hackspace
@hackspace
157
subscribers
279
photos
75
videos
23
files
998
links
hackspace
Download Telegram
Join
hackspace
157 subscribers
hackspace
https://medium.com/@abbasheybati1/bypass-rate-limit-request-fuzzing-etc-with-tor-3a285f3980d2?s=09
Medium
Bypass Rate Limit Request (fuzzing/etc…) With TOR
Hey guys
hackspace
https://infosecwriteups.com/understanding-ldap-injection-crafting-payloads-and-mitigation-strategies-be90991b7ac8?s=09
Medium
Understanding LDAP Injection: Crafting Payloads and Mitigation Strategies
LDAP (Lightweight Directory Access Protocol) is a widely used protocol for accessing and managing directory services. It is often employed…
hackspace
Operator Handbook Red Team + OSINT + Blue Team Reference.pdf
3.1 MB
👍
2
hackspace
hackspace
https://github.com/tkmru/awesome-edr-bypass?s=09
GitHub
GitHub - tkmru/awesome-edr-bypass: Awesome EDR Bypass Resources For Ethical Hacking
Awesome EDR Bypass Resources For Ethical Hacking. Contribute to tkmru/awesome-edr-bypass development by creating an account on GitHub.
hackspace
https://github.com/satwikkansal/wtfpython?s=09
GitHub
GitHub - satwikkansal/wtfpython: What the f*ck Python?
😱
What the f*ck Python?
😱
. Contribute to satwikkansal/wtfpython development by creating an account on GitHub.
hackspace
https://crnkovic.dev/testing-converso/?s=09
crnkovic.dev
Testing a new encrypted messaging app's extraordinary claims
How I breached a nonexistent database and found every private key in a 'state-of-the-art' encrypted messenger.
hackspace
1:06
Media is too big
VIEW IN TELEGRAM
hackspace
https://blog.thc.org/infecting-ssh-public-keys-with-backdoors?s=09
The Hacker's Choice
Infecting SSH Public Keys with backdoors
In this article, you will learn how to add a backdoor to the SSH Public Key. The backdoor will execute whenever the user logs in. The backdoor hides as an unreadable long hex-string inside ~/.ssh/authorized_keys or ~/.ssh/id_*.pub.
The source is avai...
hackspace
https://analyst1.com/ransomware-diaries-volume-2/?s=09
Analyst1
Ransomware Diaries V. 2: A Ransomware Hacker Origin Story
Learn about a man who entered organized crime at a young age & was groomed & mentored by a well-connected figure within the ransomware community.
hackspace
Forwarded from
𝕷𝕺𝕲
1:27
This media is not supported in your browser
VIEW IN TELEGRAM
hackspace
https://github.com/WKL-Sec/HiddenDesktop
GitHub
GitHub - WKL-Sec/HiddenDesktop: HVNC for Cobalt Strike
HVNC for Cobalt Strike. Contribute to WKL-Sec/HiddenDesktop development by creating an account on GitHub.
hackspace
https://app.netlas.io/host/
app.netlas.io
Discover, Research and Monitor any Assets Available Online
Internet intelligence apps that provide accurate technical information on IP addresses, domain names, websites, web applications, IoT devices, and other online assets.
hackspace
https://github.com/imthenachoman/How-To-Secure-A-Linux-Server?s=09
GitHub
GitHub - imthenachoman/How-To-Secure-A-Linux-Server: An evolving how-to guide for securing a Linux server.
An evolving how-to guide for securing a Linux server. - imthenachoman/How-To-Secure-A-Linux-Server
hackspace
https://www.yuque.com/viper-en/inh85g/cvucxz?language=en-us
hackspace
https://github.com/shadawck/awesome-anti-forensic
GitHub
GitHub - shadawck/awesome-anti-forensic: Tools and packages that are used for countering forensic activities, including encryption…
Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attributes. This all includes tools to work with anything in gener...
hackspace
https://www.trustedsec.com/blog/red-vs-blue-kerberos-ticket-times-checksums-and-you/?s=09
TrustedSec
Red vs. Blue: Kerberos Ticket Times, Checksums, and You! - TrustedSec
TrustedSec's blog is an expert source of information on information security trends and best practices for strategic risk management.
hackspace
https://blog.calif.io/p/privilege-escalation-in-eks?s=09
blog.calif.io
Privilege escalation in AWS Elastic Kubernetes Service (EKS)
The team recently encountered an interesting scenario where we were trying to escalate privileges from a compromised pod in AWS Elastic Kubernetes Service (EKS) and struggled with NodeRestriction, a security mechanism enabled by default on all EKS versions
hackspace
https://github.com/hackerschoice/ssh-key-backdoor?s=09
GitHub
GitHub - hackerschoice/ssh-key-backdoor
Contribute to hackerschoice/ssh-key-backdoor development by creating an account on GitHub.
hackspace
https://youtu.be/VeFF344NbZ4
YouTube
SuperRT - Realtime raytracing on the SNES (short demo)
This is a short demonstration of a homebrew SNES expansion chip designed to add raytracing capabilities to the system.
More technical details: https://youtu.be/2jee4tlakqo (video) https://www.shironekolabs.com/posts/superrt/ (text)
hackspace
Forwarded from
𝕷𝕺𝕲
Nissan NRV-II (1983)
TWeb.init({scrollToPost:'hackspace/859'});