-
-
Save helcaraxeals/d73fd1fa46b0c9d8deb9877be73ad1b3 to your computer and use it in GitHub Desktop.
AppSec Ezines Url (https://github.com/Simpsonpt/AppSecEzine) from 1 to 309
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
https://gist.github.com/cure53/df34ea68c26441f3ae98f821ba1feb9c | |
http://goo.gl/ZIOZqG (+) | |
http://rol.im/asux/ | |
https://bitbucket.org/decalage/oletools | |
https://goo.gl/fBEuSF (+) | |
https://intothesymmetry.blogspot.co.uk/2016/05/holy-redirecturi-batman.html | |
https://unlogic.co.uk/2016/04/12/binary-bomb-with-radare2-prelude/ | |
http://www.oreilly.com/webops-perf/free/files/docker-security.pdf | |
http://goo.gl/QM0mZx (+) | |
https://www.cs.tau.ac.il/~tromer/mobilesc/ | |
https://scumjr.github.io/2016/01/10/from-smm-to-userland-in-a-few-bytes/ | |
http://winternl.com/2016/05/02/hello-world/ | |
http://blog.frizn.fr/bkpctf-2016/qwn2own-bkpctf16 | |
https://eev.ee/blog/2016/04/12/apple-did-not-invent-emoji/ | |
http://www.backtrack-linux.org/backtrack/backtrack-0day-privilege-escalation/ | |
https://goo.gl/BVzfDH (+) | |
http://mksben.l0.cm/2016/05/xssauditor-bypass-flash-basetag.html | |
https://goo.gl/Hdo0Xt (+) | |
http://www.shellntel.com/blog/2016/3/30/vpn-over-dns-1 | |
https://snyk.io/blog/marked-xss-vulnerability/ | |
http://goo.gl/ZRPrGm (+) | |
https://www.notsosecure.com/crafting-way-json-web-tokens/ | |
https://steamdb.info/blog/breaking-steam-client-cryptography/ | |
https://nullsecure.org/building-your-own-passivedns-feed/ | |
https://goo.gl/2LrWzM (+) | |
http://yurichev.com/blog/breaking_simple_exec_crypto/ | |
https://boris.in/blog/2016/the-bank-job/ | |
https://vagmour.eu/why-resolving-to-internal-ips-really-hurts/ | |
https://www.thanassis.space/arm.html | |
http://gutomaia.net/pyNES/ | |
http://goo.gl/hEhxXH (+) | |
https://derevenets.com/ | |
http://goo.gl/nctrWn (+) | |
https://corner.squareup.com/2016/05/content-security-policy-single-page-app.html | |
https://www.informationsecurity.ws/2016/01/pwning-windows-7-with-avg-av/ | |
https://goo.gl/t0Cc6s (+) | |
https://dfir.it/blog/2015/08/12/webshell-every-time-the-same-purpose/ | |
http://www.contextis.com/resources/blog/push-hack-reverse-engineering-ip-camera/ | |
http://www.neutralizethreat.com/2016/02/lazagne-credential-recovery-binary-used.html | |
http://phishme.com/powerpoint-and-custom-actions/ | |
https://seanmelia.files.wordpress.com/2016/02/yahoo-remote-code-execution-cms1.pdf | |
https://learn.adafruit.com/hacking-the-kinect/overview | |
http://ipv6excuses.com/ | |
http://blog.detectify.com/post/82370846588/how-we-got-read-access-on-googles-production-servers | |
http://pwnrules.com/flickr-from-sql-injection-to-rce/ | |
http://nahamsec.com/2014/04/paypal-marketing-remote-code-execution/ | |
https://www.unix-ag.uni-kl.de/~conrad/krypto/pkcrack.html | |
http://www.sec-down.com/wordpress/?p=373 | |
https://www.appsecconsulting.com/appsec-blog/searching-for-credit-card-track-data-in-memory/menu-id-193.html | |
http://javascript.info/tutorial/clickjacking | |
http://n0where.net/basic-integer-overflows/ | |
http://thehackerblog.com/crossdomain-xml-proof-of-concept-tool/ | |
http://www.ctnieves.com/blogpost.php?id=1 | |
http://phrack.org/papers/fall_of_groups.html | |
https://gist.github.com/epixoip/10570627 | |
https://hackerone.com/reports/390 | |
https://esevece.github.io/2016/06/01/taking-over-heroku-accounts.html | |
https://gist.github.com/HarmJ0y/3328d954607d71362e3c | |
http://goo.gl/gOwiwL (+) | |
http://blog.securelayer7.net/mongodb-security-injection-attacks-with-php | |
http://cn33liz.blogspot.pt/2016/05/bypassing-amsi-using-powershell-5-dll.html | |
http://en.wooyun.io/2016/02/29/44.html | |
https://goo.gl/Y6aa6S (+) | |
http://blog.cr4.sh/2016/02/exploiting-smm-callout-vulnerabilities.html | |
http://drops.wooyun.org/papers/15430 | |
https://hackerone.com/reports/111192 | |
http://gursevkalra.blogspot.pt/2016/01/ysoserial-commonscollections1-exploit.html | |
https://hackerone.com/reports/123660 | |
https://threatbutt.com/map/ | |
https://hackerone.com/reports/136169 | |
https://blog.zsec.uk/pwning-pornhub/ | |
https://goo.gl/tNemh7 (+) | |
https://owtf.github.io/ | |
https://zneak.github.io/fcd/ | |
https://www.greyhathacker.net/?p=500 | |
http://www.powertheshell.com/powershell-obfuscator/ | |
http://halcyon-ide.org/ | |
https://security-base.com:8000/ | |
http://www.gironsec.com/blog/2016/06/backdooring-a-dll/ | |
https://goo.gl/u6fqEf (+) | |
https://tyranidslair.blogspot.co.uk/2013/02/fun-with-java-serialization-and.html | |
http://haxx.ml/post/140552592371/remote-code-execution-in-apache-jetspeed-230-and | |
https://goo.gl/ojUIiP (+) | |
https://goo.gl/WgmTsi (+) | |
https://snyk.io/blog/sql-injection-orm-vulnerabilities/ | |
http://blog.kcnabin.com.np/find_my_iphone_can-be-failed/ | |
https://digitalfreedom.io/map/ | |
http://makthepla.net/blog/=/scornhub-bounty | |
http://austingwalters.com/export-a-command-line-curl-command-to-an-executable/ | |
https://paraschetal.in/writing-your-own-shellcode/ | |
https://www.adamlogue.com/revisiting-xss-payloads-in-png-idat-chunks/ | |
http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html | |
https://gist.github.com/sourceincite/985fd1476b7e1623cdbf7e22f3cc42e8 | |
http://goo.gl/HgflG6 (+) | |
https://gist.github.com/rygorous/e0f055bfb74e3d5f0af20690759de5a7 | |
http://incolumitas.com/2016/06/08/typosquatting-package-managers/ | |
http://marcoramilli.blogspot.pt/2016/03/recovering-files-from-brand-new.html | |
http://www.deependresearch.org/2016/04/jboss-exploits-view-from-victim.html | |
http://www.debuginfo.com/articles/easywindbg.html | |
http://oalmanna.blogspot.pt/2016/03/startssl-domain-validation.html | |
http://www.0verl0ad.net/2016/03/bypassing-disablefunctions-y.html | |
https://datavibe.net/~sneak/20141023/wtf-icloud/ | |
https://evertpot.com/PHP-Sucks/ | |
https://blog.benjojo.co.uk/post/ssh-port-fluxing-with-totp | |
https://gist.github.com/graceavery/01ec404e555571a4a668c271c8f62e8b | |
https://blog.kchung.co/reverse-engineering-hid-iclass-master-keys/ | |
https://goo.gl/mH93Rr (+) | |
http://goo.gl/mmktjE (+) | |
https://goo.gl/wrqfg0 (+) | |
https://goo.gl/3eGtjK (+) | |
https://ghostbin.com/paste/2w26u | |
http://www.kahusecurity.com/2016/locky-js-and-url-revealer/ | |
https://hackerone.com/reports/128085 | |
https://olivierbeg.com/finding-xss-vulnerabilities-in-flash-files/ | |
https://www.sixdub.net/?p=591 | |
http://blog.jan-ahrens.eu/2014/03/22/threema-protocol-analysis.html | |
https://goo.gl/oZrJor (+) | |
https://www.nutmeginfosec.com/anatomy-of-a-javascript-downloader/ | |
https://mborgerson.com/hacking-the-blynclight | |
https://goo.gl/umSem4 (+) | |
https://goo.gl/j0Efzh (+) | |
https://hackerone.com/reports/137229 | |
http://d3adend.org/blog/?p=722 | |
http://jerrygamblin.com/2016/05/31/kalibrowser/ | |
http://blog.knownsec.com/2016/06/php-5-4-34-unserialize-uaf-exploit/ | |
https://bitbucket.org/iwseclabs/gunpack/ | |
https://goo.gl/v8UgSQ (+) | |
http://www.cosc.canterbury.ac.nz/research/reports/HonsReps/2015/hons_1504.pdf | |
https://goo.gl/cr8pg6 (+) | |
http://www.secalert.net/2013/12/13/ebay-remote-code-execution/ | |
http://netanelrub.in/2016/05/17/magento-unauthenticated-remote-code-execution/ | |
https://webtransparency.cs.princeton.edu/webcensus/index.html# | |
http://jcjc-dev.com/2016/04/08/reversing-huawei-router-1-find-uart/ | |
http://goo.gl/2FEOPl (+) | |
https://blog.cylance.com/compromising-an-entire-julia-cluster | |
http://irq5.io/2016/06/22/designing-the-x-ctf-2016-badge/ | |
https://blog.benjojo.co.uk/post/cheap-hdmi-capture-for-linux | |
https://luc10.github.io/onedrive-an-easter-egg-into-ms-library/ | |
http://blog.bentkowski.info/2016/07/xss-es-in-google-caja.html | |
https://hackerone.com/reports/131450 | |
https://alexaltea.github.io/hasher/ | |
http://pentestmonkey.net/blog/ssh-with-no-tty | |
https://modexp.wordpress.com/2016/06/04/winux/ | |
http://srcincite.io/advisories/src-2016-22/ | |
http://onready.me/old_horse_attacks.html | |
https://gist.github.com/mattifestation/97ceccd93133c7a1d39a1661922fe545 | |
https://blogs.securiteam.com/index.php/archives/2701 | |
https://goo.gl/5iX4at (+) | |
http://justhaifei1.blogspot.pt/2015/10/watch-your-downloads-risk-of-auto.html | |
http://goo.gl/hrhPSo (+) | |
http://infoseczone.net/mssql-union-based-injection-step-step/ | |
http://blog.gosecure.ca/2016/05/26/detecting-hidden-backdoors-in-php-opcache/ | |
https://blog.bugcrowd.com/discovering-subdomains | |
http://marcoramilli.blogspot.pt/2016/05/process-hollowing.html | |
https://auth0.com/blog/2016/05/31/cookies-vs-tokens-definitive-guide | |
https://blog.filippo.io/securing-a-travel-iphone/ | |
http://blog.innerht.ml/rpo-gadgets/ | |
https://www.josipfranjkovic.com/blog/race-conditions-on-web | |
http://jasminderpalsingh.info/single.php?p=87 | |
https://labs.mwrinfosecurity.com/tools/pivot-with-ping/ | |
https://hub.docker.com/r/jgamblin/tiny-tor/ | |
https://pastebin.com/raw/CC6UPcbZ | |
http://pastebin.com/hVx08e6U | |
https://danielgrzelak.com/backdooring-an-aws-account-da007d36f8f9 | |
http://goo.gl/s9tfxL (+) | |
http://scottgriffy.com/blogs/rat-in-the-shellcode.html | |
https://itsjack.cc/blog/2016/05/poor-mans-malware-hawkeye-keylogger-reborn/ | |
https://goo.gl/fFR7Gg (+) | |
http://drops.wooyun.org/tips/16381 | |
https://www.pentestpartners.com/blog/hacking-the-mitsubishi-outlander-phev-hybrid-suv | |
https://hackerone.com/reports/136531 | |
https://notehub.org/5zo2v | |
http://haxx.ml/post/142844845111/hacking-mattermost-from-unauthenticated-to-system | |
https://www.youtube.com/watch?v=jOyfZex7B3E | |
https://www.anfractuosity.com/projects/cditter/ | |
https://abdullah-iq.blogspot.pt/2016/06/medium-full-account-takeover.html | |
http://mksben.l0.cm/2016/07/xxn-caret.html | |
https://www.josipfranjkovic.com/blog/hacking-facebook-csrf-device-login-flow | |
https://gist.github.com/mattifestation/5d1565348d71b54ad02c44a5b94839f8 | |
http://goo.gl/HYUocq (+) | |
http://goo.gl/CZ1Sii (+) | |
http://www.shellntel.com/blog/2016/6/7/weaponizing-nessus | |
https://habrahabr.ru/post/281374/ | |
https://goo.gl/OnyUTd (+) | |
https://thusoy.com/2016/mitming-postgres | |
https://chloe.re/2016/06/16/badonions/ | |
http://blog.gdssecurity.com/labs/2016/6/13/email-injection.html | |
https://toschprod.wordpress.com/2012/01/31/mitm-4-arp-spoofing-exploit/ | |
https://0x41.no/mr-robot-s02e01-easter-egg/ | |
https://httpoxy.org/ | |
https://goo.gl/SSHshf (+) | |
https://www.evonide.com/how-we-broke-php-hacked-pornhub-and-earned-20000-dollar/ | |
http://www.binsim.com/ | |
https://goo.gl/K7f9kF (+) | |
http://www.andreybazhan.com/dbgkit.html | |
http://www.halfdog.net/Security/2016/DebianEximSpoolLocalRoot/EximUpgrade.c | |
https://subt0x10.blogspot.pt/2016/06/what-you-probably-didnt-know-about.html | |
https://blog.zsec.uk/csv-dangers-mitigations/ | |
http://moyix.blogspot.pt/2016/07/fuzzing-with-afl-is-an-art.html | |
http://home.arcor.de/skanthak/sentinel.html | |
http://goo.gl/umnWPN (+) | |
https://goo.gl/gqeJyL (+) | |
http://xlab.tencent.com/en/2016/06/17/BadTunnel-A-New-Hope/ | |
https://en.blog.nic.cz/2016/06/13/dnssec-signing-with-knot-dns-and-yubikey/ | |
https://agrrrdog.blogspot.pt/2016/06/remote-detection-of-users-av-via-flash.html | |
https://goo.gl/yVrOhP (+) | |
https://alexgaynor.net/2016/mar/14/anatomy-of-a-crypto-vulnerability/ | |
http://bugbounty.fail/ | |
https://banmeihack.wordpress.com/2016/07/27/hacking-pokemon-into-candy-crush/ | |
http://akat1.pl/?id=2 | |
http://www.gattack.io/ | |
https://ericrafaloff.com/client-side-redis-attack-poc/ | |
https://gitlab.com/litm/redirect/tree/master | |
https://goo.gl/78WtUr (+) | |
https://shubs.io/high-frequency-security-bug-hunting-120-days-120-bugs/ | |
http://theori.io/research/jscript9_typed_array | |
http://goo.gl/ThDhM8 (+) | |
https://reverse.put.as/2016/06/25/apple-efi-firmware-passwords-and-the-scbo-myth/ | |
http://xlab.tencent.com/badbarcode/ | |
https://research.g0blin.co.uk/xss-and-wordpress-the-aftermath/ | |
https://bazad.github.io/2016/05/mac-os-x-use-after-free/ | |
http://blog.cr4.sh/2016/06/exploring-and-exploiting-lenovo.html | |
https://suchakra.wordpress.com/2016/07/03/unravelling-code-injection-in-binaries/ | |
https://magoo.github.io/Blockchain-Graveyard/ | |
https://zwischenzugs.wordpress.com/2016/04/12/hitler-uses-docker-annotated/ | |
https://community.rapid7.com/community/metasploit/blog/2014/04/15/exploiting-csrf-without-javascript | |
http://breaktoprotect.blogspot.in/2014/04/feedly-android-application-zero-day.html | |
http://pyrasite.readthedocs.org/en/latest/CLI.html | |
https://code.google.com/p/pdf-grapher/ | |
http://phrack.org/papers/revisiting-mac-os-x-kernel-rootkits.html | |
http://www.mehmetince.net/codeigniter-object-injection-vulnerability-via-encryption-key/ | |
http://www.sodnpoo.com/posts.xml/spoofing_the_samsung_smart_tv_internet_check.xml | |
http://www.debasish.in/2014/04/attacking-audio-recaptcha-using-googles.html | |
http://2014.hackitoergosum.org/slides/ | |
https://www.youtube.com/watch?v=whEWE6WC1Ew | |
http://annasagrera.com/on-ascii-youtube-and-letting-go/ | |
https://goo.gl/G3rxy2 (+) | |
https://avicoder.me/2016/07/22/Twitter-Vine-Source-code-dump/ | |
https://bugs.chromium.org/p/project-zero/issues/detail?id=884 | |
https://labs.nettitude.com/tools/poshc2/ | |
https://benmmurphy.github.io/blog/2016/07/11/rails-webconsole-dns-rebinding/ | |
http://www.forceprojectx.com/services/apps/memory_dumper | |
http://www.nyxbone.com/malware/odcodc.html | |
https://deadcode.me/blog/2016/07/01/UPC-UBEE-EVW3226-WPA2-Reversing.html | |
https://goo.gl/RwShjR (+) | |
https://goo.gl/Cfzilu (+) | |
https://goo.gl/VpRb9R (+) | |
http://anee.me/reversing-an-elf/ | |
https://kjaer.io/extension-malware/ | |
https://premium.wpmudev.org/blog/xml-rpc-wordpress/ | |
http://theori.io/research/cve-2016-0189 | |
https://0x90909090.blogspot.pt/2016/07/analyzing-zip-with-wsf-file-inside.html | |
https://smealum.github.io/3ds/ | |
http://goo.gl/9drpjq (+) | |
https://introvertmac.wordpress.com/2016/07/30/hacking-google-for-fun-and-profit/ | |
http://www.martinvigo.com/steal-2999-99-minute-venmo-siri/ | |
https://warroom.securestate.com/bypassing-gmails-malicious-macro-signatures/ | |
https://hackerone.com/reports/131202 | |
https://www.npmjs.com/package/btlejuice | |
http://www.contextis.com/resources/blog/attacks-https-malicious-pac-files/ | |
http://goo.gl/dh9UDb (+) | |
https://www.sensepost.com/blog/2016/universal-serial-abuse/ | |
https://rol.im/securegoldenkeyboot/ | |
https://goo.gl/Tn22Hq (+) | |
https://gist.github.com/cure53/521c12e249478c1c50914b3b41d8a750 | |
http://goo.gl/9z1NXK (+) | |
https://gist.github.com/Kopachris/b8bb1de2cada4fdde88666e018167926 | |
https://gist.github.com/anonymous/e48209b03f1dd9625a992717e7b89c4f | |
http://blog.deniable.org/blog/2016/08/09/cracking-orcus-rat/ | |
http://dnstun.com/ | |
https://www.cs.bham.ac.uk/~exr/lectures/opsys/10_11/lectures/os-dev.pdf | |
https://artsploit.blogspot.pt/2016/08/pprce2.html | |
https://medium.com/@nmalcolm/hacking-imgur-for-fun-and-profit-3b2ec30c9463#.ql8goaiky | |
http://goo.gl/4pbewk (+) | |
http://cryptoanarchic.me/wat.txt | |
https://blog.silentsignal.eu/2016/08/25/bake-your-own-extrabacon/ | |
https://systemoverlord.com/2016/08/24/posting-json-with-an-html-form.html | |
https://breakdev.org/how-i-hacked-an-android-app-to-get-free-beer/ | |
https://sysforensics.org/2016/08/jtaging-mobile-phones/ | |
https://blog.xyz.is/2016/webkit-360.html | |
http://goo.gl/37GYKN (+) | |
http://stackstatus.net/post/147710624694/outage-postmortem-july-20-2016 | |
http://carnal0wnage.attackresearch.com/2016/08/got-any-rces.html | |
https://hshrzd.wordpress.com/2016/07/21/how-to-turn-a-dll-into-a-standalone-exe/ | |
http://co9.io/post/148716614744/defcon-24-badge-challenge | |
https://hackerone.com/reports/156098 | |
http://www.paulosyibelo.com/2016/08/instagram-stored-oauth-xss.html | |
https://httpsonly.blogspot.pt/2016/08/turning-self-xss-into-good-xss-v2.html | |
https://c0nradsc0rner.wordpress.com/2016/07/06/cookie-shadow-path-injection/ | |
https://averagesecurityguy.github.io/2016/04/21/cracking-mongodb-passwords/ | |
http://legalhackers.com/advisories/vBulletin-SSRF-Vulnerability-Exploit.txt | |
https://hackerone.com/reports/131210 | |
http://sh3ifu.com/Breaking-The-Great-Wall-Of-Web-Rafay-Baloch.pdf | |
https://ret2libc.wordpress.com/2016/04/04/analysing-swf-files-for-vulnerabilities/ | |
http://goo.gl/rP8BTW (+) | |
http://goo.gl/KlikSg (+) | |
http://goo.gl/D91R2U (+) | |
https://hackerone.com/reports/151058 | |
http://www.exploit-monday.com/2016/07/Win10IoTCore-Build14393-EoP.html | |
https://chloe.re/2016/07/25/bypassing-paths-with-open-redirects-in-csp/ | |
http://pixelat.ion.land/ | |
http://bouk.co/blog/hacking-developers/ | |
https://room362.com/post/2016/snagging-creds-from-locked-machines/ | |
http://goo.gl/x6TVjl (+) | |
http://goo.gl/pYL8eZ (+) | |
https://gist.github.com/rvrsh3ll/cc93a0e05e4f7145c9eb | |
https://sumofpwn.nl/advisory/2016/ajax_load_more_local_file_inclusion_vulnerability.html | |
http://goo.gl/VaK5Ts (+) | |
https://sektioneins.de/en/blog/16-09-02-pegasus-ios-kernel-vulnerability-explained.html | |
http://blog.zorinaq.com/nginx-resolver-vulns/ | |
https://enigma0x3.net/2016/07/22/bypassing-uac-on-windows-10-using-disk-cleanup/ | |
https://sites.utexas.edu/iso/2016/07/21/using-nodejs-to-deobfuscate-malicious-javascript/ | |
http://www.keysniffer.net/ | |
https://osandamalith.com/2016/08/01/making-your-shellcode-undetectable-using-net/ | |
https://stratumsecurity.com/2010/04/26/owasp-2010-adding-it-all-up/ | |
http://goo.gl/AwXfpT (+) | |
https://lcamtuf.blogspot.com/2016/08/css-mix-blend-mode-is-bad-for-keeping.html | |
https://blog.fletchto99.com/2016/september/asus-disclosure/ | |
https://goo.gl/kjWNZv (+) | |
https://blog.didierstevens.com/2016/08/12/mimikatz-golden-ticket-dcsync/ | |
https://gist.github.com/chtg/bac6459587dbb79190d0a4c235901f03 | |
https://gist.github.com/chtg/a2acf86d44315146e85b6f88f4d2b5eb | |
https://honeybadger.readthedocs.io/en/latest/ | |
https://goo.gl/nj3zNK (+) | |
https://www.vusec.net/projects/flip-feng-shui/ | |
https://goo.gl/m1JdoI (+) | |
https://goo.gl/0C91rO (+) | |
https://httpsonly.blogspot.pt/2016/08/cve-2016-0782-writeup.html | |
https://goo.gl/JIOvxT (+) | |
https://linux-audit.com/elf-binaries-on-linux-understanding-and-analysis/ | |
https://blog.exodusintel.com/2016/08/09/vxworks-execute-my-packets/ | |
http://ohshitgit.com/ | |
https://support.microsoft.com/en-us/kb/261186 | |
https://weblog.sh/ | |
https://sasi2103.blogspot.pt/2016/09/combination-of-techniques-lead-to-dom.html | |
https://goo.gl/DjOEHf (+) | |
http://www.blackhillsinfosec.com/?p=5230 | |
https://goo.gl/tnW7hD (+) | |
https://nixaid.com/encrypted-chat-with-netcat/ | |
https://andreas-mausch.github.io/whatsapp-viewer/ | |
https://deadcode.me/blog/2016/09/02/Blind-Java-Deserialization-Commons-Gadgets.html | |
https://goo.gl/ClLuZH (+) | |
https://goo.gl/ENPsiI (+) | |
http://blog.nickbloor.co.uk/2016/08/drupal-coder-module-unauthenticated.html | |
https://goo.gl/Uqcs96 (+) | |
https://hostoftroubles.com/ | |
https://tom.vg/2016/08/request-and-conquer/ | |
http://antirez.com/news/96 | |
https://access.redhat.com/blogs/766093/posts/2592591 | |
https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/ | |
https://44con.com/2016/09/19/getting-started-with-your-hidiot-badge/ | |
http://blog.k3170makan.com/2016/09/abusing-webvtt-and-cors-for-fun-and.html | |
https://goo.gl/sGPM4p (+) | |
https://back-flip.blogspot.pt/2016/08/steal-google-account-on-stolen-or.html | |
https://gist.github.com/freddyb/29eedc12b3ae4b1a26d645ee90a5912d | |
https://jaq.alibaba.com/community/art/show?articleid=532 | |
https://goo.gl/2tSUyp (+) | |
https://www.optiv.com/blog/mssql-agent-jobs-for-command-execution | |
http://lab.truel.it/flash-sandbox-bypass/ | |
https://goo.gl/P0cFa8 (+) | |
https://sweet32.info/ | |
https://goo.gl/lVm81H (+) | |
http://www.sjoerdlangkemper.nl/2016/08/29/kayako-xss/ | |
https://www.aidanwoods.com/blog/faulty-login-pages | |
https://thel3l.me/blog/winprivesc/index.html | |
http://tinysubversions.com/notes/ethical-ad-blocker/ | |
https://archive.org/details/softwarelibrary_msdos_games | |
https://diracdeltas.github.io/blog/backdooring-js/ | |
https://5haked.blogspot.pt/2016/10/how-i-hacked-pornhub-for-fun-and-profit.html | |
https://hackerone.com/reports/61312 | |
https://goo.gl/c2opyI (+) | |
https://173210.github.io/psp2 | |
http://www.mbsd.jp/blog/20160921_2.html | |
http://paper.seebug.org/58/ | |
https://goo.gl/Jt751V (+) | |
https://goo.gl/t7rg3A (+) | |
http://paper.seebug.org/42/ | |
http://mksben.l0.cm/2016/09/safari-uxss-showModalDialog.html | |
https://hackerone.com/reports/158148 | |
https://www.jardinesoftware.net/2016/09/12/xxe-in-net-and-xpathdocument/ | |
https://goo.gl/UiIWfL (+) | |
http://calebmadrigal.com/hackrf-replay-attack-jeep/ | |
https://goo.gl/pkPDb2 (+) | |
https://blog.tarq.io/node-js-request-smuggling/ | |
http://blog.wesecureapp.com/xss-by-tossing-cookies/ | |
https://www.cgsec.co.uk/powershell-empire-cve-2016-0189-profit/ | |
https://hackerone.com/reports/53004 | |
https://goo.gl/ZQK5fU (+) | |
https://goo.gl/63HPVG (+) | |
https://goo.gl/ZxXu7l (+) | |
http://rednaga.io/2016/09/21/reversing_go_binaries_like_a_pro/ | |
https://www.virtuesecurity.com/blog/jquery-security-model/ | |
http://blog.rewolf.pl/blog/?p=1630 | |
https://goo.gl/6KQMdJ (+) | |
https://blog.nelhage.com/2011/03/exploiting-pickle/ | |
http://www.gwan.com/blog/20160405.html | |
http://nedbatchelder.com//blog/201609/computing_primes_with_css.html | |
http://blog.tjll.net/ssh-kung-fu/ | |
http://blog.gdssecurity.com/labs/2014/4/24/sql-injection-in-dynamically-constructed-images-and-other-sq.html | |
http://tetraph.com/covert_redirect/oauth2_openid_covert_redirect.html | |
http://thehelpfulhacker.net/2011/11/15/virtual-box-openbsd-router/ | |
https://www.netspi.com/blog/entryid/223/executing-msf-payloads-via-powershell-webshellery | |
http://duartes.org/gustavo/blog/post/anatomy-of-a-program-in-memory/ | |
http://www.incapsula.com/blog/world-largest-site-xss-ddos-zombies.html | |
http://cert.inteco.es/extfrontinteco/img/File/intecocert/EstudiosInformes/INT_Telegram_EN.pdf | |
http://blog.emaze.net/2014/04/attack-campaign-targeting-struts2.html | |
http://joxeankoret.com/blog/2014/05/02/a-vulnerability-that-wasnt/ | |
http://programmingexcuses.com/ | |
http://secalert.net/slack-security-bug-bounty.html | |
https://sites.google.com/site/bughunteruniversity/best-reports/openredirectsthatmatter | |
https://goo.gl/o6KYtc (+) | |
https://goo.gl/nG92Fe (+) | |
https://techanarchy.net/2016/10/extracting-lastpass-site-credentials-from-memory/ | |
http://lightbulbone.com/2016/10/04/intro-to-macos-kernel-debugging.html | |
https://www.ixiacom.com/company/blog/equation-groups-firewall-exploit-chain | |
https://goo.gl/oE7r5q (+) | |
http://www.seg.inf.uc3m.es/~guillermo-suarez-tangil/papers/2016mal-iot.pdf | |
https://archive.is/TpVVg | |
https://goo.gl/oHV88F (+) | |
https://desc0n0cid0.blogspot.pt/2016/09/stack-based-buffer-overflow.html | |
http://www.ms509.com/?p=439 | |
https://goo.gl/1HSx1l (+) | |
https://robinlinus.github.io/socialmedia-leak/ | |
https://robots.thoughtbot.com/is-your-site-leaking-password-reset-links | |
https://henryhoggard.co.uk/blog/Paypal-2FA-Bypass | |
https://sourceforge.net/projects/rcexploiter/ | |
https://www.leavesongs.com/HTML/chrome-xss-auditor-bypass-collection.html | |
http://x42.obscurechannel.com/?p=310 | |
https://regala.im/2016/10/05/fixing-burp-ssl-handshake-failed-alert/ | |
https://goo.gl/yzBzCN (+) | |
http://dirtycow.ninja/ | |
https://www.vusec.net/projects/drammer/ | |
https://hackerone.com/reports/150179 | |
http://paper.seebug.org/91/ | |
https://www.thanassis.space/android.html | |
https://www.pietroalbini.org/blog/gandi-security-vulnerability-2fa-bypass/ | |
http://www.miasm.re/blog/2016/09/03/zeusvm_analysis.html#first-stages | |
https://zone13.io/post/Snagging-credentials-over-WiFi-Part1/ | |
https://goo.gl/XczEiJ (+) | |
http://www.gifcities.org/#/ | |
https://shubs.io/guide-to-building-the-tastic-rfid-thief/ | |
https://codepo8.github.io/logo-o-matic/ | |
http://www.blackhillsinfosec.com/?p=5396 | |
https://hackerone.com/reports/178152 | |
http://blog.x1622.com/2016/01/poc-how-to-steal-httponly-session.html | |
https://gist.github.com/anonymous/908a087b95035d9fc9ca46cef4984e97 | |
https://osandamalith.com/2016/10/10/fun-with-sqlite-load_extension/ | |
https://bitquark.co.uk/blog/2016/10/03/exfiltrating_files_with_busybox | |
http://bloggerbust.ca/2016/10/26/browsersmack-a-browser-stack-proxy-vulnerability/ | |
https://goo.gl/4JiEfd (+) | |
https://goo.gl/LFF2Qa (+) | |
https://goo.gl/czhcHM (+) | |
http://www.alexkyte.me/2016/10/how-textsecure-protocol-signal-whatsapp.html | |
https://vah13.github.io/AVDetection/ | |
http://blog.senr.io/blog/jtag-explained | |
https://rudk.ws/2016/10/17/reverse-engineering-by-using-chrome/ | |
https://goo.gl/Z7Aly4 (+) | |
https://devwerks.net/blog/16/how-not-to-use-html-purifier/ | |
https://goo.gl/D8jxL8 (+) | |
https://www.cs.umd.edu/hcil/members/bshneiderman/nsd/rejection_letter.html | |
http://www.blacknurse.dk/ | |
http://blog.andrewlang.net/post/152805939304/tumblr-xss-exploit | |
http://blog.securityfuse.com/2016/11/gmail-account-hijacking-vulnerability.html | |
http://secalert.net/#CVE-2016-4977 | |
https://www.netzob.org/ | |
https://slashcrypto.org/2016/11/07/Netflix/ | |
https://goo.gl/CXHtg5 (+) | |
https://hosakacorp.net/p/systemd-user.html | |
https://goo.gl/KAEZe6 (+) | |
https://goo.gl/rcf3ao (+) | |
https://zuh4n.blogspot.co.uk/2016/10/adobe-importance-of-up-to-date.html | |
https://cyseclabs.com/blog/cve-2016-6187-heap-off-by-one-exploit | |
http://www.fuzzysecurity.com/tutorials/27.html | |
http://b.fl7.de/2016/08/d-link-nas-dns-xss-via-smb.html | |
https://www.invincealabs.com/blog/2016/11/wemo-hardware-bypass/ | |
http://websdr.ewi.utwente.nl:8901/?tune=7030usb | |
http://386bsd.org/ | |
https://hackerone.com/reports/180074 | |
https://gist.github.com/x-42/3d822d85e6b547e7018c919c6d657e8e | |
https://kimiyuki.net/blog/2016/09/16/one-gadget-rce-ubuntu-1604/ | |
https://sourceforge.net/projects/vbscan/ | |
https://gallery.technet.microsoft.com/Net-Cease-Blocking-Net-1e8dcb5b | |
https://www.poweradmin.com/paexec/ | |
http://hmarco.org/bugs/CVE-2016-4484/CVE-2016-4484_cryptsetup_initrd_shell.html | |
http://d3adend.org/blog/?p=851 | |
https://goo.gl/eWXUvR (+) | |
https://sethsec.blogspot.pt/2016/11/exploiting-python-code-injection-in-web.html | |
https://goo.gl/lR1WeY (+) | |
https://woumn.wordpress.com/2016/09/24/smashing-the-stack-into-a-reverse-shell/ | |
http://www.ioactive.com/Arnaboldi-XML-Schema-Vulnerabilities.pdf | |
http://www.davidlitchfield.com/BypassingXSSFiltersusingXMLInternalEntities.pdf | |
https://goo.gl/gme14H (+) | |
http://zseano.com/tut/4.html | |
https://sidbala.com/h-264-is-magic/ | |
https://yifan.lu/2016/11/01/taihen-cfw-framework-for-ps-vita/ | |
https://cure53.de/pentest-report_curl.pdf | |
https://medium.com/@joewalnes/tail-f-to-the-web-browser-b933d9056cc#.4rnmefbo1 | |
https://averagesecurityguy.github.io/2016/10/21/recon-ng-dorks-burp/ | |
https://www.netresec.com/?page=findject | |
https://slack.engineering/syscall-auditing-at-scale-e6a3ca8ac1b8#.hlfdfpeiv | |
https://www.utkusen.com/blog/sending-valid-phishing-emails-from-microsoftcom.html | |
https://goo.gl/ssq3Oo (+) | |
http://blog.0x3a.com/post/153468210759/monitoring-dns-inside-the-tor-network | |
https://goo.gl/0wvoBX (+) | |
http://ropgadget.com/posts/pebwalk.html | |
https://arno0x0x.wordpress.com/2015/11/27/hacking-voip/ | |
https://pierrekim.github.io/blog/2016-11-01-gpon-ftth-networks-insecurity.html | |
https://www.n00py.io/2016/10/using-email-for-persistence-on-os-x/ | |
http://graffiti.gaurs.io/ | |
http://jerrygamblin.com/2016/11/12/automated-burp-suite-scanning-and-reporting-to-slack/ | |
http://www.glamenv-septzen.net/en/view/6 | |
https://hackerone.com/reports/182358 | |
http://blog.intothesymmetry.com/2016/11/all-your-paypal-tokens-belong-to-me.html | |
http://ianduffy.ie/blog/2016/11/26/azure-bug-bounty-pwning-red-hat-enterprise-linux/ | |
http://legalhackers.com/exploits/tomcat-rootprivesc-deb.sh | |
https://gist.github.com/subTee/c51ea995dfaf919fd4bd36b3f7252486 | |
http://paper.seebug.org/95/ | |
http://research.aurainfosec.io/bypassing-saml20-SSO/ | |
https://goo.gl/bCn3yk (+) | |
https://www.contrastsecurity.com/security-influencers/dom-xss-in-wix.com | |
https://g-laurent.blogspot.pt/2016/11/ms16-137-lsass-remote-memory-corruption.html | |
https://goo.gl/HskhRe (+) | |
https://eprint.iacr.org/2016/1013.pdf | |
http://labs.lastline.com/evasive-jscript | |
https://deadcode.me/blog/2016/11/05/Active-Deauth-Kismet-Wardriving.html | |
https://gist.github.com/kennwhite/1f3bc4d889b02b35d8aa | |
https://natmchugh.blogspot.pt/2014/10/how-i-created-two-images-with-same-md5.html | |
https://goo.gl/QAtMIt (+) | |
https://insert-script.blogspot.pt/2016/12/firefox-svg-cross-domain-cookie.html | |
https://goo.gl/jX2CTk (+) | |
https://sintonen.fi/advisories/tar-extract-pathname-bypass.proper.txt | |
https://objective-see.com/blog/blog_0x14.html | |
http://www.adlice.com/google-chrome-secure-preferences/ | |
http://colin.keigher.ca/2016/12/going-viral-on-imgur-with-powershell.html | |
https://mambrui.github.io/2016/11/rooting-vm | |
https://blog.paranoidsoftware.com/dirty-cow-cve-2016-5195-docker-container-escape/ | |
https://goo.gl/yCPYpL (+) | |
https://dougallj.wordpress.com/2016/11/13/exploiting-dolphin-part-1/ | |
https://blog.ripstech.com/2016/roundcube-command-execution-via-email/ | |
https://goo.gl/eIfu9b (+) | |
https://blog.zimperium.com/analysis-of-multiple-vulnerabilities-in-airdroid/ | |
https://peteris.rocks/blog/htop/ | |
https://laurent22.github.io/so-injections/ | |
https://urlscan.io | |
https://klikki.fi/adv/yahoo2.html | |
https://vulnsec.com/2016/netgear-router-rce/ | |
https://humblesec.wordpress.com/2016/12/08/escaping-a-restricted-shell/ | |
https://goo.gl/MLt1p7 (+) | |
https://goo.gl/xvrb0T (+) | |
https://gist.github.com/dergachev/7916152 | |
https://jolmos.blogspot.pt/2016/11/rtldecompresbuffer-vulnerability.html | |
https://goo.gl/CKQPZv (+) | |
https://blog.lizzie.io/notes-about-cve-2016-7117.html | |
https://goo.gl/3BHsWQ (+) | |
http://www.ateijelo.com/blog/2016/09/13/making-an-msx-font | |
https://labs.detectify.com/2016/12/15/postmessage-xss-on-a-million-sites/ | |
https://goo.gl/ULx7Ud (+) | |
https://donncha.is/2016/12/compromising-ubuntu-desktop/ | |
https://goo.gl/CTp8We (+) | |
https://goo.gl/fb63MI (+) | |
https://nebelwelt.net/publications/files/16STM.pdf | |
https://goo.gl/zllfk3 (+) | |
http://blog.skylined.nl/20161206001.html | |
https://hub.zhovner.com/geek/how-skype-fixes-security-vulnerabilities/ | |
https://c0rni3sm.blogspot.pt/2016/12/fiat-chrysler-automobiles-bug-bounty.html | |
http://rednaga.io/2016/11/14/hackingteam_back_for_your_androids/ | |
http://www.sec-down.com/wordpress/?p=696 | |
https://goo.gl/xxEiWP (+) | |
https://goo.gl/aZSbLk (+) | |
https://www.pelock.com/articles/how-to-write-a-crackme-for-a-ctf-competition | |
https://www.unforgettable.dk/ | |
http://penturalabs.wordpress.com/2014/05/04/reverse-dom-xss/ | |
http://www.websecresearch.com/2014/05/a-way-to-bypass-authentication.html | |
http://blog.flowdock.com/2014/05/07/how-we-found-a-directory-traversal-vulnerability-in-rails-routes/ | |
http://makthepla.net/blog/=/plesk-sso-xxe-xss | |
https://code.google.com/p/wfuzz/ | |
http://www.frida.re/ | |
https://code.google.com/p/volafox/ | |
http://blog.mrg-effitas.com/publishing-of-mrg-effitas-automatic-xor-decryptor-tool/ | |
http://www.blisstonia.com/software/Decrypto/ | |
http://www.thespanner.co.uk/2014/05/06/mxss/ | |
http://www.nirgoldshlager.com/2013/02/how-i-hacked-facebook-oauth-to-get-full.html | |
http://car-online.fr/files/publications/2014-03-CODASPY/kameleonfuzz-evolutionary_blackbox_XSS_fuzzing-duchene-codaspy_2014-paper.pdf | |
http://thehackpot.blogspot.ie/2014/04/android-hacking-using-armitage.html | |
http://rce4fun.blogspot.pt/2014/05/windows-heap-overflow-exploitation.html | |
http://pastebin.com/raw.php?i=gjkivAf3 | |
https://gist.github.com/quchen/5280339 | |
https://randywestergren.com/persistent-xss-verizons-webmail-client/ | |
https://chloe.re/2016/12/04/dealing-with-user-uploaded-files/ | |
http://tayyabqadir.com/2016/12/17/paypal-2fa-bypass-by-tayyab-qadir/ | |
https://gitlab.com/e271/usblogger/tree/master | |
https://hackerone.com/reports/142549 | |
https://goo.gl/fsiEqm (+) | |
https://d0hnuts.com/2016/12/21/basics-of-making-a-rootkit-from-syscall-to-hook/ | |
https://goo.gl/uMEzce (+) | |
https://goo.gl/SFAHof (+) | |
https://goo.gl/Vh6ufm (+) | |
http://blogs.360.cn/360safe/2016/11/29/three-roads-lead-to-rome-2/ | |
http://0xthem.blogspot.pt/2015/03/hijacking-ssh-to-inject-port-forwards.html | |
https://dhavalkapil.com/blogs/SQL-Attack-Constraint-Based/ | |
https://goo.gl/nzmNqK (+) | |
https://www.robertputt.co.uk/2016/11/28/learn-from-your-attackers-ssh-honeypot/ | |
http://docker-saigon.github.io/post/Docker-Internals/ | |
https://goo.gl/NE7btw (+) | |
https://gist.github.com/subTee/c34d0499e232c1501ff9f0a8dd302cbd | |
http://security.szurek.pl/e107-cms-211-privilege-escalation.html | |
http://hacksys.vfreaks.com/research/shellcode-of-death.html | |
http://lucumr.pocoo.org/2016/12/29/careful-with-str-format/ | |
http://asintsov.blogspot.pt/2016/12/bypassing-exploit-protection-of-norton.html | |
https://goo.gl/f5qb4m (+) | |
https://goo.gl/eLAj3P (+) | |
https://www.swordshield.com/2016/10/multi-tool-multi-user-http-proxy/ | |
https://bugs.chromium.org/p/project-zero/issues/detail?id=978 | |
http://www.peter.hartmann.tk/single-post/2016/11/29/Fuzzing-Qt-with-libFuzzer | |
https://haveyousecured.blogspot.pt/2016/12/attempting-to-detect-responder-with.html | |
https://subt0x10.blogspot.pt/2016/12/mimikatz-delivery-via-clickonce-with.html | |
https://threejs.org | |
http://blog.orange.tw/2017/01/bug-bounty-github-enterprise-sql-injection.html | |
http://sebastian-lekies.de/csp/bypasses.php | |
https://goo.gl/Qz8NV1 (+) | |
https://goo.gl/7diAiw (+) | |
https://lowleveldesign.wordpress.com/2016/11/30/decrypting-asp-net-4-5/ | |
http://www.hemanthjoseph.com/2016/11/how-i-bypassed-apples-most-secure-find.html | |
https://siguza.github.io/cl0ver/ | |
https://hackmag.com/security/ad-forest/ | |
http://www.netmux.com/blog/cracking-12-character-above-passwords | |
http://ramtin-amin.fr/#nvmedma | |
https://goo.gl/PVbpJs (+) | |
https://hackerone.com/reports/5534 | |
https://www.foo.be/2016/12/OpenPGP-really-works | |
http://chris.beams.io/posts/git-commit/ | |
https://finnwea.com/blog/stealing-passwords-from-mcdonalds-users | |
http://insert-script.blogspot.pt/2016/10/pdf-how-to-steal-pdfs-by-injecting.html | |
http://4lemon.ru/2017-01-17_facebook_imagetragick_remote_code_execution.html | |
https://goo.gl/MdCd6S (+) | |
http://techlog360.com/all-windows-cmd-commands/ | |
http://blog.win-fu.com/2016/11/every-windows-10-in-place-upgrade-is.html | |
https://digi.ninja/blog/rdp_show_login_page.php | |
https://gitlab.com/micaksica/CVE-2016-1000304 | |
http://dumpco.re/cve-2016-7434/ | |
https://goo.gl/U57NCx (+) | |
https://goo.gl/ZA2NUG (+) | |
http://blog.amossys.fr/intro-to-use-after-free-detection.html | |
https://goo.gl/abZVVL (+) | |
https://insinuator.net/2016/12/analyzing-yet-another-smart-home-device/ | |
https://www.curesec.com/blog/article/blog/Tap-039n039-Sniff-185.html | |
https://www.dsinternals.com/en/impersonating-office-365-users-mimikatz/ | |
https://goo.gl/YXYM3N (+) | |
https://hackerone.com/reports/187134 | |
http://yolocaust.de/ | |
https://gist.github.com/marcan/a2eafd605d3d6ac76eb10a7c64f736c3 | |
https://goo.gl/90LFIj (+) | |
https://goo.gl/KuuOMq (+) | |
https://httpsonly.blogspot.pt/2017/01/0day-writeup-xxe-in-ubercom.html | |
https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/ | |
https://gist.github.com/anonymous/f0b9a85e25ea097f810b4d79e9e005a5 | |
