pxb
Submitted June 11, 2025 at 10:58AM by mendy_06
via reddit https://ift.tt/UB7fWVz
https://ift.tt/QJw5Pxb
Submitted June 11, 2025 at 10:58AM by mendy_06
via reddit https://ift.tt/UB7fWVz
Medium
Best Open Source Security Tools in 2025
As security teams scale and diversify, open-source tools remain essential — whether for detection, response, threat intel, or automation…
CVE-2025-33073: A Look in the Mirror - The Reflective Kerberos Relay Attack
https://ift.tt/b2MYNjF
Submitted June 11, 2025 at 01:40PM by RedTeamPentesting
via reddit https://ift.tt/XPJVmyN
https://ift.tt/b2MYNjF
Submitted June 11, 2025 at 01:40PM by RedTeamPentesting
via reddit https://ift.tt/XPJVmyN
RedTeam Pentesting - Blog
A Look in the Mirror - The Reflective Kerberos Relay Attack
It is a sad truth in IT security that some vulnerabilities never quite want to die and time and time again, vulnerabilities that have long been fixed get revived and come right back at you. While researching relay attacks, the bane of Active …
Les comptes machines dans Active Directory
https://ift.tt/t14nASR
Submitted June 11, 2025 at 06:35PM by MobetaSec
via reddit https://ift.tt/jZ9nkCS
https://ift.tt/t14nASR
Submitted June 11, 2025 at 06:35PM by MobetaSec
via reddit https://ift.tt/jZ9nkCS
Mobeta
Les comptes machines dans Active Directory | Mobeta
Découvrez le rôle des comptes machines dans Active Directory en pentest et les attaques possibles (Shadow Credentials, RBCD, Silver Ticket).
Weaponized Google OAuth Triggers Malicious WebSocket
https://ift.tt/dhsqVPX
Submitted June 11, 2025 at 07:03PM by unknownhad
via reddit https://ift.tt/PXlbqQ8
https://ift.tt/dhsqVPX
Submitted June 11, 2025 at 07:03PM by unknownhad
via reddit https://ift.tt/PXlbqQ8
cside
Weaponized Google OAuth Triggers Malicious WebSocket
An attacker is using ‘Google.com’ to deliver and execute their own code in a weaponized Google OAuth attack.
Getting RCE on Monero forums with wrapwrap
https://ift.tt/vNrP4uK
Submitted June 11, 2025 at 06:46PM by AlmondOffSec
via reddit https://ift.tt/P1IH3cj
https://ift.tt/vNrP4uK
Submitted June 11, 2025 at 06:46PM by AlmondOffSec
via reddit https://ift.tt/P1IH3cj
swap.gs
Getting RCE on Monero forums with wrapwrap
breakpoint of no return
Stryker - Android pentesting app with premium access is now free until 2050
https://ift.tt/DusPUJW
Submitted June 12, 2025 at 03:18PM by barakadua131
via reddit https://ift.tt/hOzV5Ms
https://ift.tt/DusPUJW
Submitted June 12, 2025 at 03:18PM by barakadua131
via reddit https://ift.tt/hOzV5Ms
Mobile Hacker
Stryker App Goes Free: The Ultimate Mobile Pentesting Toolkit
Stryker is a powerful mobile app that transforms your Android device into a pentesting workspace. Designed to help you test networks and devices for common vulnerabilities without requiring specialized skills or extensive knowledge
Meta is able to track it’s users via WebRTC on Android including private mode and behind VPN
https://ift.tt/zkYTVmJ
Submitted June 12, 2025 at 05:45PM by dvrkcat
via reddit https://ift.tt/HmC932G
https://ift.tt/zkYTVmJ
Submitted June 12, 2025 at 05:45PM by dvrkcat
via reddit https://ift.tt/HmC932G
www.zeropartydata.es
“Localhost tracking” explained. It could cost Meta 32 billion.
You just can't finish off Zuckerberg.
Millions of Vulnerabilities: One Checklist to Kill The Noise
https://ift.tt/N56AUmr
Submitted June 12, 2025 at 08:56PM by pathetiq
via reddit https://ift.tt/W4OVnmB
https://ift.tt/N56AUmr
Submitted June 12, 2025 at 08:56PM by pathetiq
via reddit https://ift.tt/W4OVnmB
Security Autopsy
Millions of Vulnerabilities: One Checklist to Kill The Noise
One important subject to discuss when talking about vulnerability management is the day you open the valve on a code scanning tool that generates an enormous number of security findings. This has been a problem in information security since the early 2000s…
Introducing: GitHub Device Code Phishing
https://ift.tt/sHlh2QV
Submitted June 12, 2025 at 09:50PM by IrohsLotusTile
via reddit https://ift.tt/AIPD215
https://ift.tt/sHlh2QV
Submitted June 12, 2025 at 09:50PM by IrohsLotusTile
via reddit https://ift.tt/AIPD215
Praetorian
Introducing: GitHub Device Code Phishing
GitHub Device Code phishing: A new attack vector targeting developers. Learn how attackers abuse OAuth flows to compromise organizations and steal source code.
Influencing LLM Output using logprobs and Token Distribution
https://ift.tt/TAIluQK
Submitted June 12, 2025 at 11:46PM by theMiddleBlue
via reddit https://ift.tt/rPKZfAp
https://ift.tt/TAIluQK
Submitted June 12, 2025 at 11:46PM by theMiddleBlue
via reddit https://ift.tt/rPKZfAp
Sicuranext Blog
Influencing LLM Output using logprobs and Token Distribution
What if you could influence an LLM's output not by breaking its rules, but by bending its probabilities? In this deep-dive, we explore how small changes in user input (down to a single token) can shift the balance between “true” and “false”, triggering radically…
Batteries included collaborative knowledge management solution for threat intelligence researchers
https://cradle.sh/
Submitted June 13, 2025 at 10:31PM by small_talk101
via reddit https://ift.tt/yNSDIiR
https://cradle.sh/
Submitted June 13, 2025 at 10:31PM by small_talk101
via reddit https://ift.tt/yNSDIiR
cradle.sh
CRADLE Intelligence Hub
Latest version: v2.10.0 CRADLE Intelligence Hub Batteries included collaborative knowledge management solution for threat intelligence researchers.
Giving an LLM Command Line Access to Nmap
https://ift.tt/Wu1J6w8
Submitted June 14, 2025 at 03:49AM by thewanderer1999
via reddit https://ift.tt/DJP1KLH
https://ift.tt/Wu1J6w8
Submitted June 14, 2025 at 03:49AM by thewanderer1999
via reddit https://ift.tt/DJP1KLH
HackerTarget.com
Giving an LLM Command Line Access to Nmap | HackerTarget.com
What would it look like giving LLM's command line access to Nmap. Explore the possibilities in the security tools space.
Make Self-XSS Great Again
https://ift.tt/Ne1MTt0
Submitted June 14, 2025 at 02:06PM by AlmondOffSec
via reddit https://ift.tt/7tVduyS
https://ift.tt/Ne1MTt0
Submitted June 14, 2025 at 02:06PM by AlmondOffSec
via reddit https://ift.tt/7tVduyS
blog.slonser.info
Make Self-XSS Great Again
Disclaimer: This article is intended for security professionals conducting authorized testing within the scope of a contract. The author is not responsible for any damage caused by the application of the provided information. The distribution of malicious…
GIMP Heap Overflow Re-Discovery and Exploitation (CVE-2025–6035)
https://ift.tt/axQgb2G
Submitted June 14, 2025 at 09:39PM by cy1337
via reddit https://ift.tt/btPhV4j
https://ift.tt/axQgb2G
Submitted June 14, 2025 at 09:39PM by cy1337
via reddit https://ift.tt/btPhV4j
Medium
GIMP Heap Overflow Re-Discovery and Exploitation (CVE-2025–6035)
Back in April, I shared a walkthrough on how to make a Ghidra noscript for spotting suspicious malloc calls. I then put that noscript to the…
Input on using the ROT and network connection to hack voting and tabulating software and hardware.
https://ift.tt/aGB516u
Submitted June 15, 2025 at 10:14AM by RobbyRock75
via reddit https://ift.tt/LP1X6MQ
https://ift.tt/aGB516u
Submitted June 15, 2025 at 10:14AM by RobbyRock75
via reddit https://ift.tt/LP1X6MQ
Substack
She Won. They Didn't Just Change the Machines. They Rewired the Election.
How Leonard Leo's 2021 sale of an electronics firm enabled tech giants to subvert the 2024 election.
GoClipC2 - Clipboard for C2 on Windows in Go
https://ift.tt/eoPcHyg
Submitted June 15, 2025 at 04:43PM by Fit-Cut9562
via reddit https://ift.tt/NutUkZQ
https://ift.tt/eoPcHyg
Submitted June 15, 2025 at 04:43PM by Fit-Cut9562
via reddit https://ift.tt/NutUkZQ
ZephrSec - Adventures In Information Security
Clippy Goes Rogue (GoClipC2)
GoClipC2: A covert Windows clipboard-based C2 channel for VDI/RDP environments. Bypasses network monitoring with encrypted Base64 messaging.
Hosting images inside dns records using TXT.
https://ift.tt/BmXVxN2
Submitted June 16, 2025 at 01:57AM by Ok-Mushroom-8245
via reddit https://ift.tt/n3uSKtW
https://ift.tt/BmXVxN2
Submitted June 16, 2025 at 01:57AM by Ok-Mushroom-8245
via reddit https://ift.tt/n3uSKtW
Asherfalcon
Asher Falcon
Asher Falcon's personal website - Software engineer and student
How to run ADB and fastboot in Termux without root
https://ift.tt/tjHqsN9
Submitted June 16, 2025 at 01:51PM by barakadua131
via reddit https://ift.tt/vwS9ATc
https://ift.tt/tjHqsN9
Submitted June 16, 2025 at 01:51PM by barakadua131
via reddit https://ift.tt/vwS9ATc
Mobile Hacker
How to Run ADB and Fastboot on a Non-Rooted Android Smartphone Using Termux
Thanks to Termux and the clever termux-adb project, you can run ADB and Fastboot directly from your phone — no computer needed. This guide breaks down how to install it, how it works, and practical use cases.
Telegram messenger's ties to Russia's FSB revealed in new report
https://ift.tt/8eP91lS
Submitted June 16, 2025 at 11:17PM by darkhorn
via reddit https://ift.tt/xynh0BH
https://ift.tt/8eP91lS
Submitted June 16, 2025 at 11:17PM by darkhorn
via reddit https://ift.tt/xynh0BH
Newsweek
Telegram messenger's ties to Russia's FSB revealed in new report
A cybersecurity expert warned Telegram could become "a tool for global surveillance of messenger users."
Security Analysis: MCP Protocol Vulnerabilities in AI Toolchains
https://ift.tt/5YXo9Jt
Submitted June 17, 2025 at 02:46PM by ES_CY
via reddit https://ift.tt/dK30jag
https://ift.tt/5YXo9Jt
Submitted June 17, 2025 at 02:46PM by ES_CY
via reddit https://ift.tt/dK30jag
Cyberark
Is your AI safe? Threat analysis of MCP (Model Context Protocol)
Unless you lived under a rock for the past several months or started a digital detox, you have probably encountered the MCP initials (Model Context Protocol). But what is MCP? Is this just a...