Talk and help about bugbounty
Hey folks. I have a question. I'm about to get an ios pentesting related assignment. But the problem is I do not have an ios phone or a mac. Is there a way where I can complete the pentesting assessment without purchasing the additional hardware?
Читать полностью…No payload will pop you XSS, you have to learn the logic.
Читать полностью…Do you recommend a Google plugin for detecting SQL injection?
Читать полностью…Does somebody have android userland fuzzing and exploitation course (2025 updated)
Читать полностью…Do anyone have nahamsec bug bounty course for free ?
Читать полностью…Any one had the oscp solutions for each of the machines
Читать полностью…Hye guys I am new and I want to learn about hacking
Читать полностью…Hi ,can someone help i have some doubts in bug bounty?
Читать полностью…🍎💀MacOS Malware Alert: Python-Based Infostealer Bundled via PyInstaller
Hi everyone that reads HackingBlogs!
In this article, we’re looking into a recent research macOS malware by Jamf Threat Labs, which discloses how attackers use PyInstaller to spread malware on macOS devices. We’ll examine the technical aspects, analyze the methods employed, and describe how these malicious campaigns are being carried out. So let’s go right in without further ado.
Highlights from article
Checking the Signature
First, the file’s code signature is verified using the <codesign> command. A legitimate code signature indicates that a reliable developer has signed the file. The term “adhoc” indicates that it was not signed by a recognized authority, which raises suspicions about files.
Codesign -dv stl indicates that the file is ad-hoc signed, which means that a reliable authority did not sign it. Additionally, it indicates that the file is not from a verified developer because it lacks a “Team Identifier” and “Sealed Resources.”
Confirming the Architecture (Which Computers the File Can Run On)
macOS malware
The file command checks what kind of computer the file can run on. It shows that the stl file is a Mach-O FAT binary, meaning it can work on both Intel (x86_64) and Apple Silicon (arm64) Macs.
Both x86_64 (Intel-based Macs) and arm64 (more recent, Apple Silicon-based Macs) are supported by the file, according to the file stl command.
Read this detailed article 👉🏻 https://hackingblogs.com/macos-malware-python-based-infostealer/
Join telegram channel to always remain updated 👉🏻 /channel/HackingBlogsGroup
VMs for testing iOS could only be run in macos, right?
Читать полностью…is there any one who can tell me the working method of burpsuite pro like which mail works plz dm me
Читать полностью…Hi everyone, pls fill this survey it won't take more than 5 min
https://docs.google.com/forms/d/e/1FAIpQLSfxQDDzFiCUsh_dvFITcuoUo5qJ-Ymq0X4NVZ1NlAxfCnQtGg/viewform
Does anyone have the book / js for hackers/ ????
Читать полностью…hello all, i came to know about this career or skill(bug bounty), if i need to start from scratch where should I, guide me !!
Читать полностью…I made that on Hackingblogs free 10 days bootcamp have a look
Читать полностью…Guys, where can I get detailed video tutorial for Bug Bounty ?
Читать полностью…