Abusing Azure AD SSO with the Primary Refresh Token Security News & Discussion |
- Abusing Azure AD SSO with the Primary Refresh Token
- HTML sanitization bypass in Ruby Sanitize < 5.2.1
- Sinking U-Boots with Depthcharge - an extensible Python 3 toolkit designed to aid security researchers when analyzing a customized, product-specific build of the U-Boot bootloader
- Zero Knowledge Proofs: An illustrated primer
- Raining SYSTEM Shells with Citrix Workspace app
- AVAST SecureLine VPN - Arbitrary File Creation Vulnerability
- harbian-qa: State-based target directed fuzzer based on syzkaller
- From APEX to Super-Admin | Salesforce Privilege Escalation Technique | Polyrize Threat Labs
- AVAIN - A Framework for the Automated Vulnerability Analysis in IP-based Networks
- Writeup: Pwnable.kr: Toddler's Bottle: Leg (FR)
- dazzleUP -Windows Privilege Escalation Checker
- Learning Linux Binary Exploitation Series (with pwnable.kr)
- Protecting Your Serverless Solution
You are subscribed to email updates from /r/netsec - Information Security News & Discussion. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment