BugBounty & Hacking Resources
@projectzeroTM
1.18K
subscribers
22
photos
2
videos
5
files
362
links
Download Telegram
Join
BugBounty & Hacking Resources
1.18K subscribers
BugBounty & Hacking Resources
https://www.darknavy.org/darknavy_insight/the_most_golden_bypass_of_2024/
DARKNAVY
The Most "Golden" Bypass of 2024
Since the early 2000s, attacks based on browser vulnerabilities have remained a mainstream, effective, and versatile attack method. The following is the second article from the “DARKNAVY INSIGHT | 2024 Annual Security Report”.
According to the latest report…
❤
1
BugBounty & Hacking Resources
https://www.darknavy.org/darknavy_insight/the_most_groundbreaking_new_security_ecosystem_of_2024/
DARKNAVY
The Most Groundbreaking New Security Ecosystem of 2024
In the “DARKNAVY INSIGHT | 2023 Annual Security Report”, we noted: “As we stand on the precipice of the next decade, 2023 will undoubtedly be a year of profound transformation. The deployment of new defense mechanisms and the rise of novel attack technologies…
❤
1
BugBounty & Hacking Resources
https://blog.voorivex.team/css-data-exfiltration-to-steal-oauth-token
Voorivex's Team
CSS Data Exfiltration to Steal OAuth Token
Use CSS injection to bypass CSP, exfiltrate OAuth tokens through unique chaining techniques. Discover vulnerability and exploit details
❤
4
BugBounty & Hacking Resources
This media is not supported in your browser
VIEW IN TELEGRAM
🤣
7
BugBounty & Hacking Resources
https://medium.com/immunefi/how-to-stay-motivated-when-hunting-for-bugs-4966ac0d658
Medium
How to Stay Motivated When Hunting for Bugs
I’ve been hacking since 2014 and more recently focusing on bounty hunting in the blockchain space. For example, I found a critical bug in…
❤
1
BugBounty & Hacking Resources
https://embracethered.com/blog/posts/2025/chatgpt-operator-prompt-injection-exploits/
Embrace The Red
ChatGPT Operator: Prompt Injection Exploits And Defenses (Or, How a GitHub Issue Can Hijack Your AI)
Can GitHub Issues Hijack Your AI? This post explores how ChatGPT Operator can be hijacked through prompt injection exploits on web pages, leading to unauthorized data leakage of personal information.
❤
1
BugBounty & Hacking Resources
https://www.darknavy.org/darknavy_insight/the_most_unfortunate_backdoor_of_2024/
DARKNAVY
The Most Unfortunate Backdoor of 2024
Does open source guarantee that there are no backdoors?
At the 1983 Turing Award ceremony, Ken Thompson raised this question. As one of only three legends to win the Turing Award before the age of 40, he demonstrated how to hack Unix systems compiled from…
❤
1
BugBounty & Hacking Resources
https://www.darknavy.org/darknavy_insight/the_most_prominent_privacy_security_trend_of_2024/
DARKNAVY
The Most Prominent Privacy Security Trend of 2024
At the beginning of 2025, the five-year “Siri Eavesdropping Scandal” finally came to an end. Apple settled a class-action lawsuit with the plaintiffs for $95 million.
This well-known privacy case started when users accused Siri of accidentally capturing and…
❤
1
BugBounty & Hacking Resources
https://www.darknavy.org/darknavy_insight/the_maddest_vulnerability_of_2024/
DARKNAVY
The Maddest Vulnerability of 2024
Under the collective efforts of security researchers and increasingly stringent security mitigations, most memory vulnerabilities have been nipped in the bud.
Is it time to declare memory vulnerabilities a thing of the past?
In July 2024, a “nuclear bomb”…
❤
1
BugBounty & Hacking Resources
https://www.darknavy.org/darknavy_insight/the_most_imaginative_new_applications_of_2024/
DARKNAVY
The Most Imaginative New Applications of 2024
2023 was the dawn of generative AI and large language models, which output content in unprecedented ways.
In 2024, a large number of AI agents emerged, expanding the capabilities of LLM, driving more widespread tool usage, and extending their application…
❤
1
BugBounty & Hacking Resources
https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js/
codeanlabs
CVE-2024-4367 - Arbitrary JavaScript execution in PDF.js - Codean Labs
A vulnerability in PDF.js found by Codean Labs. PDF.js is a JavaScript-based PDF viewer maintained by Mozilla. This bug allows an attacker to execute arbitrary JavaScript code as soon as a malicious PDF file is opened. This affects all Firefox users (
❤
1
👍
1
BugBounty & Hacking Resources
https://www.atredis.com/blog/2025/2/18/advisory-blog-series
❤
1
BugBounty & Hacking Resources
https://www.darknavy.org/darknavy_insight/the_most_secure_defenders_of_2024/
DARKNAVY
The Most "Secure" Defenders of 2024
In the increasingly intense offense and defense confrontation of 2024, security software has always been regarded as an important cornerstone of the corporate security defense line. However, these security softwares themselves may also have vulnerabilities…
❤
1
BugBounty & Hacking Resources
https://www.darknavy.org/darknavy_insight/the_most_unstoppable_offensive_and_defensive_trend_of_2024/
DARKNAVY
The Most Unstoppable Offensive and Defensive Trend of 2024
In recent years, the evolution of vulnerabilities and defense techniques has been continuous. From the days when a simple stack overflow could compromise a system, to the present day, where sophisticated techniques are necessary to bypass multiple layers…
❤
1
BugBounty & Hacking Resources
https://github.com/google/security-research/security/advisories/GHSA-73px-m3vw-mr35
GitHub
PaloAlto OpenConfig Plugin: Command Injection Vulnerability
### Summary
A vulnerability in PAN-OS OpenConfig allows an authenticated user to run arbitrary commands on the underlying OS. The commands are run as device administrator.
### Details
Palo A...
❤
1
👍
1
BugBounty & Hacking Resources
https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-mvqj
GitHub
RSync: Heap Buffer Overflow, Info Leak, Server Leaks, Path Traversal and Safe links Bypass
### Summary
In this report, we describe multiple vulnerabilities we discovered in Rsync.
The first pair of vulnerabilities are a [Heap Buffer Overflow](https://nvd.nist.gov/vuln/detail/cve-202...
❤
1
BugBounty & Hacking Resources
https://www.darknavy.org/darknavy_insight/the_most_frustrating_vulnerability_disclosure_of_2024/
DARKNAVY
The Most Frustrating Vulnerability Disclosure of 2024
In the field of cybersecurity, vulnerability disclosure has long been regarded as a crucial step in safeguarding users. However, in practice, this process is fraught with controversy and contradictions. What truly constitutes “responsible disclosure”? When…
❤
1
BugBounty & Hacking Resources
https://www.synacktiv.com/en/publications/lsa-secrets-revisiting-secretsdump
Synacktiv
LSA Secrets: revisiting secretsdump
❤
1
BugBounty & Hacking Resources
https://portswigger.net/research/shadow-repeater-ai-enhanced-manual-testing
PortSwigger Research
Shadow Repeater:AI-enhanced manual testing
Have you ever wondered how many vulnerabilities you've missed by a hair's breadth, due to a single flawed choice? We've just released Shadow Repeater, which enhances your manual testing with AI-powere
❤
1
🔥
1
BugBounty & Hacking Resources
https://research.checkpoint.com/2025/the-cat-and-mouse-game-exploiting-statistical-weaknesses-in-human-interaction-anti-evasions/
Check Point Research
The Cat and Mouse Game: Exploiting Statistical Weaknesses in Human Interaction Anti-Evasions - Check Point Research
Executive Summary Why We Care about Sandbox Emulation As a discipline, information security involves a vast web of entry vectors, mitigations, and counter-mitigations. Among these, one of the most impactful points of conflict between attackers and defenders…
❤
1
BugBounty & Hacking Resources
https://research.checkpoint.com/2025/the-bybit-incident-when-research-meets-reality/
Check Point Research
The Bybit Incident: When Research Meets Reality - Check Point Research
Research by Dikla Barda, Roman Ziakin and Oded Vanunu On February 21st, Check Point Blockchain Threat Intel System alerted on a critical attack log on the Ethereum blockchain network. The log indicated that the AI engine identify anomality change with this…
❤
1
TWeb.init({scrollToPost:'projectzeroTM/265'});