https://gist.github.com/chtg/4849e0c2cfc1f08eb6532f347594c66c | |
https://gist.github.com/Wack0/a3435cafa5eb372b190f971190a506b8 | |
http://andresriancho.github.io/nimbostratus/ | |
https://yurichev.com/writings/toy_decompiler.pdf | |
https://woumn.wordpress.com/2016/12/07/rop-heap-spray-for-a-reverse-shell-in-ie8/ | |
http://sten0.ghost.io/2016/10/13/abusing-dorking-and-robots-txt/ | |
https://nation.state.actor/mcafee.html | |
https://boredhackerblog.blogspot.pt/2016/02/how-we-broke-into-your-house.html | |
https://pentest.blog/data-ex-filtration-with-dns-in-sqli-attacks/ | |
https://securitycafe.ro/2017/01/18/practical-jsonp-injection/ | |
https://0x00sec.org/t/remote-exploit-shellcode-without-sockets/1440 | |
http://blog.tihmstar.net/2017/01/how-to-downgrade-without-jailbreak.html | |
https://goo.gl/eUDIqC (+) | |
http://astronaut.io/ | |
https://goo.gl/N9Ia4k (+) | |
https://s1gnalcha0s.github.io/epub/2017/01/25/This-book-reads-you.html | |
http://phrack.org/papers/cyber_grand_shellphish.html | |
https://hackerone.com/reports/166942 | |
https://doxmyipwindowstool.codeplex.com/ | |
https://phpinfo.me/2016/07/07/1275.html | |
http://security.szurek.pl/winpower-v4904-privilege-escalation.html | |
https://web-in-security.blogspot.pt/2017/01/printer-security.html | |
https://raz0r.name/articles/universal-isomorphic-web-applications-security/ | |
https://goo.gl/9LGkzY (+) | |
https://lukasa.co.uk/2016/12/Debugging_Your_Operating_System/ | |
http://blog.thinkst.com/p/canarytokensorg-quick-free-detection.html | |
https://goo.gl/qFFdEI (+) | |
https://goo.gl/wrJFoL (+) | |
http://blog.volema.com/nginx-insecurities.html#.WFMh_WGLSV5 | |
http://blog.frizk.net/2016/12/filevault-password-retrieval.html | |
http://incept10n.com/ | |
https://www.expeditedssl.com/aws-in-plain-english | |
https://cmdchallenge.com/ | |
https://goo.gl/9zv6U7 (+) | |
http://sirdarckcat.blogspot.pt/2017/02/unpatched-0day-jquery-mobile-xss.html | |
https://goo.gl/fuAQaC (+) | |
https://sensepost.com/blog/2016/intercepting-passwords-with-empire-and-winning/ | |
https://zerosum0x0.blogspot.pt/2016/05/xml-attack-for-c-remote-code-execution.html | |
https://goo.gl/8eHB5Y (+) | |
https://goo.gl/ssYMu2 (+) | |
https://goo.gl/CYvxms (+) | |
https://goo.gl/KqHGkN (+) | |
https://filippo.io/Ticketbleed/ | |
https://hackerone.com/reports/172562 | |
https://techblog.mediaservice.net/2016/10/exploiting-ognl-injection/ | |
https://osandamalith.com/2017/02/03/mysql-out-of-band-hacking/ | |
https://securityresear.ch/2017/02/08/oneplus3-bootloader-vulns/ | |
https://blog.appcanary.com/2017/http-security-headers.html | |
http://theori.io/research/chakra-jit-cfg-bypass | |
https://xuset.github.io/planktos/ | |
http://deadpool.sh/2017/RCE-Springs/ | |
https://www.brokenbrowser.com/uxss-ie-htmlfile/ | |
https://goo.gl/nlojkc (+) | |
https://goo.gl/R9gdqX (+) | |
http://blog.inspired-sec.com/archive/2017/02/14/Mail-Server-Setup.html | |
https://goo.gl/vOXIvA (+) | |
https://goo.gl/ywuBjX (+) | |
https://what.pwned.me/index.php/2017/01/23/axis-206-pwned/ | |
http://exfil.co/2017/01/17/wiegotcha-rfid-thief/ | |
https://www.x41-dsec.de/lab/advisories/x41-2016-signal/ | |
https://www.tazj.in/en/1486830338 | |
https://goo.gl/X7rYaC (+) | |
http://blog.ioactive.com/2016/12/in-flight-hacking-system.html | |
https://www.foo.be/2017/01/Squashfs_As_A_Forensic_Container | |
http://pwnanisec.blogspot.pt/2017/02/use-after-free-in-google-hangouts.html | |
https://vulnsec.com/2017/reverse-engineering-a-book-cover/ | |
https://gist.github.com/danielfaust/998441 | |
https://goo.gl/lUkrm7 (+) | |
https://shattered.it/ | |
https://dhavalkapil.com/blogs/Attacking-the-OAuth-Protocol/ | |
https://thesbros.github.io/2017/02/16/geforce-experience-vulnerability.html | |
https://goo.gl/Les62U (+) | |
https://nlnetlabs.nl/projects/dnssec-trigger/ | |
http://newandroidbook.com/tools/jtrace.html | |
http://bernardodamele.blogspot.pt/2011/09/reverse-shells-one-liners.html | |
http://security-assessment.com/files/documents/advisory/SplunkAdvisory.pdf | |
https://ruimarinho.gitbooks.io/yubikey-handbook/content/ | |
https://goo.gl/hE1V1S (+) | |
https://www.stevencampbell.info/2017/02/configure-pentest-dropbox-dns-tunneling/ | |
https://shiftordie.de/blog/2017/02/18/smtp-over-xxe/ | |
http://blog.blindspotsecurity.com/2017/02/advisory-javapython-ftp-injections.html | |
https://goo.gl/WW01xo (+) | |
http://www.cs.vu.nl/~herbertb/download/papers/anc_ndss17.pdf | |
https://security.tencent.com/index.php/blog/msg/110 | |
https://goo.gl/TBPei2 (+) | |
https://goo.gl/R3ehjE (+) | |
https://lamehackersguide.blogspot.pt/2017/02/weaponizing-postscript.html | |
https://goo.gl/3V9m3m (+) | |
http://omergil.blogspot.pt/2017/02/web-cache-deception-attack.html | |
https://www.zyantific.com/blog/bypassing-telekom-fon-hotspot-authentication/ | |
https://www.xorrior.com/Empire-Domain-Fronting/ | |
http://leucosite.com/FireFox-RCE/ | |
https://goo.gl/9Z2HmN (+) | |
https://akondrat.blogspot.pt/2016/12/pivoting-kerberos-golden-tickets-in.html | |
https://blog.xyz.is/2016/vita-netps-ioctl.html | |
https://goo.gl/YjcDMC (+) | |
https://mijailovic.net/2017/01/22/removing-edge-magazine-drm/ | |
https://mo.github.io/2017/02/20/cross-origin-resource-sharing.html | |
https://improsec.com/blog//windows-kernel-shellcode-on-windows-10-part-1 | |
https://goo.gl/3pCejL (+) | |
http://timeofcheck.com/time-based-blind-sqli-on-news-starbucks-com/ | |
https://goo.gl/aFfO6E (+) | |
https://sagi.io/2016/09/cve-2016-3873-arbitrary-kernel-write-in-nexus-9/ | |
https://team-sik.org/trent_portfolio/password-manager-apps/ | |
https://www.secureworks.com/blog/attacking-windows-smb-zero-day-vulnerability | |
http://pc.textmod.es/ | |
http://www.oauthsecurity.com/ | |
http://www.securatary.com/Portals/0/Vulnerabilities/PayPal/Paypal%20Manager%20Account%20Hijack.pdf | |
http://bouk.co/blog/elasticsearch-rce/ | |
http://holloway.co.nz/steg/ | |
https://blog.curesec.com/article/blog/32.html | |
http://xip.io/ | |
http://www.securityaegis.com/the-big-fat-metasploit-post/ | |
http://samsclass.info/124/proj14/p6x-NTP-DrDOS.htm | |
http://www.aldeid.com/wiki/Fiddler#Example:_Decrypting_malware_HTTPS_traffic | |
http://blog.ioactive.com/2014/05/glass-reflections-in-pictures-osint.html | |
http://www.jakoblell.com/blog/2014/05/07/hacking-contest-rootkit/ | |
http://blog.ptsecurity.com/2014/05/obtaining-passwords-from-cisco-wireless.html | |
https://www.adafruit.com/blog/2014/04/04/new-product-cupcade-the-raspberry-pi-powered-micro-arcade-cabinet-kit-beta/ | |
https://www.alchemistowl.org/pocorgtfo/spoiler03.html | |
https://klikki.fi/adv/bttv.html | |
https://goo.gl/0GUXQJ (+) | |
https://goo.gl/7yUj5d (+) | |
https://goo.gl/YrxqHQ (+) | |
https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt | |
https://www.exploitee.rs/index.php/Western_Digital_MyCloud | |
https://www.myhackerhouse.com/naenara-browser-3-5-exploit-jackrabbit/ | |
https://squeal.net/bypassing-twitter-account-protection/ | |
https://alephsecurity.com/2017/03/08/nexus9-fiq-debugger/ | |
https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html | |
https://pages.nist.gov/mobile-threat-catalogue/ | |
https://goo.gl/iVOK1o (+) | |
https://goo.gl/1Iml0J (+) | |
https://goo.gl/6t10EZ (+) | |
https://rftap.github.io/blog/2016/09/01/rftap-wifi.html | |
https://www.toshellandback.com/2017/02/11/psexec/ | |
http://jamesbvaughan.com/python-twilio-scraping/ | |
https://goo.gl/ObQkkZ (+) | |
https://thehftguy.com/2017/02/23/docker-in-production-an-update/ | |
https://goo.gl/wJH2GY (+) | |
https://goo.gl/3mVdcz (+) | |
https://goo.gl/96ZeIk (+) | |
https://blog.sourceclear.com/rails_admin-vulnerability-disclosure/ | |
http://pentestdan.com/rop-primer-level-0-explained/ | |
https://goo.gl/7t86Kw (+) | |
http://www.economyofmechanism.com/github-saml.html | |
https://securitycafe.ro/2017/02/28/time-based-data-exfiltration/ | |
https://goo.gl/YVYxD4 (+) | |
https://bierbaumer.net/security/asuswrt/ | |
https://bo0om.ru/telegram-love-phdays-en | |
https://vez.mrsk.me/freebsd-defaults.txt | |
https://goo.gl/XqLInP (+) | |
http://www.redblue.team/2017/02/abusing-google-app-scripting-through.html | |
http://jackson.thuraisamy.me/oracle-opera.html | |
https://yurichev.com/blog/minesweeper/ | |
https://rsync.samba.org/how-rsync-works.html | |
https://goo.gl/r9a3MX (+) | |
https://goo.gl/n3QisR (+) | |
http://netanelrub.in/2017/03/20/moodle-remote-code-execution/ | |
https://gist.github.com/subTee/3610a16a54bcbc1fe0ebc46313f5c02e | |
http://www.hackwhackandsmack.com/?p=1021 | |
https://biterrant.io/ | |
http://www.fuzzysecurity.com/tutorials/28.html | |
https://goo.gl/RrCmN1 (+) | |
http://blog.inspired-sec.com/archive/2017/03/17/COM-Moniker-Privesc.html | |
https://goo.gl/ZEw1eh (+) | |
https://goo.gl/GB5Hd7 (+) | |
https://www.hurricanelabs.com/blog/new-xssi-vector-untold-merits-of-nosniff | |
https://openai.com/blog/adversarial-example-research/ | |
https://blogs.securiteam.com/index.php/archives/3052 | |
http://hwreblog.com/projects/arduino_nand_reader.html | |
https://goo.gl/gNY8Dv (+) | |
https://stephensclafani.com/2017/03/21/stealing-messenger-com-login-nonces/ | |
https://artkond.com/2017/03/23/pivoting-guide/ | |
https://goo.gl/5Zq7Hw (+) | |
https://goo.gl/n4fhc3 (+) | |
https://saelo.github.io/posts/firefox-script-loader-overflow.html | |
http://bugkraut.de/posts/tainting | |
https://www.ibrahim-elsayed.com/?p=150 | |
https://blog.silentsignal.eu/2017/02/17/not-so-unique-snowflakes/ | |
https://goo.gl/Ysh7W7 (+) | |
https://goo.gl/nOQ2iQ (+) | |
https://www.invincea.com/2017/03/powershell-exploit-analyzed-line-by-line/ | |
http://bugkraut.de/posts/bounty-txt | |
https://alephsecurity.com/2017/03/26/oneplus3t-adb-charger/ | |
https://www.dancounsell.com/building-a-hackintosh-pro/ | |
http://cybersquirrel1.com/# | |
https://goo.gl/MT32ED (+) | |
https://bugs.chromium.org/p/project-zero/issues/detail?id=1225 | |
http://hexinject.sourceforge.net/ | |
https://gist.github.com/joernchen/f28ec01de20b22bbbee1622a41deb601 | |
https://goo.gl/pIKwVU (+) | |
https://unmitigatedrisk.com/?p=570 | |
https://razygon.github.io/2016/09/23/iOS-kernel-heap-review-5-10/ | |
https://cobbr.io/ObfuscatedEmpire.html | |
https://goo.gl/D6mU2f (+) | https://goo.gl/eHsPc1 (+) | |
https://goo.gl/xcQhzl (+) | |
https://capacitorset.github.io/mathjs/ | |
https://www.aptive.co.uk/blog/unrestricted-file-upload-testing/ | |
https://bamboofox.github.io/2017/03/20/Synology-Bug-Bounty-2016/ | |
http://offsecbyautomation.com/Automating-Web-Content-Discovery/ | |
https://codewhitesec.blogspot.pt/2017/04/amf.html | |
https://mastodon.social/ | |
https://calebfenton.github.io/2017/04/05/creating_java_vm_from_android_native_code/ | |
https://www.notsosecure.com/anatomy-hack-sqli-via-crypto/ | |
http://blog.intothesymmetry.com/2017/04/csrf-in-facebookdropbox-mallory-added.html | |
https://gist.github.com/anonymous/5fd967b3fe5d9201e0ec7a1d35c03a19 | |
https://cedricvb.be/post/tracing-api-calls-in-burp-with-frida/ | |
https://www.uperesia.com/booby-trapped-shortcut-generator | |
https://goo.gl/JA65ce (+) | |
https://www.vgrsec.com/post20170402.html | |
https://goo.gl/xQ8tdz (+) | |
http://struct.github.io/oilpan_metadata.html | |
https://blogs.securiteam.com/index.php/archives/3107 | |
https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html | |
https://goo.gl/GnSddg (+) | |
https://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution/ | |
https://goo.gl/ObZ5eL (+) | |
https://goo.gl/buPacq (+) | |
https://www.brokenbrowser.com/sop-bypass-abusing-read-protocol/ | |
https://goo.gl/TvYytI (+) | |
https://goo.gl/vi9oqr (+) | |
http://threatexpress.com/2016/12/slack-notifications-for-cobalt-strike/ | |
https://goo.gl/EfyJxm (+) | |
https://securedorg.github.io/RE101/ | |
http://www.threathunting.net/ | |
https://martinfowler.com/articles/session-secret.html | |
https://securitybytes.io/sudont-escape-so-easily-ce8801bf9a4b#.a941nrlj4 | |
https://www.n0tr00t.com/2016/12/30/jsm-Bypass-via-CreateClassLoader.html | |
https://statuscode.ch/2016/01/subtle-vulnerabilties-with-php-and-curl/ | |
http://eryanbot.com/jtp/2012/06/30/game-hacking-utilizing-code-caves/ | |
https://goo.gl/j0UImT (+) | |
https://goo.gl/Vfkqdm (+) | |
http://blog.svenbrauch.de/2017/02/19/homemade-10-mbits-laser-optical-ethernet-transceiver/ | |
https://goo.gl/SXXey1 (+) | |
https://hackerone.com/reports/220494 | |
https://scotthelme.co.uk/nomx-the-worlds-most-secure-communications-protocol | |
http://offsecbyautomation.com/Open-Redirection-Bobrov/ | |
https://jaq.alibaba.com/community/art/show?articleid=781 | |
https://blogs.securiteam.com/index.php/archives/2928 | |
https://www.ambionics.io/blog/drupal-services-module-rce | |
https://goo.gl/E2rgJ6 (+) | |
https://blog.cugu.eu/post/apfs/ | |
https://goo.gl/QG0FPF (+) | |
https://www.scip.ch/en/?labs.20170105 | |
http://blog.opensecurityresearch.com/2013/01/windows-dll-injection-basics.html | |
https://textslashplain.com/2017/01/14/the-line-of-death/ | |
https://goo.gl/NMtcp2 (+) | |
https://goo.gl/AbEKml (+) | |
https://www.youtube.com/watch?v=uNjxe8ShM-8 | |
http://xproger.info/projects/OpenLara/ | |
https://www.ssh.com/ssh/port | |
http://www.paulosyibelo.com/2017/05/twitter-xss-csp-bypass.html | |
https://hackerone.com/reports/212696 | |
https://goo.gl/HZn7Yb (+) | |
https://goo.gl/le4nvm (+) | |
https://improsec.com/blog//bypassing-control-flow-guard-in-windows-10 | |
https://stringbleed.github.io | |
https://goo.gl/F1xBst (+) | |
https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/ | |
https://blog.joshlemon.com.au/protecting-your-pdf-files-and-metadata/ | |
http://www.abatchy.com/2017/05/tcp-bind-shell-in-assembly-null.html | |
https://goo.gl/V6EsOr (+) | |
https://www.vgrsec.com/post20170219.html | |
http://blog.jpcert.or.jp/2016/01/windows-commands-abused-by-attackers.html | |
https://poshsecurity.com/blog/deconstructing-secure-http-without-https | |
https://theshell.xyz/ | |
https://bugs.chromium.org/p/project-zero/issues/detail?id=1252&desc=5 | |
https://hackerone.com/reports/88719 | |
https://quanyang.github.io/part-1-continuous-pwning/ | |
https://goo.gl/h2dWbh (+) | |
https://phoenhex.re/2017-05-04/pwn2own17-cachedcall-uaf | |
https://insinuator.net/2017/05/git-shell-bypass-by-abusing-less-cve-2017-8386/ | |
https://goo.gl/728eER (+) | |
https://goo.gl/4J95NW (+) | |
https://micahflee.com/2017/04/breaking-the-security-model-of-subgraph-os/ | |
https://bugs.chromium.org/p/project-zero/issues/detail?id=1096 | |
https://blogs.securiteam.com/index.php/archives/3171 | |
http://snf.github.io/2017/05/04/exploit-protection-i-page-heap/ | |
https://goo.gl/3npUqt (+) | |
http://nahamsec.com/?p=210 | |
http://blog.shubh.am/how-i-bypassed-2-factor-authentication-on-google-yahoo-linkedin-and-many-others/ | |
http://blog.techorganic.com/2014/05/14/from-fuzzing-to-0-day/ | |
http://cybermashup.com/2014/05/01/jtag-debugging-made-easy-with-bus-pirate-and-openocd/ | |
http://www.room362.com/blog/2014/04/19/executing-code-via-smb-without-psexec/ | |
https://bitbucket.org/mihaila/bintrace/wiki/Home | |
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140508-0_AVG_Remote_Administration_Multiple_critical_vulnerabilities_v10.txt | |
https://www.trustedsec.com/may-2014/moar-shellz/ | |
https://doar-e.github.io/blog/2014/04/30/corrupting-arm-evt/ | |
https://fail0verflow.com/blog/2014/enhancing-the-avic-5000nex.html | |
http://habrahabr.ru/company/dsec/blog/222993/ | |
http://int0xcc.svbtle.com/stripping-upatre-trojan-downloader | |
http://syncthing.net/ | |
http://blogs.msdn.com/b/debuggingtoolbox/archive/2014/05/14/hacking-minesweeper-for-windows-8.aspx | |
http://blog.cloudflare.com/bpf-the-forgotten-bytecode | |
https://slashcrypto.org/2017/05/17/5k_Error_Page/ | |
https://goo.gl/ium1x1 (+) | |
https://goo.gl/QNgi0K (+) | |
https://goo.gl/9TL0an (+) | |
https://goo.gl/XQohRS (+) | |
https://klue.github.io/blog/2017/04/macos_kernel_debugging_vbox/ | |
https://checkmarx.gitbooks.io/go-scp/ | |
https://irssi.org/2017/05/12/fuzzing-irssi/ | |
https://shhnjk.blogspot.pt/2017/05/is-your-epub-reader-secure-enough.html | |
https://unmitigatedrisk.com/?p=586 | |
https://goo.gl/AuoG68 (+) | |
https://modexp.wordpress.com/2017/01/24/shellcode-x84/ | |
https://blog.bi.tk/2017/01/20/findbug/ | |
https://goo.gl/7eGSu8 (+) | |
https://xerub.github.io/ios/kpp/2017/04/13/tick-tock.html | |
http://www.unixwiz.net/techtips/sql-injection.html | |
https://goo.gl/KKSSqD (+) | |
https://goo.gl/DGJIZJ (+) | |
https://devnull-as-a-service.com/features/ | |
http://kedrisec.com/twitter-publish-by-any-user/ | |
https://www.ambionics.io/blog/oracle-peoplesoft-xxe-to-rce | |
https://randywestergren.com/xss-sms-hacking-text-messages-verizon-messages/ | |
http://www.debasish.in/2017/05/openxmolar-ms-openxml-format-fuzzing_20.html | |
http://www.exfiltrated.com/research-BIOS_Based_Rootkits.php | |
http://blog.timac.org/?p=1570 | |
https://cobbr.io/ScriptBlock-Logging-Bypass.html | |
http://cloak-and-dagger.org/ | |
https://wald0.com/?p=112 | |
https://goo.gl/Xzy1ql (+) | |
https://www.elttam.com.au/blog/playing-with-canaries/ | |
https://goo.gl/4oruRY (+) | |
https://tyranidslair.blogspot.pt/2017/05/exploiting-environment-variables-in.html | |
https://animal0day.blogspot.co.uk/2017/05/fuzzing-apache-httpd-server-with.html | |
https://medium.com/@d0znpp/how-to-bypass-libinjection-in-many-waf-ngwaf-1e2513453c0f | |
https://gist.github.com/winocm/e3eb9c9b061c7414441c45a4938a0c57 | |
http://research.rootme.in/h1-xssi/ | |
https://ysx.me.uk/road-to-unauthenticated-recovery-downloading-github-saml-codes/ | |
https://goo.gl/rkzXun (+) | |
http://www.thegreycorner.com/2017/01/exploiting-difficult-sql-injection.html | |
https://hackerone.com/reports/217745 | |
https://goo.gl/OBoFZ1 (+) | |
https://scarybeastsecurity.blogspot.pt/2017/05/bleed-more-powerful-dumping-yahoo.html | |
https://goo.gl/vHiyry (+) | |
http://wphutte.com/avada-5-1-4-stored-xss-and-csrf/ | |
https://winscripting.blog/2017/05/12/first-entry-welcome-and-uac-bypass/ | |
https://goo.gl/p0molg (+) | |
https://sizzop.github.io/2016/07/05/kernel-hacking-with-hevd-part-1.html | |
https://lowleveldesign.org/2017/03/07/how-to-securely-sign-dotnet-assemblies/ | |
https://ysx.me.uk/a-pair-of-plotly-bugs-stored-xss-and-aws-metadata-ssrf/ | |
http://blog.martinfenner.org/2014/08/25/using-microsoft-word-with-git/ | |
http://kubernetesbyexample.com/ | |
https://www.shodan.io/host/203.254.47.164 | |
https://vvyper.com/2017/05/22/instagram-stories-ssl/ | |
https://hackerone.com/reports/231053 | |
https://medium.com/@th3g3nt3l/how-i-got-5500-from-yahoo-for-rce-92fffb7145e6 | |
http://www.rpcview.org/index.html | |
https://phoenhex.re/2017-06-02/arrayspread | |
https://bling.kapsi.fi/blog/no-proc-process-recon.html | |
https://goo.gl/5EeZC0 (+) | |
https://goo.gl/1HRwSB (+) | |
https://msitpros.com/?p=3877 | |
http://c0rni3sm.blogspot.pt/2017/06/from-js-to-another-js-files-lead-to.html | |
https://raz0r.name/vulnerabilities/arbitrary-file-reading-in-next-js-2-4-1/ | |
https://chao-tic.github.io/blog/2017/05/24/dirty-cow | |
https://sploitfun.wordpress.com/2015/02/10/understanding-glibc-malloc/ | |
https://goo.gl/gJ1LiQ (+) | |
https://oded.ninja/2017/05/14/amt-n-ken-hack/ | |
https://sonniesedge.co.uk/blog/a-day-without-javascript | |
http://pentestit.com/wordsteal-steal-ntlm-hashes-remotely/ | |
https://www.hackerone.com/blog-How-To-Server-Side-Request-Forgery-SSRF | |
https://goo.gl/Zy8Nhe (+) | |
https://firefart.at/post/turning_piwik_superuser_creds_into_rce/ | |
https://goo.gl/Tv6uRg (+) | |
https://0x00sec.org/t/c-a-simple-runtime-crypter/519 | |
https://0patch.blogspot.pt/2017/01/micropatching-remote-code-execution-in.html | |
http://blog.blindspotsecurity.com/2016/09/nodejs-breaking-jade-pug-dlopen.html | |
https://goo.gl/AL1b7q (+) | |
https://www.securitysift.com/understanding-wordpress-auth-cookies | |
https://medium.com/@br4nsh/from-linux-to-ad-10efb529fae9 | |
https://goo.gl/ea1gwR (+) | |
https://borgandrew.blogspot.pt/2017/01/h1-margin-bottom-0.html | |
https://goo.gl/t23oea (+) | |
http://el.che.moe/Writeup_VoiceAttack.html | |
https://blog.kchung.co/rfid-hacking-with-the-proxmark-3/ | |
https://habrahabr.ru/company/aladdinrd/blog/329166/ | |
http://switchbrew.org | |
http://www.lofibucket.com/articles/64k_intro.html | |
https://angelmmiguel.github.io/svgi/ | |
https://goo.gl/3dSAS2 (+) | |
https://goo.gl/8SMkHF (+) | |
http://offsecbyautomation.com/Subdomain-Delegation-Takeover/ | |
https://sourceware.org/systemtap/ | |
https://goo.gl/2gCFrE (+) | |
https://guidovranken.wordpress.com/2017/06/21/the-openvpn-post-audit-bug-bonanza/ | |
https://phoenhex.re/2017-06-21/firefox-structuredclone-refleak | |
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt | |
https://goo.gl/ENZQiQ (+) | |
https://bo0om.ru/just-enter-the-space-attacks-en | |
https://goo.gl/w38a3h (+) | |
https://goo.gl/KnVyxr (+) | |
https://oleb.net/blog/2017/01/fun-with-string-interpolation/ | |
https://mostsecure.pw/ | |
http://ngailong.com/uber-login-csrf-open-redirect-account-takeover/ | |
https://goo.gl/WyXvVf (+) | |
http://ostinato.org/ | |
https://securityonline.info/bypass-waf-php-webshell-without-numbers-letters/ | |
https://goo.gl/ygKLLx (+) | |
https://blog.cylance.com/running-executables-on-macos-from-memory | |
https://www.bishopfox.com/blog/2017/06/how-i-built-an-xss-worm-on-atmail/ | |
https://goo.gl/PU7zc2 (+) | |
https://yurichev.com/blog/symbolic/ | |
https://www.contextis.com/resources/blog/hacking-unicorns-web-bluetooth/ | |
https://goo.gl/ezUM9n (+) | |
https://jamescoote.co.uk/phishlulz-tutorial/ | |
https://jankopecky.net/index.php/2017/04/18/0day-textplain-considered-harmful/ | |
http://inspirobot.me/ | |
https://arogozhnikov.github.io/3d_nn/ | |
https://goo.gl/h7QdzQ (+) | |
https://medium.com/@FreedomCoder/following-the-white-rabbit-5e392e3f6fb9 | |
https://mrpapercut.com/sites/wscript/ | |
https://www.mzrst.com/ | |
http://hacking-printers.net | |
https://goo.gl/VD8BxF (+) | |
http://vegardno.blogspot.pt/2017/03/fuzzing-openssh-daemon-using-afl.html | |
https://lowleveldesign.org/2017/07/04/decrypting-tfs-secret-variables/ | |
https://www.itsec.nl/en/2017/06/26/drive-by-remote-code-execution-by-mamp/ | |
https://goo.gl/Jsze4P (+) | |
https://goo.gl/41PZHT (+) | |
https://blog.rubidus.com/2017/02/06/preventing-subdomain-takeover/ | |
https://dev.to/fenceposterror/hacking-open-source-software-for-fun-and-non-profit | |
https://zerosum0x0.blogspot.pt/2017/07/puppet-strings-dirty-secret-for-free.html | |
https://blog.haschek.at/post/f2fda | |
http://www.righto.com/2017/07/bitcoin-mining-on-vintage-xerox-alto.html | |
https://blog.zsec.uk/blind-xxe-learning/ | |
https://goo.gl/5TNzwu (+) | |
https://goo.gl/Y3odmB (+) | |
https://gist.github.com/hasherezade/e3b5682fee27500c5dabf5343f447de3 | |
https://gist.github.com/ryhanson/227229866af52e2d963cf941af135a52 | |
https://goo.gl/BhW3Lt (+) | |
https://goo.gl/GSGgjX (+) | |
https://www.rcesecurity.com/2014/07/slae-shell-reverse-tcp-shellcode-linux-x86/ | |
https://myexploit.wordpress.com/hunt-for-the-domain-admin-da/ | |
https://krbtgt.pw/oracle-oam-10g-session-hijacking/ | |
https://goo.gl/is7Tyu (+) | |
http://boosterok.com/blog/broadpwn/ | |
http://www.nmattia.com/posts/2017-03-05-crack-luks-stutter-gnu-parallel.html | |
https://medium.com/wemake-services/testing-bash-applications-85512e7fe2de | |
https://blog.preempt.com/new-ldap-rdp-relay-vulnerabilities-in-ntlm | |
http://acez.re/the-weak-bug-exploiting-a-heap-overflow-in-vmware/ | |
http://hacker-news.verylegit.link/ | |
http://aem1k.com/symmetry/ | |
https://trueschool.se/html/fonts.html | |
https://goo.gl/wSKFLS (+) | |
https://xakep.ru/2017/07/06/safari-localfile-read/ | |
https://gist.github.com/jobertabma/e9a383a8ad96baa189b65cdc8d74a845 | |
https://blog.netspi.com/attacking-javascript-web-service-proxies-burp/ | |
https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/ | |
https://goo.gl/uLeBCf (+) | |
https://goo.gl/ehHr8U (+) | |
https://goo.gl/RmmyFJ (+) | |
http://blog.deniable.org/blog/2017/07/16/inject-all-the-things/ | |
http://wapiflapi.github.io/2015/04/22/single-null-byte-heap-overflow/ | |
https://pentestarmoury.com/2017/07/19/s3-buckets-for-good-and-evil/ | |
https://oneupsecurity.com/research/remote-code-execution-in-source-games | |
https://www.coresecurity.com/blog/solving-post-exploitation-issue-cve-2017-7308 | |
http://news.dieweltistgarnichtso.net/posts/gnome-thumbnailer-msi-fail.html | |
https://goo.gl/Qc7ZPm (+) | |
http://blog.sec-consult.com/2017/06/ghosts-from-past-authentication-bypass.html | |
https://goo.gl/YGBuph (+) | |
https://goo.gl/vfkPjf (+) | |
http://dmitry.gr/index.php?r=05.Projects&proj=25.%20VMU%20Hacking | |
http://op-co.de/blog/posts/hacking_the_nx300/ | |
http://cyvera.com/cve-2014-1776-how-easy-it-is-to-attack-these-days/ | |
http://insanecoding.blogspot.ro/2014/04/common-libressl-porting-mistakes.html | |
https://zyan.scripts.mit.edu/blog/wordpress-fail/ | |
http://rotlogix.com/2014/05/21/exploiting-local-file-includes-with-liffy/ | |
http://m-austin.com/blog/?p=118 | |
http://www.hexacorn.com/blog/2014/05/21/rce-list-of-64-bit-tools/ | |
https://code.google.com/p/libbde/ | |
http://eternal-todo.com/blog/cve-2013-2729-exploit-zeusp2p-gameover | |
http://www.vupen.com/blog/20140520.Advanced_Exploitation_Firefox_UaF_Pwn2Own_2014.php | |
http://www.scriptjunkie.us/2013/11/adding-easy-ssl-client-authentication-to-any-webapp/ | |
http://www.websec.mx/advisories/view/Generador-de-WPA-Huawei-HG8245-y-HG8247 | |
http://williamknowles.co.uk/?p=16 | |
http://www.circl.lu/projects/CIRCLean/ | |
https://goo.gl/vDEMKL (+) | |
https://gerbenjavado.com/the-race-to-the-top-of-a-bug-bounty-program/ | |
https://goo.gl/jQJK3U (+) | |
https://asciinema.org/a/130730 | |
https://security.gerhardt.link/RCE-in-Factorio/ | |
https://bling.kapsi.fi/blog/jvm-deserialization-broken-classldr.html | |
https://elaineou.com/2017/01/19/how-the-twitter-app-bypasses-paywalls/ | |
https://goo.gl/s5Eyy4 (+) | |
https://goo.gl/kLaawx (+) | |
https://pierrekim.github.io/blog/2017-02-09-tplink-c2-and-c20i-vulnerable.html | |
https://www.gironsec.com/blog/2017/07/keylogger-using-directx/ | |
http://rh0dev.github.io/blog/2017/the-return-of-the-jit/ | |
https://bneg.io/2017/07/26/empire-without-powershell-exe/ | |
https://goo.gl/aEPUuS (+) | |
https://goo.gl/djcEh1 (+) | |
https://www.stefanjudis.de/hidden-messages-in-javascript-property-names.html | |
https://hackernoon.com/a-collision-too-perfect-279a47fb5d42 | |
https://doesmysiteneedhttps.com/ | |
https://blog.innerht.ml/testing-new-features/ | |
http://blog.orange.tw/2017/07/how-i-chained-4-vulnerabilities-on.html | |
https://blog.zsec.uk/rce-starwars/ | |
https://vallejo.cc/2017/07/16/anti-antidebugging-windbg-scripts/ | |
https://gist.github.com/marcan/6a2d14b0e3eaa5de1795a763fb58641e | |
http://paper.seebug.org/230/ | |
https://0x00sec.org/t/reverse-engineering-101/1233 | |
https://goo.gl/h5EJDE (+) | |
http://rohk.io/free-bits-on-twitch/ | |
https://goo.gl/mqi664 (+) | |
http://blog.huntingmalware.com/notes/WMI | |
https://comsecuris.com/blog/posts/path_of_least_resistance/ | |
https://scarybeastsecurity.blogspot.pt/2017/03/black-box-discovery-of-memory.html | |
https://goo.gl/986jDv (+) | |
https://cybersyndicates.com/2017/02/os-x-packet-capture--empire/ | |
https://medium.com/0xcc/how-to-turn-photoshop-into-a-remote-access-tool-805485a9480 | |
https://z4ziggy.wordpress.com/2017/07/21/zigfrid-a-passive-rfid-fuzzer/ | |
https://blog.lessonslearned.org/building-a-more-secure-development-chromebook/ | |
https://bo0om.ru/xss-everywhere | |
https://sites.google.com/site/testsitehacking/10k-host-header | |
http://staaldraad.github.io/pentest/phishing/2017/08/02/o356-phishing-with-oauth/ | |
http://blog.safebuff.com/2016/07/03/SSRF-Tips/ | |
http://blog.securelayer7.net/thick-client-penetration-testing-1/ | |
http://www.rvrsh3ll.net/blog/offensive/ssl-domain-fronting-101/ | |
https://blog.doyensec.com/2017/08/03/electron-framework-security.html | |
https://zerosum0x0.blogspot.pt/2017/04/doublepulsar-initial-smb-backdoor-ring.html | |
https://goo.gl/FdwEKQ (+) | |
https://landave.io/2017/07/bitdefender-remote-stack-buffer-overflow-via-7z-ppmd/ | |
https://goo.gl/3xEuby (+) | |
https://blog.phusion.nl/2015/01/20/docker-and-the-pid-1-zombie-reaping-problem/ | |
https://ysx.me.uk/managed-apps-and-music-a-tale-of-two-xsses-in-google-play/ | |
http://www.phreedom.org/research/tinype/ | |
https://goo.gl/fu93Mg (+) | |
https://goo.gl/XAq8qW (+) | |
http://lightningsecurity.io/blog/password-not-provided/ | |
http://redplait.blogspot.pt/2017/08/wincheck-rc858.html | |
https://gist.github.com/marcan/23e1ec416bf884dcd7f0e635ce5f2724 | |
http://illmatics.com/carhacking.html | |
https://goo.gl/Yg4QHV (+) | |
https://l.avala.mp/?p=241 | |
https://lowlevelbits.org/reverse-engineering-stickies.app/ | |
https://www.psattack.com/articles/20170810/application-compatibility-shims/ | |
https://lolware.net/2017/08/01/capturing-mfa-logons.html | |
https://blog.netspi.com/attacking-sso-common-saml-vulnerabilities-ways-find/ | |
https://goo.gl/P8EdJH (+) | |
https://aspe1337.blogspot.pt/2017/04/writeup-of-cve-2017-7199.html | |
http://www.exploit-monday.com/2017/07/bypassing-device-guard-with-dotnet-methods.html | |
http://hackethereum.com/ | |
https://gist.github.com/MerryMage/797c523724e2dc02ada86a1cfadea3ee | |
http://sheepsec.com/blog/username_enumeration_via_jar.html | |
https://hackerone.com/reports/198690 | |
https://goo.gl/zsevzD (+) | |
https://duo.com/blog/hunting-malicious-npm-packages | |
https://iayanpahwa.github.io/Reverse-Engineering-IoT-Devices/ | |
https://toshellandback.com/2017/08/16/mousejack/ | |
https://0x00sec.org/t/game-hacking-winxp-minesweeper/1266 | |
http://thecyberrecce.net/2017/02/12/reversing-the-trendnet-ts-402/ | |
https://zhuanlan.zhihu.com/p/28575189 | |
https://goo.gl/KBsZtt (+) | |
https://goo.gl/ViLaih (+) | |
http://nahamsec.com/secure-your-jenkins-instance-or-hackers-will-force-you-to/ | |
https://ae7.st/g/ | |
https://dave.cheney.net/2017/08/21/the-here-is-key | |
http://gbppr.dyndns.org/~gbpprorg/l0pht/l0pht.html | |
https://hackerone.com/reports/207042 | |
https://medium.com/@arbazhussain/pre-domain-wildcard-cors-exploitation-2d6ac1d4bd30 | |
https://goo.gl/d15wVv (+) | |
https://phoenixpwn.com/ | |
https://sintonen.fi/advisories/qnap-qts-42-multiple-vulnerabilities.txt | |
http://bsmt.me/posts/openxc-reversing/ | |
https://goo.gl/7grxsj (+) | |
https://raw.githubusercontent.com/hatRiot/token-priv/master/abusing_token_eop_1.0.txt | |
https://gerbenjavado.com/manual-sql-injection-discovery-tips/ | |
https://goo.gl/7psV1M (+) | |
https://appscreener.us/blog/?code=reading-ios-app-binary-files | |
https://goo.gl/2JbZAv (+) | |
https://goo.gl/xFHvXr (+) | |
https://research.swtch.com/zip | |
https://chris.bolin.co/offline/ | |
http://madeintheusbwebsite.azurewebsites.net | |
http://zhchbin.github.io/2017/08/30/Uber-XSS-via-Cookie/ | |
https://opnsec.com/2017/08/advanced-flash-vulnerabilities-in-youtube/ | |
https://blog.didierstevens.com/2017/09/05/abusing-a-writable-windows-service/ | |
https://www.doyler.net/security-not-included/certreq-exfiltration | |
https://lgtm.com/blog/apache_struts_CVE-2017-9805 | |
http://blog.thinkst.com/2017/08/disrupting-aws-s3-logging.html | |
http://dmitry.gr/index.php?r=05.Projects&proj=23.%20PSoC4 | |
https://reactarmory.com/answers/how-can-i-use-css-in-js-securely | |
http://www.martinvigo.com/diy-spy-program-abusing-apple-call-relay-protocol/ | |
https://benkowlab.blogspot.pt/2017/08/from-onliner-spambot-to-millions-of.html | |
http://blog.pentestbegins.com/2017/08/05/remote-xss-attack-using-csrf/ | |
https://goo.gl/JhkeQj (+) | |
http://www.ringzerolabs.com/2017/08/bypassing-anti-analysis-technique-in.html | |
https://blogs.securiteam.com/index.php/archives/3379 | |
https://www.imperialviolet.org/2017/08/13/securitykeys.html | |
https://blog.quarkslab.com/flash-dumping-part-i.html | |
https://goo.gl/DtNjd8 (+) | |
https://goo.gl/H8T3kz (+) | |
https://goo.gl/tkrdbm (+) | |
https://goo.gl/omukkh (+) | |
https://goo.gl/54L7rS (+) | |
https://rtpbleed.com/ | |
http://go.armis.com/hubfs/BlueBorne%20Technical%20White%20Paper-1.pdf | |
https://goo.gl/3DfDJT (+) | |
https://goo.gl/WZXckr (+) | |
https://goo.gl/2CgsS4 (+) | |
https://courk.fr/index.php/2017/09/10/reverse-engineering-exploitation-connected-clock/ | |
http://tinyhack.com/2017/09/05/mastercard-internet-gateway-service-hashing-design-flaw/ | |
https://www.mdsec.co.uk/2017/09/exploiting-cve-2017-8759-soap-wsdl-parser-code-injection/ | |
https://diablohorn.com/2017/09/09/understanding-practicing-java-deserialization-exploits/ | |
http://www.exploit-monday.com/2017/08/exploiting-powershell-code-injection.html | |
https://jesuscoin.network/ | |
https://quoteinvestigator.com/2013/03/06/artists-steal/amp/ | |
https://safiire.github.io/blog/2017/08/19/solving-danish-defense-intelligence-puzzle/ | |
https://goo.gl/SsWjW6 (+) | |
https://goo.gl/NTE4H9 (+) | |
https://www.virtuesecurity.com/blog/aws-penetration-testing-s3-buckets/ | |
https://blog.avuln.com/article/4 | |
http://patrickhurd.pro/blog/posts/popjsanalysis.html | |
http://qiita.com/alfa/items/b0e807ae040fc8f61d20 | |
https://www.hopperapp.com/blog/?p=219 | |
https://goo.gl/QTqj8t (+) | |
http://guptashubham.com/all-about-hackerone-private-program-terapeak/ | |
https://wtf.horse/2017/09/19/common-wifi-attacks-explained/ | |
https://0x10f8.wordpress.com/2017/08/07/reverse-engineering-an-eclipse-plugin/ | |
https://www.antid0te.com/blog.html | |
http://blog.quarkslab.com/make-confide-great-again-no-we-cannot.html | |
https://goo.gl/fcmP1Y (+) | |
https://dev.to/tkaczanowski/explaining-programming-to-6-years-old-kids | |
https://goo.gl/GbJLyc (+) | |
https://learn.sparkfun.com/tutorials/gas-pump-skimmers | |
https://goo.gl/D2HWmu (+) | |
https://goo.gl/mtUa28 (+) | |
http://www.shawarkhan.com/2017/08/sarahah-xss-exploitation-tool.html | |
https://rails-sqli.org/ | |
https://un-excogitate.org/dormant-domination | |
https://goo.gl/SwBQnX (+) | |
http://hatriot.github.io/blog/2017/09/19/abusing-delay-load-dll/ | |
https://www.incapsula.com/blog/blocking-session-hijacking-on-gitlab.html | |
https://specterops.io/assets/resources/SpecterOps_Subverting_Trust_in_Windows.pdf | |
http://defencely.com/blog/defencely-clarifies-python-object-injection-exploitation/ | |
https://www.twistlock.com/2017/06/25/alpine-linux-pt-1-2/ | |
https://medium.com/@th3g3nt3l/900-xss-in-yahoo-recon-wins-65ee6d4bfcbd | |
https://blog.rapid7.com/2013/07/02/a-penetration-testers-guide-to-ipmi/ | |
https://pokeinthe.io/2017/09/14/http-status-code-handling/ | |
http://ccsinjection.lepidum.co.jp/blog/2014-06-05/CCS-Injection-en/index.html | |
http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/ | |
http://blog.internot.info/2014/05/facebook-skype-to-email-leak-3000-bounty.html | |
http://www.sysvalue.com/en/heartbleed-cupid-wireless/ | |
https://henryhoggard.co.uk/?p=68 | |
http://moscrack.sourceforge.net/ | |
https://code.google.com/p/xssf/ | |
http://blog.j-michel.org/post/86992432269/from-nand-chip-to-files | |
http://www.securitybydefault.com/2012/07/backdooring-apache.html | |
http://blog.opensecurityresearch.com/2014/05/acquiring-linux-memory-from-server-far.html | |
http://www.securityartwork.es/2014/06/04/read-htaccess-file-through-blind-sql-injection/?lang=en | |
http://www.labofapenetrationtester.com/2014/06/introducing-antak.html | |
http://kukuruku.co/hub/nix/writing-a-file-system-in-linux-kernel | |
https://wireedit.com/ | |
http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html | |
http://blog.blackfan.ru/2017/09/devtwittercom-xss.html | |
https://forsec.nl/2017/09/smart-home-remote-command-execution-rce/ | |
https://wmie.codeplex.com/ | |
https://goo.gl/X5tmUW (+) | |
http://noxxi.de/research/breaking-dkim-on-purpose-and-by-chance.html | |
https://phoenhex.re/2017-06-09/pwn2own-diskarbitrationd-privesc | |
https://blog.filippo.io/we-need-to-talk-about-session-tickets/ | |
https://goo.gl/AZ8qRV (+) | |
https://halbecaf.com/2017/05/24/exploiting-a-v8-oob-write/ | |
https://sockpuppet.org/blog/2015/01/15/against-dnssec/ | |
https://goo.gl/Fk6FpM (+) | |
https://blog.ropchain.com/2017/04/03/disarming-emet-5-52/ | |
https://ro-che.info/articles/2017-09-17-booking-com-manipulation | |
https://jordaneldredge.com/projects/winamp2-js/ | |
http://georgemauer.net/2017/10/07/csv-injection.html | |
https://justi.cz/security/2017/10/07/rubygems-org-rce.html | |
https://blog.zsec.uk/subdomainhijack/ | |
https://goo.gl/d6XGkh (+) | |
https://goo.gl/96rGuw (+) | |
http://www.chokepoint.net/2017/10/exposing-server-ips-behind-cloudflare.html | |
https://goo.gl/HEpNnN (+) | |
https://smartlockpicking.com/tutorial/my-smart-lock-vendor-disappeared/ | |
https://goo.gl/z1zesp (+) | |
https://blog.liftsecurity.io/2017/04/14/sql-and-more-via-xss-in-pgadmin4/ | |
https://goo.gl/F7fdBb (+) | |
https://sensepost.com/blog/2017/macro-less-code-exec-in-msword/ | |
https://medium.com/websec/wordpress-sqli-bbb2afcc8e94 | |
http://clickheretosavetheworld.com/ | |
https://gavv.github.io/blog/pulseaudio-under-the-hood/ | |
https://kate.io/blog/git-bomb/ | |
https://blogs.securiteam.com/index.php/archives/3430 | |
https://kciredor.com/taking-over-every-ad-on-olx-automated-an-idor-story.html | |
https://www.nomotion.net/blog/sharknatto/ | |
https://warroom.securestate.com/cve-2017-9769/ | |
https://www.krackattacks.com/ | |
http://hexdetective.blogspot.pt/2017/02/exploiting-android-s-boot-getting.html | |
https://goo.gl/kqbzgz (+) | |
http://codepool.me/NET-Reverse-Enginering-Part-1/ | |
https://goo.gl/Ap47c2 (+) | |
https://crocs.fi.muni.cz/public/papers/rsa_ccs17 | |
https://www.bamsoftware.com/papers/fronting/ | |
https://blog.flanker017.me/cve-2017-2416-gif-remote-exec/ | |
https://goo.gl/sSF3up (+) | |
https://gist.github.com/1wErt3r/4048722 | |
http://blog.intothesymmetry.com/2017/10/slack-saml-authentication-bypass.html | |
https://goo.gl/hMHdD7 (+) | |
http://infosecninja.blogspot.pt/2017/09/android-kiosk-browser-lock-down.html | |
http://subt0x10.blogspot.pt/2017/08/msxslexe-working-as-designed.html | |
https://goo.gl/5jwWoj (+) | |
https://0.me.uk/ev-phishing/ | |
https://www.fidusinfosec.com/tp-link-remote-code-execution-cve-2017-13772/ | |
http://bobao.360.cn/learning/detail/4534.html | |
http://www.sysadminjd.com/adv170014-ntlm-sso-exploitation-guide/ | |
https://appelsiini.net/2017/reverse-engineering-location-services/ | |
https://nickcano.com/reversing-league-of-legends-client/ | |
https://fail0verflow.com/blog/2017/ps4-namedobj-exploit/ | |
http://www.geeknik.net/7k9et2d9e | |
https://embedi.com/blog/uefi-bios-holes-so-much-magic-dont-come-inside | |
https://goo.gl/rYdJdk (+) | |
https://goo.gl/xASVx1 (+) | |
http://www.dicewarepasswords.com/ | |
http://webjack.io/ | |
https://goo.gl/Up218B (+) | |
http://stamone-bug-bounty.blogspot.pt/2017/10/dom-xss-auth_14.html | |
https://goo.gl/Arvvgp (+) | |
https://benkowlab.blogspot.pt/2017/05/feedback-on-how-to-build-smb-honeypot.html | |
https://goo.gl/kojasB (+) | |
https://edoverflow.com/2017/broken-link-hijacking/ | |
https://security.tencent.com/index.php/blog/msg/116 | |
https://lucasg.github.io/2017/10/15/Api-set-resolution/ | |
https://goo.gl/n6rbcT (+) | |
https://goo.gl/STZHRC (+) | |
https://goo.gl/jkFJjg (+) | |
https://goo.gl/mJoCR2 (+) | |
http://agrrrdog.blogspot.pt/2017/03/autobinding-vulns-and-spring-mvc.html | |
https://adamcaudill.com/2017/10/04/exploiting-jackson-rce-cve-2017-7525/ | |
https://www.sneakymonkey.net/2016/10/30/raspberrypi-nsm/ | |
https://goo.gl/geiujj (+) | |
https://philippeharewood.com/posting-gifs-as-anyone-on-facebook/ | |
https://ysx.me.uk/app-maker-and-colaboratory-a-stored-google-xss-double-bill/ | |
https://goo.gl/Apc2Mr (+) | |
https://diablohorn.com/2017/08/15/brute-forcing-encrypted-web-login-forms/ | |
https://git.stan.sh/SL-Process/DataBuster-VPN | |
https://pentestlab.blog/2017/08/29/command-and-control-dropbox/ | |
https://goo.gl/DD871b (+) | |
https://reverse.put.as/2017/11/07/exploiting-cve-2017-5123/ | |
https://pleasestopnamingvulnerabilities.com/ | |
https://gdelugre.github.io/2017/11/06/samba-path-pivot-attack/ | |
https://jesux.es/exploiting/blueborne-android-6.0.1/ | |
https://modexp.wordpress.com/2017/10/30/poly-mutex-names/ | |
http://research.rootme.in/stealing-csvs-crossdomain/ | |
https://goo.gl/QyY7fX (+) | |
https://whereisk0shl.top/Dark%20Composition%20Exploit%20in%20Ring0.html | |
http://trillian.mit.edu/~jc/humor/ATT_Copyright_true.html | |
https://gamehistory.org/aladdin-source-code/ | |
http://www.noob.ninja/2017/11/local-file-read-via-xss-in-dynamically.html | |
https://justi.cz/security/2017/11/14/couchdb-rce-npm.html | |
http://blog.vulspy.com/2017/11/09/Wordpress-4-8-2-SQL-Injection-POC/ | |
http://rickyhan.com/jekyll/update/2017/11/10/bypassing-recaptcha.html | |
https://www.illuminatejs.com | |
https://bo0om.ru/chrome-and-safari-uxss | |
https://staaldraad.github.io/2017/11/12/polycom-hdx-rce/ | |
https://goo.gl/zgaNZu (+) | |
https://ionize.com.au/stealing-amazon-ec2-keys-via-xss-vulnerability/ | |
https://rot.fi/2017/11/07/wan-to-lan-exploitation-of-4g-broadband-modem/ | |
https://goo.gl/oPM722 (+) | |
https://goo.gl/k6wTv6 (+) | |
https://depthsecurity.com/blog/using-python-to-get-a-shell-without-a-shell | |
http://antonioparata.blogspot.pt/2017/11/shed-inspect-net-malware-like-sir.html | |
https://xorl.wordpress.com/2017/11/11/cve-2017-13089-wget-http-integer-overflow/ | |
https://edoverflow.com/2017/ruby-resolv-bug/ | |
http://korban.net/posts/postgres/2017-11-02-the-case-against-orms/ | |
https://martinmelhus.com/web-audio-modem/ | |
https://statuscode.ch/2017/11/from-markdown-to-rce-in-atom/ | |
https://blog.zsec.uk/rce-chain/ | |
https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about | |
https://goo.gl/Mh8xdi (+) | |
https://ss64.com/ps/ | |
https://mike-n1.github.io/ExtensionsOverview | |
https://goo.gl/sXaCHB (+) | |
https://goo.gl/6kXDq6 (+) | |
https://openeffect.ca/snifflab-an-environment-for-testing-mobile-devices/ | |
https://goo.gl/SF3fE2 (+) | |
https://digi.ninja/blog/xss_steal_csrf_token.php | |
https://goo.gl/UWPKNC (+) | |
https://blog.xpnsec.com/becoming-system/ | |
https://goo.gl/3LbCnL (+) | |
https://samczsun.com/privilege-escalation-legalrobot/ | |
https://diablohorn.com/2017/05/21/quantum-insert-bypassing-ip-restrictions/ | |
https://blog.conscioushacker.io/index.php/2017/10/25/evading-microsofts-autoruns/ | |
https://goo.gl/hVo9SC (+) | |
https://nickjanetakis.com/blog/run-the-first-edition-of-unix-1972-with-docker | |
https://goo.gl/oQexiF (+) | |
https://ysx.me.uk/taking-note-xss-to-rce-in-the-simplenote-electron-client/ | |
https://objective-see.com/blog/blog_0x24.html | |
http://c0d3g33k.blogspot.pt/2017/11/story-of-json-xss.html | |
https://osandamalith.com/2017/03/24/places-of-interest-in-stealing-netntlm-hashes | |
http://jacksonbaker.net/reverse-engineering-the-misfit-bolt-btle-protocol/ | |
https://medium.com/bindecy/huge-dirty-cow-cve-2017-1000405-110eca132de0 | |
https://haiderm.com/fully-undetectable-backdooring-pe-files/ | |
https://goo.gl/k5FhZY (+) | |
https://goo.gl/1oGthj (+) | |
https://raesene.github.io/blog/2017/05/01/Kubernetes-Security-etcd/ | |
https://medium.com/@5yx/dde-word-exec-3e57cc45b401 | |
https://www.xorrior.com/You-Have-The-Right-to-Remain-Cylance/ | |
https://medium.com/@infodox/pwning-red-team-toys-crunchrat-rce-ce83e1d09ae9 | |
http://blog.sec-consult.com/2017/04/what-unites-hp-philips-and-fujitsu-one.html | |
http://tldr.sh/ | |
http://www.readylinux.com/ | |
https://www.darkoperator.com/blog/2017/11/20/some-comments-and-thoughts-on-tradecraft | |
https://goo.gl/XrGehX (+) | |
https://goo.gl/VdAeoT (+) | |
https://www.mailsploit.com/index | |
https://goo.gl/oTx3iE (+) | |
https://bitrot.sh/post/30-11-2017-domain-fronting-with-meterpreter/ | |
http://decidedlygray.com/2017/08/10/modifying-and-building-burp-extensions/ | |
https://blog.elcomsoft.com/2017/11/ios-11-horror-story-the-rise-and-fall-of-ios-security/ | |
https://goo.gl/FZuEMi (+) | |
https://codinguy.net/2013/06/03/insertion-encoderdecoder-shellcode/ | |
http://blog.bentkowski.info/2017/11/yet-another-google-caja-bypasses-hat.html | |
http://az4n6.blogspot.fr/2017/10/finding-and-decoding-malicious.html | |
https://www.chrisdcmoore.co.uk/post/oneplus-analytics/ | |
http://blog.talosintelligence.com/2017/11/exploiting-cve-2016-2334.html | |
https://blog.xpnsec.com/windows-warbird-privesc/ | |
https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/ | |
http://karl-voit.at/2016/02/07/accessing-home-ssh-via-tor/ | |
http://dmitry.gr/?r=05.Projects&proj=07.%20Linux%20on%208bit | |
http://c0rni3sm.blogspot.pt/2014/02/youtube-stored-xss-strikes-back.html | |
http://blog.saynotolinux.com/2014/02/05/whats-that-smell-sniffing-cross-origin-frames-in-firefox/ | |
https://blog.whitehatsec.com/flash-307-redirect-game-over/ | |
https://www.scriptjunkie.us/2014/02/installing-linux-on-a-live-windows-system/ | |
http://insert-script.blogspot.co.at/2014/02/svg-fun-time-firefox-svg-vector.html | |
http://projectshellcode.com/?q=node/12 | |
http://bugscollector.com/tricks/12/ | |
http://blog.sucuri.net/2014/02/new-iframe-injections-leverage-png-image-metadata.html | |
http://www.troyhunt.com/2014/02/heres-how-bell-was-hacked-sql-injection.html | |
http://blogs.law.harvard.edu/zeroday/2014/02/05/so-this-is-what-getting-pwned-is-like/ | |
http://imgur.com/LiixgJ4 | |
https://www.schneier.com/blog/archives/2014/02/hacking_airline.html | |
https://www.youtube.com/watch?v=tc4ROCJYbm0 | |
http://www.orenh.com/2014/06/one-token-to-rule-them-all-tale-of.html | |
http://c0rni3sm.blogspot.pt/2014/06/xss-in-google-mapmaker.html | |
https://cybersmartdefence.com/docs/Paypal-Safely-Double-your-Money.csd | |
http://nahamsec.com/?p=267 | |
https://zyan.scripts.mit.edu/blog/a-boring-xss-dissection/ | |
http://n0where.net/hexinject/ | |
https://www.shellterproject.com/introducing-shellter/ | |
http://blog.cylance.com/a-study-in-bots-lobotomy | |
http://iss.oy.ne.ro/Aether | |
http://blog.opensecurityresearch.com/2014/05/multi-stagedmulti-form-csrf.html | |
http://sirdarckcat.blogspot.pt/2014/05/matryoshka-web-application-timing.html | |
http://labs.neohapsis.com/2014/06/02/smarttv-smartphone-dial-an-attack-surface/ | |
http://xn--thibaud-dya.fr/jenkins_credentials.html | |
http://penturalabs.wordpress.com/2014/03/17/iclass-is-not-enough/ | |
http://piratebox.cc/ | |
https://robotattack.org/ | |
https://medium.com/bugbountywriteup/bug-bounty-fastmail-feeda67905f5 | |
https://goo.gl/v2uyi2 (+) | |
http://www.pwntester.com/blog/2013/12/23/rce-via-xstream-object-deserialization38/ | |
https://goo.gl/1knbkp (+) | |
https://www.tarlogic.com/en/blog/exploiting-word-cve-2017-11826/ | |
https://lewisardern.github.io/2017/12/10/blind-xss/ | |
https://benkowlab.blogspot.pt/2017/12/an-inside-view-of-password-stealer.html | |
https://research.kudelskisecurity.com/2017/11/01/zigbee-security-basics-part-1/ | |
https://medium.com/@palantir/osquery-across-the-enterprise-3c3c9d13ec55 | |
https://symeonp.github.io/2017/09/17/fuzzing-winafl.html | |
https://goo.gl/RchdtG (+) | |
https://goo.gl/GxynDa (+) | |
https://dnstrails.com | |
https://medium.com/@shinkurt/exploiting-a-tricky-xss-in-zendesk-80bdeaea4dad | |
http://www.sxcurity.pro/2017/12/17/hackertarget/ | |
https://nyansatan.github.io/dualboot/ | |
https://packettotal.com/ | |
https://bsdmag.org/freebsd-port-knocking-abdorrahman-homaei/ | |
https://www.talosintelligence.com/reports/TALOS-2017-0432 | |
https://goo.gl/k67GVK (+) | |
http://riscy.business/2017/12/lenovos-unsecured-objects/ | |
http://blog.blindspotsecurity.com/2017/12/advanced-sql-server-mitm-attacks.html | |
https://goo.gl/7i24Kk (+) | |
https://msitpros.com/?p=3909 | |
http://www.alexlambert.com/2017/12/18/kernel-debugging-for-newbies.html | |
https://goo.gl/KUrtkX (+) | |
https://www.twosixlabs.com/bluesteal-popping-gatt-safes/ | |
http://blog.stratumsecurity.com/2016/06/13/websockets-auth/ | |
https://goo.gl/EKsvWq (+) | |
https://wiki.postgresql.org/wiki/Sudoku_solver | |
https://ha.cking.ch/s8_data_line_locator/ | |
https://hawkinsecurity.com/2017/12/13/rce-via-spring-engine-ssti/ | |
https://www.cyberis.co.uk/burp_macros.html | |
https://secrary.com/ReversingMalware/UnpackingShade/ | |
https://staaldraad.github.io/2017/12/20/netstat-without-netstat/ | |
https://goo.gl/NpBqrf (+) | |
https://goo.gl/R5sLzw (+) | |
https://lbarman.ch/blog/stack_smashing/ | |
https://lanrat.com/tethr/ | |
http://blog.gaurangbhatnagar.com/2017/12/02/Hacking-a-dating-app.html | |
https://laskowski-tech.com/2017/12/19/setting-up-a-honeypot-using-opencanary/ | |
https://goo.gl/c3uMW2 (+) | |
https://qiita.com/_pochi/items/4e20e38deee16a7615e1 | |
https://www.fireeye.com/blog/threat-research/2017/05/gaining-root-on-lenovo-vibe.html | |
http://sshtron.zachlatta.com/ | |
https://gist.github.com/keo/00f20ef27eddcdae78ab | |
https://meltdownattack.com/ | |
http://blog.blackfan.ru/2018/01/polygooglecom-xss.html | |
https://goo.gl/a3jJxR (+) | |
http://www.blackhillsinfosec.com/?p=5633 | |
https://devco.re/blog/2017/12/11/Exim-RCE-advisory-CVE-2017-16943-en/ | |
http://arnaucode.com/blog/coffeeminer-hacking-wifi-cryptocurrency-miner.html | |
https://www.elttam.com.au/blog/goahead/ | |
http://saleemrashid.com/2017/08/17/extracting-trezor-secrets-sram/ | |
https://goo.gl/iyryvz (+) | |
https://goo.gl/MPbfyS (+) | |
https://objective-see.com/blog/blog_0x22.html | |
https://goo.gl/BdbbZg (+) | |
https://0x0.li/trackmageddon/ | |
https://damow.net/building-a-thermal-camera/ | |
https://ml-cheatsheet.readthedocs.io/en/latest/index.html | |
https://cr0n1c.wordpress.com/2018/01/08/exploiting-cheap-labor/ | |
https://rcoh.me/posts/two-factor-auth/ | |
https://www.xorrior.com/In-Memory-Python-Imports/ | |
https://nickbloor.co.uk/2018/01/01/rce-with-bmc-server-automation/ | |
https://siguza.github.io/IOHIDeous/ | |
http://www.sxcurity.pro/2017/11/27/tricky-CORS/ | |
https://wpshout.com/complete-guide-sanitizing-escaping/ | |
https://goo.gl/MGEbmE (+) | |
https://www.anquanke.com/post/id/94210 | |
http://www.shelliscoming.com/2017/05/post-exploitation-mounting-vmdk-files.html | |
http://blog.en.elevenpaths.com/2017/12/breaking-out-hsts-and-hpkp-on-firefox.html | |
https://www.digitalinterruption.com/single-post/2018/01/04/ToyTalkBugBountyWriteup | |
https://medium.com/@palantir/alerting-and-detection-strategy-framework-52dc33722df2 | |
https://goo.gl/Nkrdni (+) | |
https://iknowwhatyoudownload.com/ | |
https://www.zachaysan.com/writing/2017-12-30-zero-width-characters | |
https://blog.kintoandar.com/2018/01/Building-healthier-containers.html | |
https://blog.xpnsec.com/evernote-webclipper-uxss/ | |
http://www.sxcurity.pro/2018/01/11/chaining-yahoo-bugs/ | |
https://www.josipfranjkovic.com/blog/hacking-facebook-oculus-integration-csrf | |
https://gist.github.com/singe/cba85800dd6e701c53d0614d8506b281 | |
https://goo.gl/aXGp9i (+) | |
https://www.nvteh.com/news/problems-with-public-ebs-snapshots | |
https://goo.gl/kw77MT (+) | |
https://duo.com/blog/understanding-bluetooth-security | |
https://blog.fox-it.com/2018/01/11/mitm6-compromising-ipv4-networks-via-ipv6/ | |
https://goo.gl/tzHsjA (+) | |
https://johanengelen.github.io/ldc/2018/01/14/Fuzzing-with-LDC.html | |
https://klikki.fi/adv/formidable.html | |
https://dhavalkapil.com/blogs/FILE-Structure-Exploitation/ | |
https://goo.gl/qgb6YU (+) | |
http://www.keras4kindergartners.com/ | |
https://blog.benjojo.co.uk/post/dns-filesystem-true-cloud-storage-dnsfs | |
https://www.rcesecurity.com/2017/08/from-lfi-to-rce-via-php-sessions/ | |
http://blog.orange.tw/2018/01/php-cve-2018-5711-hanging-websites-by.html | |
http://az4n6.blogspot.pt/2018/01/mounting-apfs-image-in-linux.html | |
https://diablohorn.com/2017/10/26/port-scanning-without-an-ip-address/ | |
https://pseudolaboratories.github.io/DarkComet-upload-vulnerability/ | |
https://pentesterslife.blog/2017/11/24/x64-egg-hunting-in-linux-systems/ | |
https://franklinta.com/2014/08/31/predicting-the-next-math-random-in-java/ | |
https://blog.zsec.uk/out-of-band-xxe-2/ | |
https://goo.gl/tDcRZs (+) | |
https://whereisk0shl.top/post/2018-01-17 | |
https://klikki.fi/adv/wpgform.html | |
https://ownyourbits.com/2017/10/29/sandbox-your-applications-with-firejail/ | |
https://blogs.securiteam.com/index.php/archives/3649 | |
https://makecode.com/ | |
https://startyourownisp.com/ | |
http://nullprogram.com/blog/2014/12/23/ | |
http://blog.jr0ch17.com//2018/No-RCE-then-SSH-to-the-box/ | |
https://goo.gl/e4HC7r (+) | |
http://whitehatstories.blogspot.in/2018/01/how-i-could-have-hacked-facebook.html | |
https://homjxi0e.wordpress.com/2018/01/20/whitelisting-bypassing-using-netsh-exec/ | |
http://www.sploitspren.com/2018-01-26-Windows-Privilege-Escalation-Guide/ | |
http://blog.swiecki.net/2018/01/fuzzing-tcp-servers.html | |
https://goo.gl/7QyUuJ (+) | |
https://goo.gl/Wtt6CB (+) | |
https://goo.gl/UGB2Ce (+) | |
https://depthsecurity.com/blog/exploiting-custom-template-engines | |
https://www.codemetrix.net/when-your-dns-leaks-your-infrastructure/ | |
https://sqlwiki.netspi.com/ | |
https://bazad.github.io/2017/09/live-kernel-introspection-ios/ | |
http://blog.ptsecurity.com/2018/01/running-unsigned-code-in-intel-me.html | |
https://goo.gl/K7hbDW (+) | |
https://landave.io/2018/01/7-zip-multiple-memory-corruptions-via-rar-and-zip | |
http://ponzicoin.co/home.html | |
https://ponnuki.net/2012/09/kindleberry-pi/ | |
https://ahussam.me/Amazon-leaking-csrf-token-using-service-worker/ | |
https://inteltechniques.com/buscador/ | |
https://xorl.wordpress.com/2018/02/04/ssh-hijacking-for-lateral-movement/ | |
https://blog.tarq.io/vestacp-root-privilege-escalation/ | |
https://xorl.wordpress.com/2017/11/20/reverse-engineering-isdebuggerpresent/ | |
https://goo.gl/8pqJek (+) | |
https://goo.gl/646izH (+) | |
http://trackwatch.com/windows-kernel-pool-spraying/ | |
https://goo.gl/8JYRYz (+) | |
https://thatoddmailbox.github.io/2017/01/28/iotaseed.html | |
https://goo.gl/V3dMKJ (+) | |
https://www.n00py.io/2017/01/removing-backdoors-powershell-empire-edition/ | |
http://www.paulosyibelo.com/2018/02/hotspot-shield-cve-2018-6460-sensitive.html | |
https://jsnes.fir.sh/ | |
https://x8x.net/2017/11/19/home-alarm-vs-bus-pirate/ | |
https://diagprov.ch/posts/2017/03/a-polyglot-mbrpdfjarzip-cv.html | |
https://blog.jensec.co/clickjacking-in-google-root-picker/ | |
https://sites.google.com/site/testsitehacking/-7-5k-Google-services-mix-up | |
https://gist.github.com/PseudoLaboratories/260b6f24844785aacc1e2fb61dd05c01 | |
https://goo.gl/si8EhL (+) | |
https://goo.gl/21Vtnp (+) | |
https://mohemiv.com/all/evil-xml/ | |
http://sploit3r.xyz/blueborne-exploitation-nexus-4/ | |
http://www.greyhathacker.net/?p=1006 | |
https://x-c3ll.github.io/posts/javascript-antidebugging/ | |
https://osandamalith.com/2018/02/11/mysql-udf-exploitation/ | |
http://baraktawily.blogspot.pt/2018/02/how-to-dos-29-of-world-wide-websites.html | |
https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/ | |
https://www.cybereason.com/blog/new-lateral-movement-techniques-abuse-dcom-technology | |
https://www.secforce.com/blog/2014/02/from-cvs-import-to-cmd-exe-via-sql-injection/ | |
https://blog.pnb.io/2018/02/bruteforcing-linux-full-disk-encryption.html | |
http://sandboxescaper.blogspot.pt/2018/02/how-to-escape-sandboxes-without.html | |
http://www.tomanthony.co.uk/blog/googlebot-javascript-random/ | |
https://transfer.sh/ | |
http://0x90909090.blogspot.pt/2015/07/no-one-expect-command-execution.html | |
http://www.insinuator.net/2014/05/django-image-validation-vulnerability/ | |
http://blog.cyberint.com/2014/05/facebook-hidden-friends-vulnerability.html | |
http://blog.includesecurity.com/2014/06/exploit-walkthrough-cve-2014-0196-pty-kernel-race-condition.html | |
http://hacksecproject.com/?p=73 | |
http://immunityservices.blogspot.pt/2014/06/from-patch-to-crash-story-of-ms13-089.html | |
http://joe4security.blogspot.pt/2014/06/the-power-of-cookbooks-generic-https.html | |
http://itsecurity.telelink.com/dhcp-attacks/ | |
https://code.google.com/p/ghost-usb-honeypot/ | |
http://blog.quarkslab.com/usb-fuzzing-basics-from-fuzzing-to-bug-reporting.html | |
http://hackerforhire.com.au/data-exfiltration-over-ssl-with-srvdir/ | |
http://pastebin.com/raw.php?i=9s4TVqZq | |
http://lambdaops.com/rm-rf-remains | |
https://bughunt1307.herokuapp.com/googlebugs.html | |
https://bugs.chromium.org/p/project-zero/issues/detail?id=1524 | |
http://woshub.com/port-forwarding-in-windows/ | |
https://malpedia.caad.fkie.fraunhofer.de/ | |
https://goo.gl/MEEp3F (+) | |
https://0x00sec.org/t/malware-reversing-burpsuite-keygen/5167 | |
https://medium.com/@petergombos/lm-ntlm-net-ntlmv2-oh-my-a9b235c58ed4 | |
http://riscy.business/2018/02/ida-remote-execution/ | |
http://konukoii.com/blog/2018/02/16/5-min-tutorial-root-via-uart/ | |
https://zachgrace.com/2018/02/20/cobalt_strike_redirectors.html | |
https://medium.com/@europa_/recoinnassance-7840824b9ef2 | |
http://blog.frizn.fr/glibc/glibc-heap-to-rip | |
https://textslashplain.com/2018/02/14/understanding-the-limitations-of-https/ | |
https://medium.com/@appmattus/android-security-ssl-pinning-1db8acb6621e | |
https://ipx.ac/run | |
https://ide.onelang.io/ | |
https://goo.gl/LAUsok (+) | |
https://slashcrypto.org/2018/02/27/TenX_Account_Takeover/ | |
https://hackerone.com/reports/303061 | |
https://goo.gl/NnoZPp (+) | |
https://goo.gl/YjRkGK (+) | |
http://jsyang.ca/hacks/gear-vr-rev-eng/ | |
https://nickbloor.co.uk/2018/02/28/popping-wordpress/ | |
http://agrrrdog.blogspot.pt/2018/01/java-deserialization-misusing-ojdbc-for.html | |
http://www.freebuf.com/articles/terminal/160041.html | |
https://tunnelshade.in/blog/2018/01/afl-internals-compile-time-instrumentation/ | |
https://krbtgt.pw/smbv3-null-pointer-dereference-vulnerability/ | |
http://blog.ptsecurity.com/2018/02/new-bypass-and-protection-techniques.html | |
https://www.mike-gualtieri.com/posts/stealing-data-with-css-attack-and-defense | |
https://disconnect3d.pl/2018/02/24/log-injection-aka-tailing-logs-is-unsafe/ | |
https://waveforms.surge.sh/waveforms-intro | |
https://medium.com/@malcomvetter/responsible-red-teams-1c6209fd43cc | |
https://goo.gl/eSAL6F (+) | |
https://s1gnalcha0s.github.io/dspl/2018/03/07/Stored-XSS-and-SSRF-Google.html | |
https://goo.gl/epujHQ (+) | |
https://zeltser.com/analyzing-malicious-documents/ | |
https://goo.gl/46qXeQ (+) | |
https://heap-exploitation.dhavalkapil.com/ | |
https://goo.gl/S4zdcJ (+) | |
https://erpscan.com/press-center/blog/adapting-hashcat-for-sap-half-hashes/ | |
https://goo.gl/iNxWA1 (+) | |
https://blog.varonis.com/understanding-malware-free-hacking-part/ | |
https://bazad.github.io/2018/03/a-fun-xnu-infoleak/ | |
https://arxiv.org/pdf/1710.08864.pdf | |
https://osandamalith.com/2018/02/01/exploiting-format-strings-in-windows/ | |
https://hackmd.io/s/rJ-3VKNPG | |
http://blog.koehntopp.info/index.php/3075-how-not-to-run-a-ca/ | |
https://lightningsecurity.io/blog/bypassing-payments-using-webhooks/ | |
https://www.josipfranjkovic.com/blog/facebook-friendlist-paymentcard-leak | |
https://labs.detectify.com/2018/03/14/graphql-abuse/ | |
https://goo.gl/vNVzN1 (+) | |
https://www.eideon.com/2018-03-02-THL03-WMIBackdoors/ | |
http://blog.japaric.io/safe-dma/ | |
https://goo.gl/iz1hLP (+) | |
https://secdevops.ai/ios-static-analysis-and-recon-c611eaa6d108 | |
https://goo.gl/ND8WeR (+) | |
https://reboare.github.io/lxd/lxd-escape.html | |
https://medium.com/@vysec.private/alibaba-cdn-domain-fronting-1c0754fa0142 | |
https://blog.stealthbits.com/dcshadow-attacking-active-directory-with-rogue-dcs/ | |
https://medium.com/secjuice/php-ssrf-techniques-9d422cb28d51 | |
https://infocon.org/ | |
https://opnsec.com/2018/03/stored-xss-on-facebook/ | |
https://ahussam.me/Leaking-WordPress-CSRF-Tokens/ | |
https://hackerone.com/reports/300748 | |
https://www.unix-ninja.com/p/A_cheat-sheet_for_password_crackers | |
http://developers-club.com/posts/250999/ | |
https://goo.gl/cAHW3N (+) | |
https://rastamouse.me/2018/03/laps---part-1/ | |
https://saleemrashid.com/2018/03/20/breaking-ledger-security-model/ | |
https://ryan.govost.es/2018/03/09/deepsound.html | |
https://staaldraad.github.io/post/2018-03-16-quick-win-with-graphql/ | |
https://goo.gl/y1y8bn (+) | |
https://blog.jessfraz.com/post/building-container-images-securely-on-kubernetes/ | |
https://oddvar.moe/2018/03/21/persistence-using-runonceex-hidden-from-autoruns-exe/ | |
https://www.guardicore.com/2018/03/recovering-plaintext-passwords-azure/ | |
https://goo.gl/64sxc8 (+) | |
http://misteralfa-hack.blogspot.pt/2018/03/leaking-facebook-internal-ip.html | |
https://codewhitesec.blogspot.pt/2018/03/exploiting-adobe-coldfusion.html | |
http://tech.jonathangardner.net/wiki/Why_Java_Sucks | |
https://gethead.info/ | |
https://medium.com/@Alra3ees/google-adwords-3133-7-stored-xss-27bb083b8d27 | |
https://hawkinsecurity.com/2018/03/24/gaining-filesystem-access-via-blind-oob-xxe/ | |
https://zero-day.io/modifyexploits/ | |
https://blog.jli.host/posts/cf-auto-minify/ | |
https://www.leavesongs.com/PENETRATION/client-session-security.html | |
https://goo.gl/fnxgfx (+) | |
https://jellyhive.com/activity/posts/2018/03/26/csp-implementations-are-broken/ | |
https://magisterquis.github.io/2018/03/11/process-injection-with-gdb.html | |
https://medium.com/@cloudyforensics/how-to-perform-aws-cloud-forensics-309a03a77aee | |
https://goo.gl/93GuBP (+) | |
https://goo.gl/5Nu3xo (+) | |
https://goo.gl/Vunae1 (+) | |
https://ncona.com/2015/02/consuming-a-google-id-token-from-a-server/ | |
https://jeremyrickard.github.io/post/fun-with-aci/ | |
https://pjreddie.com/darknet/yolo/ | |
https://jgthms.com/javascript-in-14-minutes/ | |
https://ngailong.wordpress.com/2018/02/13/the-mystery-of-postmessage/ | |
http://bit.ly/2IxLqdT (+) | |
http://www.getmantra.com/web-app-security-testing-with-browsers/ | |
https://syscall.eu/blog/2018/03/12/aigo_part1/ | |
http://gosecure.net/2018/04/03/beyond-xss-edge-side-include-injection/ | |
http://bluec0re.blogspot.pt/2018/03/cve-2018-7160-pwning-nodejs-developers.html | |
https://blog.ice9.us/2018/04/stealing-credit-cards-from-fuze-bluetooth.html | |
https://magisterquis.github.io/2018/03/31/in-memory-only-elf-execution.html | |
https://medium.com/@cintainfinita/knocking-down-the-big-door-8e2177f76ea5 | |
http://blog.orange.tw/2018/03/pwn-ctf-platform-with-java-jrmp-gadget.html | |
https://phoenhex.re/2018-03-25/not-a-vagrant-bug | |
https://lightbulbone.com/posts/2016/10/dsmos-kext/ | |
https://krbtgt.pw/windows-remote-assistance-xxe-vulnerability/ | |
http://bit.ly/2Gz3aJj (+) | |
https://holeybeep.ninja/ | |
http://bit.ly/2q81V8U (+) | |
https://www.anishathalye.com/2018/04/03/macbook-touchscreen/ | |
https://philippeharewood.com/facebook-graphql-csrf/ | |
http://bit.ly/2v6ODPN (+) | |
https://secrary.com/Random/BypassUserHooks/ | |
http://bit.ly/2HvXjSg (+) | |
https://jdow.io/blog/2018/03/18/web-application-penetration-testing-methodology/ | |
https://blog.fabiopires.pt/running-your-instance-of-burp-collaborator-server/ | |
http://bit.ly/2GSKOmB (+) | |
http://bit.ly/2EGBVGP (+) | |
https://medium.com/@yassergersy/xss-to-session-hijack-6039e11e6a81 | |
https://snyk.io/blog/attacking-an-ftp-client/ | |
https://www.mindpointgroup.com/blog/pen-test/cloudfront-hijacking/ | |
https://embedi.com/blog/reflecting-upon-owasp-top-10-iot-vulnerabilities/ | |
https://clo.ng/blog/osquery_reverse_shell/ | |
https://medium.com/@jeremy.trinka/event-log-auditing-demystified-75b55879f069 | |
http://bit.ly/2EFUPhc (+) | |
https://osandamalith.com/2018/04/07/haxing-minesweeper/ | |
https://blog.benjojo.co.uk/post/tor-onions-to-v6-with-iptables-proxy | |
http://bit.ly/2HfV9ZS (+) | |
http://bit.ly/2HylK3L (+) | |
http://bit.ly/2HbjccF (+) | |
https://www.dasp.co/ | |
https://gist.github.com/sirdarckcat/fe8ce94ef25de375d13b7681d851b7b4 | |
https://pythontips.com/2018/04/15/reverse-engineering-soundcloud-api/ | |
http://byte-atlas.blogspot.pt/2018/04/apivectors.html | |
http://bit.ly/2qL2dCT (+) | |
http://bit.ly/2HMh9c9 (+) | |
https://ifc0nf1g.xyz/blog/post/pwning-admin-panel-with-recon/ | |
http://www.duskborn.com/how-to-read-write-llvm-bitcode/ | |
http://bit.ly/2JbbAU5 (+) | |
https://paper.seebug.org/563/ | |
https://blog.benjojo.co.uk/post/encoding-data-into-dubstep-drops | |
https://lightningsecurity.io/blog/linkedin/ | |
http://bit.ly/2HsCqdK (+) | |
http://bit.ly/2vOHq71 (+) | |
http://blog.secu.dk/blog/Tunnels_in_a_hard_filtered_network | |
https://security.szurek.pl/exploit-bypass-php-escapeshellarg-escapeshellcmd.html | |
http://csl.com.co/rid-hijacking/ | |
http://bit.ly/2KgT5i9 (+) | |
https://blog.xpnsec.com/total-meltdown-cve-2018-1038/ | |
http://touhidshaikh.com/blog/?p=790 | |
https://arvanaghi.com/blog/reversing-ethereum-smart-contracts/ | |
http://bit.ly/2JqTRIs (+) | |
https://habrahabr.ru/post/272187/ | |
http://blogs.360.cn/blog/how-to-kill-a-firefox-en/ | |
http://bit.ly/2HQEpYV (+) | |
https://w00tsec.blogspot.pt/2018/04/abusing-mysql-local-infile-to-read.html | |
http://bit.ly/2vRctiE (+) | |
http://lab.onsec.ru/2014/06/xxe-oob-exploitation-at-java-17.html | |
http://blog.rop.io/http-cache-poisoning-explained.html | |
http://www.freebuf.com/articles/terminal/36503.html | |
https://www.duosecurity.com/blog/duo-security-researchers-uncover-bypass-of-paypal-s-two-factor-authentication | |
https://gist.github.com/willurd/5720255 | |
http://www.sploitmonkey.com/2014/06/introducing-pyhashcat.html | |
http://sourceforge.net/projects/zeppoo/ | |
https://examplecode.github.io/tools/2014/06/20/the-tools-prevent-dns-cache-pollution/ | |
http://blog.crackpassword.com/2014/06/breaking-into-icloud-no-password-required/ | |
http://www.labofapenetrationtester.com/2014/06/hacking-jenkins-servers.html | |
http://www.harmj0y.net/blog/ | |
http://hashcrack.org/index.html#190614 | |
http://yurichev.com/RE-book.html | |
https://medium.com/@oleavr/build-a-debugger-in-5-minutes-1-5-51dce98c3544 | |
https://www.technovelty.org/linux/what-actually-happens-when-you-plug-in-a-usb-device.html | |
https://dicesoft.net/projects/wildcard-code-execution-exploit.htm | |
https://eligrey.com/blog/google-inbox-spoofing-vulnerability/ | |
http://bit.ly/2Ib7xua (+) | |
http://bit.ly/2rjGMcf (+) | |
http://bit.ly/2rjC1zr (+) | |
https://erpscan.com/press-center/blog/oracle-ebs-penetration-testing-tool/ | |
https://www.exploit-db.com/exploits/44553/ | |
https://telekomsecurity.github.io/2018/04/trovebox-vulnerabilities.html | |
https://keenlab.tencent.com/en/2018/04/23/A-bunch-of-Red-Pills-VMware-Escapes/ | |
https://www.computest.nl/wp-content/uploads/2018/04/connected-car-rapport.pdf | |
http://bit.ly/2jqx9oP (+) | |
http://www.danielbohannon.com/blog-1/2018/3/19/test-your-dfir-tools-sysmon-edition | |
http://bit.ly/2HNPhHA (+) | |
https://insert-script.blogspot.pt/2018/05/adobe-reader-pdf-client-side-request.html | |
http://blog.nsfocus.net/cve-2018-6574/ | |
https://0x00rick.com/research/2018/04/20/afl_intro.html | |
http://bit.ly/2jt5eVl (+) | |
https://www.atredis.com/blog/cylance-privilege-escalation-vulnerability | |
http://hanno-rein.de/archives/349 | |
https://blog.benjojo.co.uk/post/tls-https-server-from-a-yubikey | |
https://charles.dardaman.com/js_coinhive_in_excel | |
http://blog.mindedsecurity.com/2018/04/dom-based-cross-site-scripting-in.html | |
http://bit.ly/2rzhJCi (+) | |
https://michael-eder.net/post/2018/native_rdp_pass_the_hash/ | |
https://goo.gl/JyAG1p (+) | |
https://xiaodaozhi.com/exploit/117.html | |
http://blog.redactedsec.net/exploits/2018/04/26/nagios.html | |
http://bit.ly/2rwqr5c (+) | |
https://diablohorn.com/2018/02/04/identify-a-whitelisted-ip-address/ | |
https://medium.com/101-writeups/hacking-json-web-token-jwt-233fe6c862e6 | |
http://bit.ly/2wuN0Mn (+) | |
http://sploit3r.xyz/cve-2017-13284-injection-in-configuration-file/ | |
https://medium.com/@vysec.private/domain-fronting-who-am-i-3c982ccd52e6 | |
http://everdox.net/popss.pdf | |
https://gdprchecklist.io/ | |
http://bit.ly/2KdA5k3 (+) | |
https://momo5502.com/blog/?p=34 | |
http://bit.ly/2rNr5LC (+) | |
http://bit.ly/2rKklhB (+) | |
https://ivrodriguez.com/reverse-engineer-ios-apps-ios-11-edition-part1/ | |
https://blog.ensilo.com/ctrl-inject | |
http://bit.ly/2KuMPCX (+) | |
http://bit.ly/2Iofw7L (+) | |
https://gdelugre.github.io/2018/05/10/3gpp-ota-security-evolution/ | |
https://systemoverlord.com/2018/04/16/the-iot-hackers-toolkit.html | |
https://musings.konundrum.org/2018/05/03/debugging-windows-services.html | |
https://0xpatrik.com/asset-discovery/ | |
http://bit.ly/2Kyi5AT (+) | |
http://www.insomniacsecurity.com/2018/05/09/boblobblob.html | |
https://neonsea.uk/blog/2018/04/15/pwn910nd.html | |
https://efail.de/ | |
http://ryan.govost.es/2018/03/27/sakuracam.html | |
https://try.mydatarequest.com/ | |
https://hackerone.com/reports/341876 | |
https://sites.google.com/site/testsitehacking/-36k-google-app-engine-rce | |
http://newosxbook.com/tools/jtool.html | |
https://x1m.nl/posts/laravel-xss-vuln/ | |
https://jaiverma.github.io/blog/ios-game-hacking | |
http://bit.ly/2KT59WD (+) | |
http://deniable.org/reversing/symbolic-execution | |
http://bit.ly/2GMLZ1V (+) | |
https://blog.jli.host/posts/cloudflare-scrape-shield/ | |
https://security.szurek.pl/gitbucket-unauthenticated-rce.html | |
https://medium.com/@canavaroxum/xxe-on-windows-system-then-what-76d571d66745 | |
http://bit.ly/2s4NrHM (+) | |
http://www.harmj0y.net/blog/powershell/command-and-control-using-active-directory/ | |
https://blog.benjojo.co.uk/post/bgp-battleships | |
http://www.computerhistory.org/atchm/adobe-photoshop-source-code/ | |
https://www.robertxiao.ca/hacking/locationsmart/ | |
https://hackerone.com/reports/85624 | |
https://poc-server.com/blog/2018/05/22/rce-by-uploading-a-web-config/ | |
http://www.orionforensics.com/w_en_page/USB_forensic_tracker.php | |
http://bit.ly/2J4uc8r (+) | |
https://andresriancho.com/recaptcha-bypass-via-http-parameter-pollution/ | |
https://justi.cz/security/2018/05/23/cdn-tar-oops.html | |
http://bit.ly/2kGAXmA (+) | |
http://blogs.360.cn/blog/eos-node-remote-code-execution-vulnerability/ | |
https://rhinosecuritylabs.com/aws/amazon-aws-misconfiguration-amazon-go/ | |
https://embedi.com/blog/dji-spark-hijacking/ | |
https://silviavali.github.io/Electron/only_an_electron_away_from_code_execution | |
https://blog.doyensec.com/2018/05/17/graphql-security-overview.html | |
http://bit.ly/2xwjIgR (+) | |
http://devalias.net/devalias/2018/05/13/usb-reverse-engineering-down-the-rabbit-hole/ | |
https://gdprhallofshame.com/ | |
https://resinos.io/ | |
http://www.maizure.org/projects/printf/index.html | |
http://bit.ly/2Lv2eUp (+) | |
https://blog.innerht.ml/internet-explorer-has-a-url-problem/#rpoingooglefusiontable | |
https://hackertarget.com/tcpdump-examples/ | |
http://bit.ly/2HrpwYT (+) | |
https://staaldraad.github.io/post/2018-06-03-cve-2018-11235-git-rce/ | |
https://blahcat.github.io/2018/03/11/fuzzing-arbitrary-functions-in-elf-binaries/ | |
https://www.serializing.me/2018/06/03/rooting-the-technicolor-7210/ | |
http://bit.ly/2JzKqtY (+) | |
http://gosecure.net/2018/05/15/beware-of-the-magic-spell-part-1-cve-2018-1273/ | |
https://ownyourbits.com/2018/05/23/the-real-power-of-linux-executables/ | |
https://blogs.securiteam.com/index.php/archives/3689 | |
https://nytrosecurity.com/2018/05/30/understanding-java-deserialization/ | |
https://nbulischeck.io/posts/misusing-debugfs-for-in-memory-rce | |
http://bigric3.blogspot.pt/2018/05/cve-2018-8120-analysis-and-exploit.html | |
https://eklitzke.org/lobotomizing-gnome | |
https://wtfutil.com | |
http://bit.ly/2JFjwl2 (+) | |
https://www.bishopfox.com/blog/2018/06/server-side-spreadsheet-injections/ | |
http://rift.stacktitan.com/debug-survival-the-compiled-dll/ | |
https://gist.github.com/ricardojba/ecdfe30dadbdab6c514a530bc5d51ef6 | |
http://bit.ly/2JT6dNe (+) | |
https://blog.umangis.me/persistent-r-w-on-ios-11-2-6/ | |
https://wojciechregula.blog/your-encrypted-photos-in-macos-cache/ | |
https://blog.ret2.io/2018/06/05/pwn2own-2018-exploit-development/ | |
https://blog.ripstech.com/2018/moodle-remote-code-execution/ | |
https://intoli.com/blog/not-possible-to-block-chrome-headless/ | |
http://bit.ly/2JOjXp8 (+) | |
https://neopg.io/blog/enigmail-signature-spoof/ | |
https://blog.spaceduck.io/siaberry-1/ | |
http://bit.ly/2JQFTTP (+) | |
http://bit.ly/2JAq4l3 (+) | |
https://undercurrents.io/ | |
https://bernsteinbear.com/blog/how-to-mess-with-your-roommate/ | |
https://jamchamb.github.io/2018/06/09/animal-crossing-developer-mode.html | |
https://sekurak.pl/xss-w-google-colaboratory-obejscie-content-security-policy/ | |
http://bit.ly/2yFRocH (+) | |
http://10degres.net/testing-flash-swf/ | |
https://codewhitesec.blogspot.com/2018/06/cve-2018-0624.html | |
https://www.sxcurity.pro/advanced-cors-techniques/ | |
https://medium.com/secjuice/waf-evasion-techniques-718026d693d8 | |
https://payatu.com/guide-linux-privilege-escalation/ | |
https://blog.sigmaprime.io/solidity-security.html | |
https://blog.vulnspy.com/2018/06/21/phpMyAdmin-4-8-x-Authorited-CLI-to-RCE/ | |
http://bit.ly/2MJqvHL (+) | |
http://bit.ly/2tgPERM (+) | |
https://www.tarlogic.com/en/blog/red-team-tales-0x01/ | |
https://www.sec-1.com/blog/2017/office365-activesync-username-enumeration | |
http://bit.ly/2KacLqQ (+) | |
http://bit.ly/2MxC5V9 (+) | |
https://finnwea.com/blog/stealing-passwords-from-mcdonalds-users/ | |
https://blog.bentkowski.info/2018/06/setting-arbitrary-request-headers-in.html | |
https://0xpatrik.com/subdomain-takeover-starbucks/ | |
http://mattwarren.org/2018/06/15/Tools-for-Exploring-.NET-Internals/ | |
https://blog.netspi.com/databases-and-clouds-sql-server-as-a-c2/ | |
http://agarri.fr/docs/ipobf.py | |
http://bit.ly/2KgbW0I (+) | |
http://bit.ly/2yyota8 (+) | |
http://bit.ly/2N7QCrJ (+) | |
https://latacora.singles/2018/06/21/loud-subshells.html | |
https://www.codewatch.org/blog/?p=453 | |
http://bit.ly/2tCi7BH (+) | |
https://alephsecurity.com/2018/06/26/spectre-browser-query-cache/ | |
http://bit.ly/2KhAN4f (+) | |
https://stek29.rocks/2018/06/26/nvram.html | |
https://modexp.wordpress.com/2018/06/08/stop-event-logger/ | |
https://medium.com/0xcc/bypass-macos-rootless-by-sandboxing-5e24cca744be | |
https://srcincite.io/blog/2018/05/21/adobe-me-and-a-double-free.html | |
http://bit.ly/2Kup8ec (+) | |
http://bit.ly/2KQdVoE (+) | |
http://bit.ly/2tXqWX4 (+) | |
https://gitlab.com/0x4ndr3/blog/tree/master/JSgen | |
https://hansesecure.de/backdooring-pe-file-with-aslr/ | |
https://alter-attack.net/ | |
https://lucasg.github.io/2017/06/07/listing-known-dlls/ | |
http://bit.ly/2tXrs7s (+) | |
http://bit.ly/2tYVsjf (+) | |
https://www.wst.space/ssl-part1-ciphersuite-hashing-encryption/ | |
https://www.jeremydaly.com/event-injection-a-new-serverless-attack-vector/ | |
http://nullprogram.com/blog/2018/06/23/ | |
https://www.shelliscoming.com/2018/06/windows-reuse-shellcode-based-on.html | |
http://bit.ly/2zd0Ap7 (+) | |
https://rampageattack.com/ | |
https://landlock.io/ | |
http://bit.ly/2tKjNs3 (+) | |
http://natashenka.ca/reversing-my-tamagotchi-forever-evolution/ | |
http://bit.ly/2zd35I1 (+) | |
http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html | |
http://blog.h3xstream.com/2014/06/identifying-xml-external-entity.html | |
http://kos.io/outlook/ | |
http://blog.sucuri.net/2014/06/anatomy-of-a-remote-code-execution-bug-on-disqus.html | |
http://blog.nullmode.com/blog/2014/06/28/getting-personal-with-powershell/ | |
https://toastedcornflakes.github.io/blog/2014/06/28/static-analysis-of-cysca-2014-portknock-using-hopper-disassembler/ | |
http://www.mafiasecurity..com/install-guides/step-by-step-penetration-test/ | |
https://bitquark.co.uk/blog/2013/07/23/the_unexpected_dangers_of_preg_replace | |
http://www.hackwhackandsmack.com/?p=315 | |
http://developers.mobage.jp/blog/2014/7/3/jsonsql-injection | |
http://moyix.blogspot.co.uk/2014/07/breaking-spotify-drm-with-panda.html | |
http://cfenollosa.com/misc/tricks.txt | |
http://bit.ly/2L1rTYd (+) | |
http://bit.ly/2JgS3RR (+) | |
https://x-c3ll.github.io/posts/Frida-Pwn-Adventure-3/ | |
http://bit.ly/2N7w8P8 (+) | |
http://bit.ly/2mfSKBI (+) | |
https://www.forcepoint.com/blog/security-labs/analyzing-webassembly-binaries | |
https://dyn.com/blog/shutting-down-the-bgp-hijack-factory/ | |
http://bit.ly/2mfL1mZ (+) | |
https://rootkits.xyz/blog/2017/06/kernel-setting-up/ | |
https://blog.netspi.com/bypass-sql-logon-triggers/ | |
https://0xpatrik.com/phishing-domains/ | |
https://objective-see.com/blog/blog_0x34.html | |
http://bazad.github.io/2018/07/xpc-string-leak/ | |
https://www.fastly.com/blog/hijacking-control-flow-webassembly-program | |
http://bit.ly/2KQK83a (+) | |
https://nahamsec.com/chaining-multiple-vulnerabilities-to-gain-admin-access/ | |
http://craftinginterpreters.com/ | |
http://bit.ly/2NLEwF3 (+) | |
http://bit.ly/2uC7Yp4 (+) | |
https://haiderm.com/how-i-was-able-to-delete-13k-microsoft-translator-projects/ | |
https://scund00r.com/all/rfid/tutorial/2018/07/12/rfid-theif-v2.html | |
https://www.anitian.com/blog/owning-saml/ | |
http://bit.ly/2LtgXPX (+) | |
https://www.endgame.com/blog/technical-blog/hunting-memory-net-attacks | |
https://posts.specterops.io/shelling-apache-felix-with-java-bundles-2450d3a099a | |
http://bit.ly/2O21CYc (+) | |
http://www.mohamedharon.com/2018/01/practical-jsonp-injection.html | |
https://nytrosecurity.com/2018/02/26/hooking-chromes-ssl-functions/ | |
http://bit.ly/2LxaXFU (+) | |
https://www.peckshield.com/2018/07/12/tradeRifle/ | |
http://bit.ly/2O5x7k2 (+) | |
https://www.ambionics.io/blog/prestashop-privilege-escalation | |
https://j00ru.vexillium.org/2018/07/exploiting-a-windows-10-pagedpool-off-by-one/ | |
https://jamie.build/how-to-build-an-npm-worm | |
https://iandouglasscott.com/2018/07/04/canon-dslr-bluetooth-remote-protocol/ | |
https://medium.com/@d0nut/exfiltration-via-css-injection-4e999f63097d | |
http://bit.ly/2mL4nAZ (+) | |
https://opnsec.com/2018/07/into-the-borg-ssrf-inside-google-production-network/ | |
http://bit.ly/2OgSvmB (+) | |
https://hackerone.com/reports/334488 | |
http://bit.ly/2LDtSSN (+) | |
http://blog.sevagas.com/?Advanced-USB-key-phishing | |
http://deniable.org/reversing/binary-instrumentation | |
https://blog.jse.li/posts/marveloptics-malware/ | |
https://medium.com/@jonathanbouman/persistent-xss-at-ah-nl-198fe7b4c781 | |
https://codecat.nl/2018/05/reverse-engineering-and-exploiting-a-game-trainer/ | |
http://bit.ly/2LqhndN (+) | |
https://blog.doyensec.com/2018/07/19/instrumenting-electron-app.html | |
https://arp242.net/weblog/yaml_probably_not_so_great_after_all.html | |
http://obtruse.syfrtext.com/2018/07/oracle-privilege-escalation-via.html | |
https://modexp.wordpress.com/2018/07/12/process-injection-writing-payload/ | |
https://neonsea.uk/blog/2018/07/21/tmp-to-rce.html | |
http://asintsov.blogspot.com/2018/07/cisco-webex-teams-remote-code-execution.html | |
https://manpages.bsd.lv/history.html | |
http://wouter.coekaerts.be/2018/java-type-system-broken | |
https://blog.bentkowski.info/2018/07/vulnerability-in-hangouts-chat-aka-how.html | |
https://medium.com/@tomnomnom/crlf-injection-into-phps-curl-options-e2e0d7cfe545 | |
http://bit.ly/2AGDeZs (+) | |
https://gitlab.com/expliot_framework/expliot | |
http://bit.ly/2JUBHU1 (+) | |
https://asaf.me/2018/07/23/attacking-the-attackers/ | |
http://bit.ly/2KmNOV4 (+) | |
http://bit.ly/2MdGmxp (+) | |
https://medium.com/@Wflki/exploiting-electron-rce-in-exodus-wallet-d9e6db13c374 | |
http://liberty-shell.com/sec/2018/07/28/netshlep/ | |
http://bit.ly/2AAIPAE (+) | |
http://bit.ly/2OEFCmE (+) | |
https://movaxbx.ru/2018/07/16/bypass-data-execution-protection-dep/ | |
https://blog.xpnsec.com/hevd-null-pointer/ | |
http://bit.ly/2v9IbFk (+) | |
https://ntcore.com/?p=488 | |
https://brewpress.beer/ | |
https://hackerone.com/reports/260697 | |
http://bit.ly/2vvsgBc (+) | |
http://10degres.net/colorize-your-hunt/ | |
https://medium.com/@adam.toscher/new-attack-on-wpa-wpa2-using-pmkid-96c3119f7f99 | |
https://labs.mwrinfosecurity.com/blog/repacking-and-resigning-ios-applications/ | |
http://bit.ly/2vyB2NU (+) | |
http://bit.ly/2OWNkbW (+) | |
https://tpx.mx/blog/2018/google-pay-replay-attack.html | |
http://bit.ly/2AYffFu (+) | |
https://noncombatant.org/application-principals/ | |
https://edoverflow.com/2018/logic-flaws-in-wot-services | |
https://grimhacker.com/2018/03/09/just-a-printer/ | |
https://neonsea.uk/blog/2018/08/01/hikvision-keygen.html | |
http://bit.ly/2OWtGwK (+) | |
https://vztekoverflow.com/2018/07/31/tbal-dpapi-backdoor/ | |
https://manishearth.github.io/blog/2018/02/15/picking-apart-the-crashing-ios-string/ | |
http://blogs.360.cn/blog/eos-asset-multiplication-integer-overflow-vulnerability/ | |
https://regexcrossword.com/ | |
https://www.masswerk.at/nowgobang/2018/anatomy-of-an-rng | |
http://matthewearl.github.io/2018/06/28/smb-level-extractor/ | |
https://portswigger.net/blog/practical-web-cache-poisoning | |
http://blog.orange.tw/2018/08/how-i-chained-4-bugs-features-into-rce-on-amazon.html | |
http://bit.ly/2MkBTgE (+) | |
https://ohpe.github.io/juicy-potato/ | |
http://www.pwncode.club/2018/08/macro-used-to-spoof-parent-process.html | |
https://cofense.com/abusing-microsoft-windows-utilities-deliver-malware-fun-profit/ | |
https://blog.fox-it.com/2018/08/14/phishing-ask-and-ye-shall-receive/ | |
http://bit.ly/2MpV8of (+) | |
https://hackerone.com/reports/386807 | |
https://blog.trailofbits.com/2018/08/14/fault-analysis-on-rsa-signing/ | |
http://bit.ly/2Mhs0QG (+) | |
http://bit.ly/2Mx7cnB (+) | |
https://rayanfam.com/topics/inside-windows-page-frame-number-part1/ | |
https://pequalsnp-team.github.io/writeups/analisys_telegram_passport | |
https://foreshadowattack.eu | |
https://bohops.com/2018/08/04/capturing-netntlm-hashes-with-office-dot-xml-documents/ | |
http://bit.ly/2KYQngG (+) | |
http://bit.ly/2Mg11oJ (+) | |
https://shkspr.mobi/blog/2018/08/twitters-secret-guest-mode/ | |
https://jumpespjump.blogspot.com/2018/08/how-to-build-burner-device-for-def-con.html | |
https://ninja.style/post/bcard/ | |
https://hackerone.com/reports/395296 | |
https://www.blackhillsinfosec.com/how-to-hack-websockets-and-socket-io/ | |
https://ntdiff.github.io/ | |
http://www.kvakil.me/posts/ropchain/ | |
https://hackerone.com/reports/126522 | |
http://bit.ly/2NeGNs1 (+) | |
http://bit.ly/2wgLB8Q (+) | |
https://codewhitesec.blogspot.pt/2018/01/handcrafted-gadgets.html | |
https://blogs.securiteam.com/index.php/archives/3736 | |
http://bit.ly/2w67bOb (+) | |
https://shkspr.mobi/blog/2018/01/mailchimp-leaks-your-email-address/ | |
https://lgtm.com/blog/apache_struts_CVE-2018-11776 | |
http://bit.ly/2PtttS5 (+) | |
http://bit.ly/2BzZKDO (+) | |
https://uselesscsp.com/ | |
http://www.deaddialect.com/articles/2018/8/17/badge-story | |
https://hawkinsecurity.com/2018/08/27/traversing-the-path-to-rce/ | |
https://blog.scrt.ch/2018/08/24/remote-code-execution-on-a-facebook-server/ | |
https://www.powershellgallery.com/packages/InjectionHunter/1.0.0 | |
https://hackerone.com/reports/401136 | |
https://laconicwolf.com/2018/04/13/burp-extension-python-tutorial/ | |
https://hunter2.gitbook.io/darthsidious/privilege-escalation/alpc-bug-0day | |
https://gist.github.com/PaulSec/26251d56134c7fedb2176f2290202546 | |
https://gist.github.com/williballenthin/1c2bc539041ee3bea7a4c7129072a9ac | |
http://bit.ly/2MCbMBL (+) | |
https://mike-n1.github.io/Unusual_XSS | |
https://objective-see.com/blog/blog_0x36.html | |
http://bit.ly/2o0Mm27 (+) | |
https://www.voidsecurity.in/2018/08/from-compiler-optimization-to-code.html | |
http://bit.ly/2o9oTvT (+) | |
https://landgrey.me/struts2-045-debugging/ | |
https://payatu.com/redteaming-from-zero-to-one-part-1/ | |
https://b2dfir.blogspot.com/2016/10/touch-screen-lexicon-forensics.html | |
https://lowleveldesign.org/2018/08/15/randomness-in-net/ | |
https://mattwarren.org/2018/08/28/Fuzzing-the-.NET-JIT-Compiler/ | |
https://www.contrastsecurity.com/security-influencers/cve-2018-15685 | |
https://bitmidi.com/ | |
http://bit.ly/2MQEqzs (+) | |
https://philippeharewood.com/view-private-instagram-photos/ | |
https://blog.reigningshells.com/2018/09/hacking-rpi-cam-web-interface.html | |
https://bneg.io/2018/01/15/iterm2-customizations-for-hackers/ | |
https://medium.com/@hakluke/haklukes-guide-to-hacking-without-metasploit-1bbbe3d14f90 | |
https://hackerone.com/reports/363971 | |
http://openwall.com/lists/oss-security/2018/05/17/1 | |
https://engineering.riotgames.com/news/riots-approach-anti-cheat | |
https://dangokyo.me/2018/08/26/analysis-on-cve-2017-3000/ | |
https://phoenhex.re/2018-08-26/csgo-fuzzing-bsp | |
https://justi.cz/security/2018/08/28/packagist-org-rce.html | |
https://insecure.design/ | |
http://bit.ly/2oKrYTd (+) | |
http://hatriot.github.io/blog/2018/08/22/dell-digital-delivery-eop/ | |
http://bit.ly/2MQSeK5 (+) | |
http://williamshowalter.com/a-universal-windows-bootkit/ | |
http://bit.ly/2MTheQP (+) | |
http://bit.ly/2M2eX0C (+) | |
https://rya.nc/bitfi-wallet.html | |
https://medium.com/@elkentaro/nothing-to-see-here-the-not-so-charger-62a51e3aab22 | |
https://hackerone.com/reports/317476 | |
https://ash-king.co.uk/facebook-bug-bounty-09-18.html | |
http://bit.ly/2CS01CN (+) | |
https://gitlab.com/technotame/cookie-decrypter | |
http://exceptionlevelone.blogspot.pt/2018/02/creating-your-own-ios-1112-jailbreak.html | |
https://gist.github.com/maldevel/1d46329e00ab0c076150ddbce90d94cd | |
https://quentinkaiser.be/pentesting/2018/09/07/node-red-rce/ | |
https://www.rfk.id.au/blog/entry/security-bugs-ssrf-via-request-splitting/ | |
http://reversing.io/posts/introducing-finch/ | |
https://blogs.projectmoon.pw/2018/08/17/Edge-InlineArrayPush-Remote-Code-Execution/ | |
http://bit.ly/2xaQu4q (+) | |
https://adapt-and-attack.com/2017/11/15/keying-payloads-for-scripting-languages/ | |
https://gracefulbits.com/2018/07/26/system-call-dispatching-for-windows-on-arm64/ | |
https://versprite.com/blog/json-deserialization-memory-corruption-vulnerabilities/ | |
http://bit.ly/2NcA6dG (+) | |
https://siguza.github.io/KTRR/ | |
http://bit.ly/2p3wcpa (+) | |
https://int0xcc.svbtle.com/using-concolic-execution-for-static-analysis-of-malware | |
https://www.michaelfogleman.com/rush/ | |
http://nandgame.com/ | |
http://w00tsec.blogspot.pt/2014/07/foxit-pdf-reader-stored-xss.html | |
https://www.sektioneins.de/en/blog/14-07-04-phpinfo-infoleak.html | |
http://words.zemn.me/csp | |
http://stephensclafani.com/2014/07/08/hacking-facebooks-legacy-api-part-1-making-calls-on-behalf-of-any-user/ | |
http://www.shelliscoming.com/2014/07/ip-knock-shellcode-spoofed-ip-as.html | |
http://www.hackwhackandsmack.com/?p=345 | |
http://blog.cyberis.co.uk/2013/08/egresser-enumerate-outbound-firewall.html | |
https://twindb.com/recover-innodb-table-after-drop-table-innodb/ | |
http://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/ | |
http://vamsoft.com/downloads/articles/vamsoft-headless-browsers-in-forum-spam.pdf | |
http://bogus.jp/wp/?p=1687 | |
https://community.rapid7.com/community/metasploit/blog/2014/07/07/virtualbox-filename-command-execution-via-gksu | |
http://www.acunetix.com/blog/web-security-zone/block-automated-scanners/ | |
https://community.qualys.com/blogs/securitylabs/2014/02/27/mediawiki-djvu-and-pdf-file-upload-remote-code-execution-vulnerability-cve-2014-1610 | |
https://gist.github.com/danielrehn/d2e6f2129e5f853c3166 | |
https://medium.com/@manicho/7af5d5f28038 | |
https://justi.cz/security/2018/09/13/alpine-apk-rce.html | |
https://hackerone.com/reports/408583 | |
https://medium.com/@jonathanbouman/local-file-inclusion-at-ikea-com-e695ed64d82f | |
https://cornerpirate.com/2018/07/24/grep-extractor-a-burp-extender/ | |
https://gamozolabs.github.io/fuzzing/2018/09/16/scaling_afl.html | |
http://bit.ly/2NWlZcd (+) | |
https://blog.thomasorlita.cz/vulns/google-csp-evaluator/ | |
https://rastamouse.me/2017/08/jumping-network-segregation-with-rdp/ | |
https://uncoder.io/ | |
https://medium.com/@vishwaraj101/ocr-to-xss-42720d85f7fa | |
http://bit.ly/2OHA7mD (+) | |
http://blog.nsfocus.net/cve-2018-804-analysis/ | |
https://www.contextis.com/blog/wap-just-happened-my-samsung-galaxy | |
http://bit.ly/2NZYf78 (+) | |
http://bit.ly/2poFVXa (+) | |
https://blog.cylance.com/cracking-ransomware | |
https://rastating.github.io/creating-a-custom-shellcode-encoder/ | |
https://rhinosecuritylabs.com/aws/aws-privilege-escalation-methods-mitigation/ | |
http://bit.ly/2wiFctW (+) | |
https://oddvar.moe/2018/09/06/persistence-using-universal-windows-platform-apps-appx/ | |
http://rinseandrepeatanalysis.blogspot.com/2018/09/dde-downloaders-excel-abuse-and.html | |
http://tonsky.me/blog/disenchantment/ | |
https://lcq2.github.io/x86_iphone/ | |
http://bit.ly/2NMLnC0 (+) | |
https://medium.com/@jonathanbouman/reflected-xss-at-philips-com-e48bf8f9cd3c | |
http://bit.ly/2Qf34Ha (+) | |
https://www.n00py.io/2018/08/bypassing-duo-two-factor-authentication-fail-open/ | |
https://astr0baby.wordpress.com/2018/09/08/understanding-how-dll-hijacking-works/ | |
https://blog.secarma.co.uk/labs/hacking-with-git-git-enum-metasploit-module-release | |
https://blog.benjojo.co.uk/post/qemu-monitor-socket-rce-vnc | |
https://www.hackerone.com/blog/Guide-Subdomain-Takeovers | |
http://krystalgamer.me/spidey-breaking/ | |
https://cyseclabs.com/blog/linux-kernel-heap-spray | |
http://bit.ly/2N6yWM5 (+) | |
http://www.s3.eurecom.fr/projects/modern-android-phishing/ | |
http://bit.ly/2R3ohVC (+) | |
http://bit.ly/2xGnLEO (+) | |
https://medium.com/tenable-techblog/advantech-webaccess-unpatched-rce-ffe9f37f8b83 | |
http://bit.ly/2xUAdQT (+) | |
https://tunnelshade.in/blog/2018/09/hongfuzz-intel-pt-instrumentation/ | |
https://truepolyglot.hackade.org/ | |
https://safekeepcybersecurity.github.io/posts/2018/09/carhack_urh/ | |
https://medium.com/@the4rchangel/email-spoofing-with-netcat-telnet-e558e4a10c1 | |
https://medium.com/@brs.sgdc/google-stored-xss-in-payments-350cd7ba0d1b | |
http://bit.ly/2OzZOsx (+) | |
https://www.n00py.io/2018/10/popping-shells-on-splunk/ | |
https://gitlab.com/gitlab-org/gitlab-ce/issues/49133 | |
https://jacksonvd.com/pwned-passwords-and-ntlm-hashes/ | |
https://www.x41-dsec.de/lab/blog/fax/ | |
