How malvertiser "VeryMal" abused Firebase to conceal and smuggle their payload. Security News & Discussion |
- How malvertiser "VeryMal" abused Firebase to conceal and smuggle their payload.
- Development of a new Windows 10 KASLR Bypass (in One WinDBG Command)
- Discovering a zero day and getting code execution on Mozilla's AWS Network
- WhoAreThey - enum org and personal social profiles
- Command & Control Tool: Pupy
- IPv6 unmasking via UPnP
- Transform your Hak5 Packet Squirrel into an automatic TOR annonymizer
- Appraisals, Kibana & Hardening — Exposing 20,000 Property Appraisal Records, Then Making our own ELK Stack About Unsecured ELK Stacks
- Digital Forensics Tips&Tricks: How to Detect an Intruder-driven Group Policy Changes
- A peek inside the Nuki Smart Lock
- Monsters in the Middleboxes: Introducing Two New Tools for Detecting HTTPS Interception
- Hamburglar: collect useful information from urls, directories, and files - yara and regex capable
- GitHub - jesusprubio/awesome-nodejs-pentest: Delightful Node.js packages useful for penetration testing, exploiting, reverse engineer, cryptography ...
- Writing a Custom Shellcode Encoder
You are subscribed to email updates from /r/netsec - Information Security News & Discussion. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment