Phrack 70 Security News & Discussion |
- Phrack 70
- Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 (CVE-2021-41773)
- 23andMe’s Yamale Python code injection, and properly sanitizing eval()
- r2flutch: Yet another tool to decrypt iOS apps using r2frida
- Abusing vCenter SAML Certificates: Logging in as Admin from Backups
- Decoding AT&T's Proactive SIM
- S0cm0nkey's Reference Guide - OSINT and Passive Recon
- Correlate network connections with community ID in osquery.
- Swimming Upstream: Uncovering Broadcom SDK Vulnerabilities from Bug Reports.
- Practical strategies for pentesting and exploiting file read vulnerabilities.
- TEQNIX - I made an online platform of pentesting tools and automation. Check it out and let me know
- Protect Your GitHub Actions with Semgrep
- Assessing the security and privacy of Vaccine Passports
- Even Censors Have a Backup: Examining China’s Double HTTPS Censorship Middleboxes
You are subscribed to email updates from /r/netsec - Information Security News & Discussion. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment