Skip Navigation
Galactical Bug Hunting: How we discovered new issues in CD Projekt Red’s Gaming Platform
www.anvilsecure.com Galactical Bug Hunting: How we discovered new issues in CD Projekt Red's Gaming Platform - Anvil Secure

As a researcher I often run into situations in which I need to make a compiled binary do things that it wouldn’t normally do or change the way it works in some way. Of course, if one…

Galactical Bug Hunting: How we discovered new issues in CD Projekt Red's Gaming Platform - Anvil Secure
0
Wifi credential dumping
www.r-tec.net WIFI Credential Dumping: Techniques to retrieve the PSK from a workstation post-compromise

This blog won't dive into any of the mentioned WIFI attacks, but will highlight techniques to retrieve the PSK from a workstation post-compromise instead.

WIFI Credential Dumping: Techniques to retrieve the PSK from a workstation post-compromise
0
www.lasso.security Diving Deeper into AI Package Hallucinations

Lass Security's recent research on AI Package Hallucinations extends the attack technique to GPT-3.5-Turbo, GPT-4, Gemini Pro (Bard), and Coral (Cohere).

Diving Deeper into AI Package Hallucinations
0
unch 😗: Hides message with invisible Unicode characters
github.com GitHub - dwisiswant0/unch: Hides message with invisible Unicode characters

Hides message with invisible Unicode characters. Contribute to dwisiswant0/unch development by creating an account on GitHub.

GitHub - dwisiswant0/unch: Hides message with invisible Unicode characters
0
Kobold letters – Why HTML emails are a risk to your organization
lutrasecurity.com Kobold letters – Lutra Security

Anyone who has had to deal with HTML emails on a technical level has probably reached the point where they wanted to quit their job or just set fire to all the mail clients due to their inconsistent implementations. But HTML emails are not just a source of frustration, they can also be a serious sec...

Kobold letters – Lutra Security
0
Showcasing Incinerator a Powerful Android Malware Reversing Tool
boschko.ca Incinerator: The Ultimate Android Malware Reversing Tool

Master Android malware reversal with ease using Incinerator, your trusted ally in the fight against threat actors for experts and novices alike.

Incinerator: The Ultimate Android Malware Reversing Tool
0
Attacking Active Directory Certificate Service Part 2
vandanpathak.com Attacking AD Certificate Services - Part 2

I hope you've read the Part-1 of this blog series on basics of AD CS in the environment. In the Part-1 of this blog series, We looked at how we can setup certificate templates or uses the 'User' template to enroll our Windows 7 Minor User with AD CS services. So far we got

Attacking AD Certificate Services - Part 2
0
Persistence - DLL Proxy Loading
pentestlab.blog Persistence – DLL Proxy Loading

DLL Proxy Loading is a technique which an arbitrary DLL exports the same functions as the legitimate DLL and forwards the calls to the legitimate DLL in an attempt to not disrupt the execution flow…

Persistence – DLL Proxy Loading
0
Adventures in Stegoland - Adventures with a stego shellcode loader
tierzerosecurity.co.nz Tier Zero Security

Information Security Services. Offensive Security, Penetration Testing, Mobile and Application, Purple Team, Red Team

Tier Zero Security
0
www.pentagrid.ch IBIS hotel check-in terminal keypad-code leakage

An IBIS hotel check-in terminal leaked room door key codes of almost half of the rooms.

IBIS hotel check-in terminal keypad-code leakage
1
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)RE
repostbot33 @lemmy.world
BOT
Posts 131
Comments 0