
The main purpose behind starting this research project was to get further understanding on how to review and exploit both Windows Applications and Environments…

Galactical Bug Hunting: How we discovered new issues in CD Projekt Red’s Gaming Platform
The main purpose behind starting this research project was to get further understanding on how to review and exploit both Windows Applications and Environments…
Don't trust the cache :Exposing Web cache vulnerabilities
Wifi credential dumping
This blog won't dive into any of the mentioned WIFI attacks, but will highlight techniques to retrieve the PSK from a workstation post-compromise instead.
Diving Deeper into AI Package Hallucinations
Explore Lasso’s latest research on AI Package Hallucinations, their impact on security, and mitigation strategies for enterprises.
Security Advisory: Systems with a SONIX Technology Webcam vulnerable to DLL hijacking attack allowing attackers to execute malicious DLL and escalate privileges
Advisory ID: usd-2023-0029 | Product: SONIX Technology Webcam | Vulnerability Type: CWE 732 - Incorrect Permission Assignment for Critical Resource
unch 😗: Hides message with invisible Unicode characters
Hides message with invisible Unicode characters. Contribute to dwisiswant0/unch development by creating an account on GitHub.
Gram - Self-hosted Threat Modeling Webapp
Gram is Klarna's own threat model diagramming tool - klarna-incubator/gram
Kobold letters – Why HTML emails are a risk to your organization
Anyone who has had to deal with HTML emails on a technical level has probably reached the point where they wanted to quit their job or just set fire to all the mail clients due to their inconsistent implementations. But HTML emails are not just a source of frustration, they can also be a serious sec...
Showcasing Incinerator a Powerful Android Malware Reversing Tool
Master Android malware reversal with ease using Incinerator, your trusted ally in the fight against threat actors for experts and novices alike.
Attacking Active Directory Certificate Service Part 2
Persistence - DLL Proxy Loading
DLL Proxy Loading is a technique which an arbitrary DLL exports the same functions as the legitimate DLL and forwards the calls to the legitimate DLL in an attempt to not disrupt the execution flow…
Adventures in Stegoland - Adventures with a stego shellcode loader
Information Security Services. Offensive Security, Penetration Testing, Mobile and Application, Purple Team, Red Team
/r/netsec's Q2 2024 Information Security Hiring Thread
XZ-actly What You Need (CVE 2024-3094): Detecting Exploitation with Oligo
See how Oligo ADR Detects Exploitation of CVE-2024-3094 (XZ backdoor in liblzma).
An IBIS hotel check-in terminal leaked room door key codes of almost half of the rooms.
NetScout - An OSINT tool I've been working on that finds domains, subdomains, directories and files based on a given URL
OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL. - caio-ishikawa/netscout
Xzbot: exploit demo for the xz backdoor (CVE-2024-3094)
notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094) - amlweems/xzbot