Community : @Sec0x01 @Bug0x Admin : @Offensive
https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/
Читать полностью…https://www.synacktiv.com/advisories/windows-10-plugscheduler-elevation-of-privilege
Читать полностью…red.whisperer/5-methods-i-use-to-discover-apis-6d646baa3ffb" rel="nofollow">https://medium.com/@red.whisperer/5-methods-i-use-to-discover-apis-6d646baa3ffb
Читать полностью…#CVE-2024-3400 #RCE #Palo_Alto_OS
https://github.com/W01fh4cker/CVE-2024-3400-RCE
https://github.com/h4x0r-dz/CVE-2024-3400
https://www.cyclon3.com/bypass-instagram-ssl-certificate-pinning-for-ios
Читать полностью…https://github.com/Trendyol/swagger-parser-burp-extension
Читать полностью…https://github.com/AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956
Читать полностью…h4x0r_dz/23000-for-authentication-bypass-file-upload-arbitrary-file-overwrite-2578b730a5f8" rel="nofollow">https://medium.com/@h4x0r_dz/23000-for-authentication-bypass-file-upload-arbitrary-file-overwrite-2578b730a5f8
Читать полностью…https://twitter.com/Katan0x/status/1785354774864400732
Читать полностью…Exploit Development
https://0xninjacyclone.github.io/posts/exploitdev_1_intro/
https://0xninjacyclone.github.io/posts/exploitdev_2_stack/
https://0xninjacyclone.github.io/posts/exploitdev_3_heap/
https://0xninjacyclone.github.io/posts/exploitdev_4_binfiles/
https://0xninjacyclone.github.io/posts/exploitdev_5_winpe/
https://0xninjacyclone.github.io/posts/exploitdev_6_elf/
https://0xninjacyclone.github.io/posts/exploitdev_7_strfmt/
https://0xninjacyclone.github.io/posts/exploitdev_8_bor/
CVE-2024-2448:
Authenticated Command Injection In Progress Kemp LoadMaster
https://rhinosecuritylabs.com/research/cve-2024-2448-kemp-loadmaster
https://book.hacktricks.xyz/pentesting-web/file-upload
Читать полностью…https://twitter.com/TalBeerySec/status/1777320040557334556
Читать полностью…https://www.landh.tech/blog/20240304-google-hack-50000/
Читать полностью…🚨CVE-2024-21762 Exploit and PoC Sales on GitHub🚨|
Attention, cybersecurity community! A fraudulent scheme has emerged surrounding CVE-2024-21762, where individuals are purportedly selling exploits and proofs of concept (PoC) on GitHub. We urge caution and skepticism towards these claims. Genuine development of a 1-day exploit for such a vulnerability would command a price well in excess of $10,000. This discrepancy in valuation strongly suggests the offers are not legitimate. Please conduct thorough due diligence before engaging in any transactions related to cybersecurity exploits, and consider trusted channels for such exchanges. Stay informed and protect yourself from potential scams.
https://blog.openzeppelin.com/top-10-blockchain-hacking-techniques-of-2023
Читать полностью…