BugBounty & Hacking Resources
@projectzeroTM
1.18K
subscribers
22
photos
2
videos
5
files
362
links
Download Telegram
Join
BugBounty & Hacking Resources
1.18K subscribers
BugBounty & Hacking Resources
https://research.checkpoint.com/2025/the-cat-and-mouse-game-exploiting-statistical-weaknesses-in-human-interaction-anti-evasions/
Check Point Research
The Cat and Mouse Game: Exploiting Statistical Weaknesses in Human Interaction Anti-Evasions - Check Point Research
Executive Summary Why We Care about Sandbox Emulation As a discipline, information security involves a vast web of entry vectors, mitigations, and counter-mitigations. Among these, one of the most impactful points of conflict between attackers and defenders…
❤
1
BugBounty & Hacking Resources
https://research.checkpoint.com/2025/the-bybit-incident-when-research-meets-reality/
Check Point Research
The Bybit Incident: When Research Meets Reality - Check Point Research
Research by Dikla Barda, Roman Ziakin and Oded Vanunu On February 21st, Check Point Blockchain Threat Intel System alerted on a critical attack log on the Ethereum blockchain network. The log indicated that the AI engine identify anomality change with this…
❤
1
BugBounty & Hacking Resources
https://codeanlabs.com/blog/research/exploiting-libreoffice-cve-2024-12425-and-cve-2024-12426/
Codean Labs
Exploiting LibreOffice (CVE-2024-12425 and CVE-2024-12426) — Codean Labs
Attackers can write semi-arbitrary files in the filesystem, and remotely extract values from environment variables and from INI-like files in the filesystem via two vulnerabilities in LibreOffice. Both occur upon loading the document, without any user interaction.…
❤
1
BugBounty & Hacking Resources
https://bxmbn.medium.com/bank-offer-idor-fix-bypassed-how-i-accessed-unauthorized-offers-and-secured-a-10-000-bounty-41052b31a2fc
Medium
Bank offer IDOR Fix Bypassed: How I Accessed Unauthorized Offers and Secured a $10,000 Bounty — @bxmbn
Bank offer IDOR Fix Bypassed: How I Accessed Unauthorized Offers and Secured a $10,000 Bounty — @bxmbn Summary: I discovered a new weakness in the offer retrieval functionality that allows an …
❤
1
BugBounty & Hacking Resources
https://bxmbn.medium.com/hijacking-sessions-with-idor-and-xss-bxmbn-396f99761a85
Medium
Hijacking Sessions with IDOR and XSS— @bxmbn
Picture a platform designed to handle sensitive documentation — think insurance claims or identity verification — turning into a goldmine…
❤
1
BugBounty & Hacking Resources
https://research.checkpoint.com/2025/large-scale-exploitation-of-legacy-driver/
Check Point Research
Silent Killers: Unmasking a Large-Scale Legacy Driver Exploitation Campaign - Check Point Research
Highlights Introduction While the abuse of vulnerable drivers has been around for a while, those that can terminate arbitrary processes have drawn increasing attention in recent years. As Windows security continues to evolve, it has become more challenging…
❤
1
BugBounty & Hacking Resources
https://x.com/0xnxenon/status/1893938473901367687
❤
1
BugBounty & Hacking Resources
https://research.checkpoint.com/2025/how-an-attacker-drained-50m-from-a-defi-protocol-through-role-escalation/
Check Point Research
How an Attacker Drained $50M from a DeFi Protocol Through Role Escalation - Check Point Research
By: Dikla Barda, Roaman Zaikin & Oded Vanunu After reviewing the off-chain forensic report, we can now provide additional insights into the Bybit attackmechanism. Security researchers have determined that hackers injected malicious JavaScript directly into…
❤
1
BugBounty & Hacking Resources
http://hdl.handle.net/2142/110288
❤
1
BugBounty & Hacking Resources
https://hdl.handle.net/1721.1/152860
❤
1
BugBounty & Hacking Resources
https://labs.watchtowr.com/the-best-security-is-when-we-all-agree-to-keep-everything-secret-except-the-secrets-nakivo-backup-replication-cve-2024-48248/
watchTowr Labs
The Best Security Is When We All Agree To Keep Everything Secret (Except The Secrets) - NAKIVO Backup & Replication (CVE-2024-48248)
As an industry, we believe that we’ve come to a common consensus after 25 years of circular debates - disclosure is terrible, information is actually dangerous, it’s best that it’s not shared, and the only way to really to ensure that no one ever uses information…
❤
1
BugBounty & Hacking Resources
https://research.checkpoint.com/2025/modern-approach-to-attributing-hacktivist-groups/
Check Point Research
Modern Approach to Attributing Hacktivist Groups - Check Point Research
Research by: Itay Cohen (@megabeets_) Over the past few decades, hacktivism has been, in a lot of cases, characterized by minor website defacements and distributed denial-of-service (DDoS) attacks, which, while making headlines, had minimal lasting impact.…
❤
1
BugBounty & Hacking Resources
https://www.synacktiv.com/en/publications/taking-the-relaying-capabilities-of-multicast-poisoning-to-the-next-level-tricking
Synacktiv
Taking the relaying capabilities of multicast poisoning to the next
❤
1
BugBounty & Hacking Resources
https://jub0bs.com/posts/2025-02-28-cost-of-panic-recover/
Jub0Bs
The cost of Go's panic and recover
TL;DR ¶ Some of the wisdom contained in Josh Bloch’s Effective Java book is relevant to Go. panic and recover are best reserved for exceptional circumstances. Reliance on panic and recover can noticeably slow down execution, incurs heap allocations, and precludes…
❤
1
🔥
1
BugBounty & Hacking Resources
https://blog.doyensec.com/2025/03/04/exploitable-sshd.html
Doyensec
!exploitable Episode Two - Enter the Matrix
In case you are just tuning in, Doyensec has found themselves on a cruse ship touring the Mediterranean. Unwinding, hanging out with colleagues and having some fun. Part 1 covered our journey into IoT ARM exploitation, while our next blog post, coming in…
🔥
2
BugBounty & Hacking Resources
https://www.thezdi.com/blog/2025/3/3/cve-2024-43639
Zero Day Initiative
Zero Day Initiative — CVE-2024-43639: Remote Code Execution in Microsoft Windows KDC Proxy
In this excerpt of a Trend Micro Vulnerability Research Service vulnerability report, Simon Humbert and Guy Lederfein of the Trend Micro Research Team detail a recently patched code execution vulnerability in the Microsoft Windows Key Distribution Center…
🔥
2
BugBounty & Hacking Resources
https://github.com/google/security-research/security/advisories/GHSA-j8p5-79jf-g575
GitHub
PostgreSQL: Privilege Escalation Vulnerability via pg_cron
### Summary
A logical flaw in the pg_cron extension allows low-privileged users with ownership over pg_cron's job table or ability to change the value of cron.database_name to run arbitrary SQ...
🔥
2
BugBounty & Hacking Resources
https://talosintelligence.com/vulnerability_reports/TALOS-2024-2063
❤
1
BugBounty & Hacking Resources
https://blog.doyensec.com/2025/02/27/exploitable-sshd.html
Doyensec
!exploitable Episode Two - Enter the Matrix
In case you are just tuning in, Doyensec has found themselves on a cruse ship touring the Mediterranean. Unwinding, hanging out with colleagues and having some fun. Part 1 covered our journey into IoT ARM exploitation, while our next blog post, coming in…
❤
1
🔥
1
BugBounty & Hacking Resources
https://itm4n.github.io/reinventing-powershell/
itm4n’s blog
Reinventing PowerShell in C/C++
I like PowerShell, I like it a lot! I like its versatility, its ease of use, its integration with the Windows operating system, but it also has a few features, such as AMSI, CLM, and other logging capabilities, that slow it down. You know, I’m thinking about…
🔥
2
❤
1
BugBounty & Hacking Resources
https://medium.com/@renwa/client-side-path-traversal-cspt-bug-bounty-reports-and-techniques-8ee6cd2e7ca1
Medium
Client Side Path Traversal (CSPT) Bug Bounty Reports and Techniques
Over the past year, CSPT bugs have gained significant attention, with numerous blogs and disclosed reports highlighting their impact…
❤
1
TWeb.init({scrollToPost:'projectzeroTM/284'});