repostbot33@lemmy.worldBEnglish · 8 months agoSecurity Advisory: Remote Command Execution in Cisco Access Point WAP Productsplus-squareonekey.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSecurity Advisory: Remote Command Execution in Cisco Access Point WAP Productsplus-squareonekey.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoGitHub - ZephrFish/ChunkyIngress: Chunking Text Ingressplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGitHub - ZephrFish/ChunkyIngress: Chunking Text Ingressplus-squaregithub.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoBootfuzz: MBR-based Fuzzerplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBootfuzz: MBR-based Fuzzerplus-squaregithub.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoWi-Fi “First Aid” Kitplus-squarewirelessbits.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWi-Fi “First Aid” Kitplus-squarewirelessbits.netrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoHow to continue learning without any rewards.plus-squaretryhackme.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to continue learning without any rewards.plus-squaretryhackme.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoWhat are Honeypots, their Uses and how to set one up for networksplus-squarewww.darkrelay.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhat are Honeypots, their Uses and how to set one up for networksplus-squarewww.darkrelay.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoTool to quickly extract all URLs and paths from web pages.plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTool to quickly extract all URLs and paths from web pages.plus-squaregithub.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoBasic script to generate reverse shell payloads, generally most used in ctf.plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBasic script to generate reverse shell payloads, generally most used in ctf.plus-squaregithub.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoBluetooth vulnerability allows unauthorized user to record and play audio on Bluetooth speaker without user awarenessplus-squarewww.mobile-hacker.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBluetooth vulnerability allows unauthorized user to record and play audio on Bluetooth speaker without user awarenessplus-squarewww.mobile-hacker.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoSide-Channel Attack on Apple M1 Chip Prefetcher (GoFetch)plus-squaregofetch.failexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSide-Channel Attack on Apple M1 Chip Prefetcher (GoFetch)plus-squaregofetch.failrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoFake-SMS: A Malware Hunting Storyplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFake-SMS: A Malware Hunting Storyplus-squaremedium.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoUnsaflok: Master Keys for dormakaba Saflok Hotel Locksplus-squareunsaflok.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUnsaflok: Master Keys for dormakaba Saflok Hotel Locksplus-squareunsaflok.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoCVE-2023-48788: Fortinet FortiClientEMS SQL Injection Deep Dive and IOCsplus-squarewww.horizon3.aiexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCVE-2023-48788: Fortinet FortiClientEMS SQL Injection Deep Dive and IOCsplus-squarewww.horizon3.airepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoOpenBSD RCE to be released at t2.fiwww.signedness.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOpenBSD RCE to be released at t2.fiwww.signedness.orgrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoGitHub - riza/indextree: Generates the tree of the directory listing page.plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGitHub - riza/indextree: Generates the tree of the directory listing page.plus-squaregithub.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoOne Line Backdoors in Classic ASP, Flask, Node.js, and PHP (FOSS Tool)plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOne Line Backdoors in Classic ASP, Flask, Node.js, and PHP (FOSS Tool)plus-squaregithub.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoThreat actors leverage document publishing sites for ongoing credential and session token theftplus-squareblog.talosintelligence.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThreat actors leverage document publishing sites for ongoing credential and session token theftplus-squareblog.talosintelligence.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoAbusing the DHCP Administrators Group to Escalate Privileges in Windows Domainswww.akamai.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAbusing the DHCP Administrators Group to Escalate Privileges in Windows Domainswww.akamai.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoHoneypots vs Canary Infra : Bringing Honeypots towards general adoptionplus-squaretracebit.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHoneypots vs Canary Infra : Bringing Honeypots towards general adoptionplus-squaretracebit.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoOauth implementation flaws allow access to private repos via ChatGPT pluginsplus-squaresalt.securityexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOauth implementation flaws allow access to private repos via ChatGPT pluginsplus-squaresalt.securityrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink