A full reverse engineering analysis of the emotet trojan Security News & Discussion |
- A full reverse engineering analysis of the emotet trojan
- Modifying Telegram's "People Nearby" feature to pinpoint people's homes
- JWT key confusion (RSA->HMAC) without the public key
- Open-source tool BlobHunter helps pinpoint public Azure blobs
- Testing and exploiting Java Deserialization - an extensive cheatsheet
- The 10 Most Common Bugs of 2021 So Far, and How to Find Them
- How Secureboot works: from power-on to Windows
- Blind XSS in Google Analytics Admin Panel — $3133.70
A full reverse engineering analysis of the emotet trojan Posted: 08 Feb 2021 02:00 AM PST |
Modifying Telegram's "People Nearby" feature to pinpoint people's homes Posted: 07 Feb 2021 07:10 PM PST |
JWT key confusion (RSA->HMAC) without the public key Posted: 08 Feb 2021 12:40 AM PST |
Open-source tool BlobHunter helps pinpoint public Azure blobs Posted: 08 Feb 2021 12:44 PM PST |
Testing and exploiting Java Deserialization - an extensive cheatsheet Posted: 08 Feb 2021 12:49 AM PST |
The 10 Most Common Bugs of 2021 So Far, and How to Find Them Posted: 07 Feb 2021 11:03 PM PST |
How Secureboot works: from power-on to Windows Posted: 06 Feb 2021 10:41 PM PST |
Blind XSS in Google Analytics Admin Panel — $3133.70 Posted: 07 Feb 2021 02:19 AM PST |
You are subscribed to email updates from /r/netsec - Information Security News & Discussion. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment