$10,000 From GitHub For Bypassing Filtration oF HTML tags
https://infosecwriteups.com/how-i-got-10-000-from-github-for-bypassing-filtration-of-html-tags-db31173c8b37
https://infosecwriteups.com/how-i-got-10-000-from-github-for-bypassing-filtration-of-html-tags-db31173c8b37
❤3😱1
Converting LFI into RCE by chaining PHP encoding filters
https://www.synacktiv.com/publications/php-filters-chain-what-is-it-and-how-to-use-it.html
https://www.synacktiv.com/publications/php-filters-chain-what-is-it-and-how-to-use-it.html
🔥2👍1
سرویس SocialPwned به شما امکان میدهد ایمیلهایی را از هدف دریافت کنید که در شبکههای اجتماعی مانند اینستاگرام، لینکدین و توییتر منتشر شدهاند تا نشتهای احتمالی را در PwnDB یا Dehashed پیدا کنید و اطلاعات حساب Google را از طریق GHunt به دست آورید.
GitHub
GitHub - MrTuxx/SocialPwned: SocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks…
SocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and Twitter to find possible credentials leaks in PwnDB or Dehash...
رمز عبور پیش فرض
پایگاه داده های رمزهای عبور نصب شده به طور پیش فرض در دستگاه های مختلف را جستجو کنید.
https://cirt.net/passwords
https://www.fortypoundhead.com/tools_dpw.asp
https://www.routerpasswords.com/
https://open-sez.me/
@LeakedInfoBot
بهترین ربات OSINT است!
پایگاه داده های رمزهای عبور نصب شده به طور پیش فرض در دستگاه های مختلف را جستجو کنید.
https://cirt.net/passwords
https://www.fortypoundhead.com/tools_dpw.asp
https://www.routerpasswords.com/
https://open-sez.me/
@LeakedInfoBot
بهترین ربات OSINT است!
❤2👍1
Glitched_on_Earth_by_humans_A_Black_Box_Security_Evaluation_of_the.pdf
13.7 MB
📡Glitched on Earth by Humans:
A Black-Box Security Evaluation of the SpaceX Starlink User Terminal
This presentation covers the first black-box hardware security evaluation of the SpaceX Starlink User Terminal (UT). The UT uses a custom quad-core Cortex-A53 System-on-Chip that implements verified boot based on the ARM trusted firmware (TF-A) project. The early stage TF-A bootloaders, and in particular the immutable ROM bootloader include custom fault injection countermeasures. Despite the black-box nature of our evaluation we were able to bypass signature verification during execution of the ROM bootloader using voltage fault injection.
📺Now available on YouTube
A Black-Box Security Evaluation of the SpaceX Starlink User Terminal
This presentation covers the first black-box hardware security evaluation of the SpaceX Starlink User Terminal (UT). The UT uses a custom quad-core Cortex-A53 System-on-Chip that implements verified boot based on the ARM trusted firmware (TF-A) project. The early stage TF-A bootloaders, and in particular the immutable ROM bootloader include custom fault injection countermeasures. Despite the black-box nature of our evaluation we were able to bypass signature verification during execution of the ROM bootloader using voltage fault injection.
📺Now available on YouTube
https://www.youtube.com/watch?v=myKs04lfuy8Starlink-FI.zip
15.6 MB
🛰This repository(Starlink-FI) accompanies the talk noscriptd "Glitched on Earth by Humans: A Black-Box Security Evaluation of the SpaceX Starlink User Terminal".
❤3👍1