https://medium.com/@efkan162/how-i-xssed-uber-and-bypassed-csp-9ae52404f4c5 | |
https://jordanpotti.com/2018/10/03/violating-your-personal-space-with-webex/ | |
http://bit.ly/2OUsLMP (+) | |
http://bit.ly/2DWsXtT (+) | |
https://letsencrypt.org/docs/certificates-for-localhost/ | |
https://blog.lexfo.fr/cve-2017-11176-linux-kernel-exploitation-part1.html | |
https://eli.thegreenplace.net/2011/01/23/how-debuggers-work-part-1/ | |
https://www.gironsec.com/blog/2018/01/expiring-payloads-in-the-metasploit-framework/ | |
http://ly0n.me/2015/08/01/writing-exploits-with-an-egghunter-part-1/ | |
https://blog.smartdec.net/smartdec-smart-contract-audit-beginners-guide-d04cc7f1c571 | |
http://blog.ptsecurity.com/2018/10/intel-me-manufacturing-mode-macbook.html | |
https://www.linuxboot.org/ | |
http://www.lambdashell.com/ | |
https://blog.sheddow.xyz/css-timing-attack/ | |
http://www.sec-down.com/wordpress/?p=809 | |
http://bit.ly/2OQkWuJ (+) | |
https://flatkill.org/ | |
http://bit.ly/2C601gF (+) | |
https://geosn0w.github.io/Jailbreaks-Demystified/ | |
https://www.nc-lp.com/blog/disguise-phar-packages-as-images | |
http://bit.ly/2yxlRWY (+) | |
http://bit.ly/2NC71nl (+) | |
https://prdeving.wordpress.com/2018/09/21/hiding-malware-in-windows-code-injection/ | |
https://ewilded.blogspot.pt/2018/01/vulnserver-my-kstet-exploit-delivering.html | |
http://bit.ly/2C9esjR (+) | |
https://alephsecurity.com/2018/01/22/qualcomm-edl-1/ | |
http://0xeb.net/2018/03/using-z3-with-ida-to-simplify-arithmetic-operations-in-functions/ | |
http://telegra.ph/ | |
https://blog.bejarano.io/hardening-macos.html | |
http://bit.ly/2EuxUKF (+) | |
http://bit.ly/2EttVhF (+) | |
https://hackerone.com/reports/405100 | |
https://digi.ninja/blog/hiding_bash_history.php | |
https://hackernoon.com/how-i-hacked-modern-vending-machines-43f4ae8decec | |
http://bit.ly/2AhbatG (+) | |
https://oddcoder.com/BROP-102/ | |
http://bit.ly/2J3ItTT (+) | |
https://leucosite.com/Microsoft-Edge-RCE/ | |
https://www.xorrior.com/persistent-credential-theft/ | |
http://bit.ly/2NNfkgs (+) | |
http://bit.ly/2yLKjDY (+) | |
https://paper.seebug.org/716/ | |
https://medium.com/bugbountywriteup/bug-bounty-mail-ru-234fa6f5a5a | |
https://outflank.nl/blog/2018/10/12/sylk-xlm-code-execution-on-office-2011-for-mac/ | |
https://tls.ulfheim.net/ | |
http://serveo.net/ | |
https://www.martinvigo.com/googlemeetroulette/ | |
https://rpadovani.com/facebook-responsible-disclosure | |
https://fosterelli.co/privilege-escalation-via-docker.html | |
http://bit.ly/2Jig0ti (+) | |
https://bugid.skylined.nl/20181017001.html | |
https://alephsecurity.com/2018/10/22/StackOverflowException/ | |
https://mp.weixin.qq.com/s/ebKHjpbQcszAy_vPocW0Sg | |
https://blog.skullsecurity.org/2018/technical-rundown-of-webexec | |
http://bit.ly/2PlwTsN (+) | |
https://liberty-shell.com/sec/2018/10/20/living-off-the-land/ | |
https://hackerone.com/reports/348076 | |
https://gamozolabs.github.io/fuzzing/2018/10/18/terrible_android_fuzzer.html | |
https://blog.stratumsecurity.com/2018/10/17/route-53-as-a-pentest-infrastructure/ | |
https://shadowfile.inode.link/blog/2018/10/source-level-debugging-the-xnu-kernel/ | |
https://ops.tips/blog/how-linux-tcp-introspection/ | |
https://research.kudelskisecurity.com/2018/10/23/build-your-own-hardware-implant/ | |
http://bit.ly/2qnqbnO (+) | |
http://bit.ly/2QcNf46 (+) | |
https://bitrot.sh/post/01-16-2018-password_spraying_adfs_with_burp/ | |
http://bit.ly/2DjQT9m (+) | |
https://acru3l.github.io/2018/10/20/ropping-through-shady-corners/ | |
https://jerrygamblin.com/2018/10/29/google-home-insecurity/ | |
https://www.unix-ninja.com/p/attacking_google_authenticator | |
https://www.securepatterns.com/2018/10/cve-2018-14665-xorg-x-server.html | |
https://blog.quarkslab.com/playing-with-the-windows-notification-facility-wnf.html | |
https://sandboxescaper.blogspot.com/2018/10/reversing-alpc-where-are-your-windows.html | |
https://rhaidiz.net/2018/10/25/dribble-stealing-wifi-password-via-browsers-cache-poisoning | |
https://lgtm.com/blog/apple_xnu_icmp_error_CVE-2018-4407 | |
http://bit.ly/2zkcxpG (+) | |
http://bit.ly/2Jx7RBw (+) | |
http://bit.ly/2ETzzKg (+) | |
https://mango.pdf.zone/stealing-chrome-cookies-without-a-password | |
https://hackerone.com/reports/303730 | |
https://serializethoughts.com/2018/10/07/bypassing-android-flag_secure-using-frida/ | |
https://danshumway.com/blog/gamasutra-vulnerabilities/ | |
https://habr.com/post/429004/ | |
https://wbenny.github.io/2018/11/04/wow64-internals.html | |
https://blog.xpnsec.com/rundll32-your-dotnet/ | |
http://bit.ly/2QoKsol (+) | |
http://bit.ly/2ROJSRt (+) | |
https://www.tarlogic.com/en/blog/red-team-tales-0x02-from-sqli-to-domain-admin/ | |
https://paper.seebug.org/737/ | |
https://lgtm.com/blog/icecast_snprintf_CVE-2018-18820 | |
https://poppopret.blogspot.com/2011/09/playing-with-mof-files-on-windows-for.html | |
https://marcan.st/2017/12/debugging-an-evil-go-runtime-bug/ | |
https://apapedulimu.click/clickjacking-on-google-myaccount-worth-7500/ | |
https://xlab.tencent.com/en/2018/11/13/cve-2018-4277/ | |
https://medium.com/@mrnikhilsri/oob-xxe-in-prizmdoc-cve-2018-15805-dfb1e474345c | |
https://strm.sh/post/abusing-insecure-docker-deployments/ | |
https://shkspr.mobi/blog/2018/11/domain-hacks-with-unusual-unicode-characters/ | |
https://blog.xyz.is/2018/enso.html | |
https://ibm.co/2FqIXoO (+) | |
http://blogs.360.cn/post/VBScript_vul_EN.html | |
https://security-bits.de/posts/2018/11/11/exposed_sonos_interface.html | |
https://wwws.nightwatchcybersecurity.com/2018/11/11/cve-2018-15835/ | |
https://www.ixiacom.com/company/blog/trinity-p2p-malware-over-adb | |
https://maxkersten.nl/binary-analysis-course/malware-analysis/dot-net-rat/ | |
https://medium.com/tenable-techblog/uac-bypass-by-mocking-trusted-directories-24a96675f6e | |
http://bit.ly/2RWjjtj (+) | |
https://medium.com/@mattharr0ey/lateral-movement-using-url-protocol-e6f7d2d6cf2e | |
https://twobithistory.org/2018/11/12/cat.html | |
http://bit.ly/2DSeKgK (+) | |
http://bit.ly/2R6zbcG (+) | |
https://out-of-tree.io/ | |
https://diary.shift-js.info/js-comment-block/ | |
https://ionize.com.au/multiple-transports-in-a-meterpreter-payload/ | |
https://www.hahwul.com/2018/11/waf-bypass-xss-payload-only-hangul.html | |
https://justi.cz/security/2018/11/14/gvisor-lpe.html | |
https://tinyhack.com/2018/11/21/reverse-engineering-pokemon-go-plus/ | |
https://fireshellsecurity.team/restricted-linux-shell-escaping-techniques/ | |
http://bit.ly/2zn0f0F (+) | |
http://bit.ly/2DCUGy1 (+) | |
https://www.elttam.com.au/blog/ruby-deserialization/ | |
http://bit.ly/2DTokQm (+) | |
https://blog.cotten.io/hacking-gmail-with-weird-from-fields-d6494254722f | |
https://menschers.com/2018/10/30/what-is-cve-2018-8493/ | |
https://wojciechregula.blog/your-signal-messages-can-leak-via-locked-screen-on-macos/ | |
http://signedmalware.org/ | |
https://nginxconfig.io/ | |
https://medium.com/@copyconstruct/socat-29453e9fc8a6 | |
https://vinicius777.github.io/blog/2014/07/14/truecrypt-privilege-escalation/ | |
http://www.tripwire.com/state-of-security/featured/analysis-for-phpmyadmin-xss-cve-2014-1879/ | |
http://blog.sucuri.net/2014/07/disclosure-insecure-nonce-generation-in-wptouch.html | |
https://home.regit.org/2014/06/pshitt-collect-passwords-used-in-ssh-bruteforce/ | |
http://www.commonexploits.com/penetration-testing-scripts/ | |
http://www.viper.li/ | |
http://blogs.telerik.com/fiddler/posts/14-07-10/capturing-traffic-via-virtual-router | |
https://archive.org/details/OISFOhioInformationSecurityForum2014 | |
http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Hacking-POS-Terminal-for-Fun-and-Non-profit/ba-p/6540620 | |
http://www.vulcanproxy.com/ | |
http://drimel.org/2014/07/14/shellcode-analysis-like-a-semi-pro/ | |
http://deadliestwebattacks.com/2013/10/21/a-default-base-of-xss/ | |
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=30475 | |
http://vimeo.com/4530161 | |
http://tholman.com/giflinks/ | |
https://slashcrypto.org/2018/11/28/eBay-source-code-leak/ | |
https://www.ory.sh/sign-in-with-user-impersonation-oauth2-openid-connect | |
https://medium.com/@Bank_Security/undetectable-c-c-reverse-shells-fab4c0ec4f15 | |
https://medium.com/@petergombos/smb-named-pipe-pivoting-in-meterpreter-462580fd41c5 | |
https://l.avala.mp/?p=285 | |
https://saleemrashid.com/2018/11/26/breaking-into-bitbox/ | |
http://bit.ly/2RnTVNd (+) | |
http://bit.ly/2zzlQmu (+) | |
https://medium.com/@SweetRollBandit/aws-slurp-github-takeover-f8c80b13e7b5 | |
https://blog.timac.org/2018/1126-deobfuscated-libmobilegestalt-keys-ios-12/ | |
http://bit.ly/2rbKlBV (+) | |
http://bit.ly/2P8u5v1 (+) | |
http://bit.ly/2TPBLWx (+) | |
https://gcemetery.co/ | |
http://bit.ly/2FXmMGS (+) | |
https://pwning.re/2018/12/04/github-desktop-rce/ | |
https://medium.com/@r0t1v/pwning-jboss-seam-2-like-a-boss-da5a43da6998 | |
https://secrary.com/Random/injectionwithoutinjection/ | |
https://www.justinoblak.com/2018/12/02/Smashing-AFL.html | |
https://dylankatz.com/digging-in-to-scp-command-injection/ | |
https://blog.intothesymmetry.com/2018/12/billion-laugh-attack-in.html | |
http://bit.ly/2zJXw1o (+) | |
https://geosn0w.github.io/Debugging-macOS-Kernel-For-Fun/ | |
https://secureidentity.se/delete-domain-admin-accounts/ | |
https://salmg.net/2018/12/01/intro-to-nfc-payment-relay-attacks/ | |
http://bit.ly/2SARmI9 (+) | |
https://medium.com/tenable-techblog/remotely-exploiting-zoom-meetings-5a811342ba1d | |
https://modexp.wordpress.com/2018/10/30/arm64-assembly/ | |
https://www.voidsecurity.in/2018/11/virtualbox-nat-dhcpbootp-server.html | |
https://gist.github.com/grugq/03167bed45e774551155 | |
http://bit.ly/2KYmIpj (+) | |
https://jamchamb.github.io/2018/12/03/gamecube-memory-card-raspi.html | |
https://www.honoki.net/2018/12/from-blind-xxe-to-root-level-file-read-access/ | |
https://www.betterhacker.com/2018/12/rce-in-hubspot-with-el-injection-in-hubl.html | |
https://landgrey.me/influxdb-api-unauthorized-exploit/ | |
https://ardern.io/2018/12/07/angularjs-bxss/ | |
https://www.corben.io/XSS-to-XXE-in-Prince/ | |
http://bit.ly/2RW53kT (+) | |
https://medium.com/@SecurityBender/exploiting-a-hql-injection-895f93d06718 | |
https://cyber.wtf/2018/03/28/dissecting-olympic-destroyer-a-walk-through/ | |
https://dev.to/antogarand/why-facebooks-api-starts-with-a-for-loop-1eob | |
http://bit.ly/2EutRx7 (+) | |
https://www.fidusinfosec.com/remote-code-execution-cve-2018-5767/ | |
https://blog.intothesymmetry.com/2018/12/persistent-xsrf-on-kubernetes-dashboard.html | |
https://medium.com/javascript-security/avoiding-xss-in-react-is-still-hard-d2b5c7ad9412 | |
https://www.cybereason.com/blog/fauxpersky-credstealer-malware-autohotkey-kaspersky-antivirus | |
http://fabiensanglard.net/dreamcast_hacking/ | |
https://www.reaperbugs.com/index | |
https://mohemiv.com/all/exploiting-xxe-with-local-dtd-files/ | |
https://blog.avatao.com/How-I-could-steal-your-photos-from-Google/ | |
https://hackerone.com/reports/426944 | |
http://bit.ly/2Rd09mc (+) | |
https://medium.com/@jamie.shaw/pass-the-cache-to-domain-compromise-320b6e2ff7da | |
https://www.joachim-bauch.de/tutorials/loading-a-dll-from-memory/ | |
https://blog.cm2.pw/length-restricted-xss/ | |
http://bit.ly/2Rf4FAG (+) | |
https://bnbdr.github.io/posts/swisscheese/ | |
https://blog.sektor7.net/#!res/2018/pure-in-memory-linux.md | |
https://samcurry.net/reading-asp-secrets-for-17000/ | |
http://bit.ly/2PMOBl7 (+) | |
https://bordplate.no/blog/en/post/interactive-rop-tutorial/ | |
http://bit.ly/2S8mfU9 (+) | |
http://blog.digital-forensics.it/2017/04/brush-up-on-dropbox-dbx-decryption.html | |
http://bit.ly/2LrTRKk (+) | |
https://security.szurek.pl/kallithea-0-3-4-incorrect-access-control-and-xss.html | |
https://smallstep.com/blog/everything-pki.html | |
https://leucosite.com/WebExtension-Security/ | |
http://bit.ly/2SmvFf6 (+) | |
https://jtnydv.xyz/2018/12/24/basic-xpath-injection/ | |
https://no1zy.hatenablog.com/entry/static-analysis-of-javascript-for-bughunters | |
https://blog.ropnop.com/serverless-toolkit-for-pentesters/ | |
https://0xrick.github.io/BinaryExploitation-BOF/ | |
http://bit.ly/2Q7lnNO (+) | |
https://blog.cm2.pw/ms-edge-http-access-control-cors-bypass/ | |
http://bit.ly/2SoL9iP (+) | |
https://blog.certfa.com/posts/the-return-of-the-charming-kitten/ | |
http://bit.ly/2Q8Lzbb (+) | |
https://blog.k3170makan.com/2018/11/glibc-heap-exploitation-basics.html | |
https://blog.erratasec.com/2018/10/systemd-is-bad-parsing-and-should-feel.html | |
https://mksben.l0.cm/2018/05/cve-2018-5175-firefox-csp-strict-dynamic-bypass.html | |
https://www.ipify.org/ | |
https://hackerone.com/reports/397478 | |
https://abiondo.me/2019/01/02/exploiting-math-expm1-v8/ | |
http://bit.ly/2Vox9aJ (+) | |
https://www.iceswordlab.com/2018/07/25/kdhack/ | |
http://www.pwn3d.org/posts/7821231-gxpn-prep-2basic-scapy-review | |
https://nebelwelt.net/blog/20181231-BOP.html | |
http://bit.ly/2Vth6bm (+) | |
https://www.davidwong.fr/tls13/ | |
https://www.lolhax.org/2019/01/02/extracting-keys-f00d-crumbs-raccoon-exploit/ | |
https://www.imperialviolet.org/2019/01/01/zkattestation.html | |
http://bit.ly/A-Long-Evening-With-macOSs-Sandbox (+) | |
http://bit.ly/2AvBujp (+) | |
https://akijosberryblog.wordpress.com/2019/01/01/malicious-use-of-microsoft-laps/ | |
https://www.secjuice.com/php-rce-bypass-filters-sanitization-waf/ | |
https://blog.talosintelligence.com/2018/05/telegrab.html | |
http://misbehaving.site/ | |
https://gamehistory.org/simcity/ | |
https://hackerone.com/reports/409850 | |
http://bit.ly/2RoDTqv (+) | |
http://bit.ly/2AER4JH (+) | |
https://www.roguesecurity.in/2018/12/02/a-guide-for-windows-penetration-testing/ | |
https://medium.com/bugbountywriteup/ping-power-icmp-tunnel-31e2abb2aaea | |
https://wietzebeukema.nl/blog/spoofing-google-search-results | |
https://wunderwuzzi23.github.io/blog/passthecookie.html | |
https://mn3m.info/posts/suid-vs-capabilities/ | |
https://niemand.com.ar/2019/01/01/how-to-hook-directx-11-imgui/ | |
http://bit.ly/2QDF93N (+) | |
https://sites.google.com/view/ltefuzz | |
https://www.veracode.com/blog/research/exploiting-jndi-injections-java | |
https://tyranidslair.blogspot.com/2018/12/abusing-mount-points-over-smb-protocol.html | |
https://revers.engineering/syscall-hooking-via-extended-feature-enable-register-efer/ | |
https://ericchiang.github.io/post/containers-from-scratch/ | |
https://research.checkpoint.com/hacking-fortnite/ | |
http://bit.ly/2RVTUDO (+) | |
https://0xdf.gitlab.io/2018/11/02/pwk-notes-tunneling.html | |
https://default-password.info/ | |
https://netsec.ws/?p=262 | |
http://bit.ly/2APgbtm (+) | |
http://bit.ly/2FDzxoy (+) | |
https://niemand.com.ar/2019/01/13/creating-your-own-wallhack/ | |
https://scorpiosoftware.net/2019/01/15/fun-with-appcontainers/ | |
http://bit.ly/2MhbFrV (+) | |
https://blogs.cisco.com/security/smb-and-the-return-of-the-worm | |
http://bit.ly/2Hig3bq (+) | |
https://blog.benpri.me/2019/01/13/why-you-shouldnt-be-using-bcrypt-and-scrypt/ | |
https://sysdig.com/blog/privilege-escalation-kubernetes-dashboard/ | |
http://www.greyhathacker.net/?p=1041 | |
https://dontkillmyapp.com/ | |
https://devhints.io/ | |
https://blog.haschek.at/2018/the-curious-case-of-the-RasPi-in-our-network.html | |
https://justi.cz/security/2019/01/22/apt-rce.html | |
https://medium.com/tenable-techblog/rooting-nagios-via-outdated-libraries-bb79427172 | |
http://bit.ly/2HuSb4y (+) | |
https://medium.com/@int0x33/upload-htaccess-as-image-to-bypass-filters-71dfcf797a86 | |
https://www.inputzero.io/2019/01/fuzzing-http-servers.html | |
https://neonsea.uk/blog/2018/12/26/firewall-includes.html | |
http://bit.ly/2UgpUQO (+) | |
http://bit.ly/2FZ8hAT (+) | |
http://bit.ly/2FMAKdN (+) | |
http://bit.ly/2Mudulx (+) | |
https://enigma0x3.net/2019/01/21/razer-synapse-3-elevation-of-privilege/ | |
https://dirkjanm.io/abusing-exchange-one-api-call-away-from-domain-admin/ | |
https://medium.com/@_mattata/packet-editing-live-connections-with-python-c0ed221dafcd | |
https://www.mdsec.co.uk/2019/01/abusing-office-web-add-ins-for-fun-and-limited-profit/ | |
http://bit.ly/2FMev7U (+) | |
https://lgtm.com/blog/ghostscript_typeconfusion | |
https://bogner.sh/2019/01/querying-virustotal-from-excel/ | |
https://www.ezequiel.tech/2019/01/75k-google-cloud-platform-organization.html | |
http://bit.ly/2Wxv50A (+) | |
https://gist.github.com/sarazasasa/9450d63f96e7ff799824fc98fc7f3b43 | |
https://egre55.github.io/system-properties-uac-bypass/ | |
https://gist.github.com/3xocyte/0dc0bd4cb48cc7b4075bdc90a1ccc7d3 | |
https://insert-script.blogspot.com/2019/01/adobe-reader-pdf-callback-via-xslt.html | |
https://engineering.linecorp.com/en/blog/air-go-apk-signing/ | |
https://www.contextis.com/en/blog/basic-electron-framework-exploitation | |
https://lab.wallarm.com/xxe-that-can-bypass-waf-protection-98f679452ce0 | |
http://bit.ly/2sYgLQY (+) | |
https://www.adyta.pt/en/2019/01/29/writeup-samsung-app-store-rce-via-mitm-2/ | |
https://shenaniganslabs.io/2019/01/28/Wagging-the-Dog.html | |
http://bit.ly/2DLSrIl (+) | |
https://blog.scrt.ch/2019/01/24/magento-rce-local-file-read-with-low-privilege-admin-rights/ | |
https://alsid.com/company/news/abusing-s4u2self-another-sneaky-active-directory-persistence | |
http://bit.ly/2sYg76j (+) | |
https://medium.com/tenable-techblog/reversing-the-rachio3-smart-sprinkler-controller-ae7fc06aab9 | |
https://evolt.org/node/564 | |
https://alexhude.github.io/2019/01/24/hacking-leica-m240.html | |
http://sethsec.blogspot.gr/2014/07/crossdomain-bing.html | |
http://www.skycure.com/blog/malicious-profiles-the-sleeping-giant-of-ios-security/ | |
https://bitbucket.org/orbit-burg/nfc-emv/wiki/Home | |
http://lab.onsec.ru/2014/07/pamsteal-plugin-released.html | |
http://shell-storm.org/shellcode/ | |
http://penturalabs.wordpress.com/2014/07/18/execute-shellcode-bypassing-anti-virus/ | |
http://igurublog.wordpress.com/downloads/script-sandfox/ | |
https://archive.today/23mBC | |
https://lilithlela.cyberguerrilla.org/?p=6620 | |
http://www.irongeek.com/i.php?page=videos/bsidescleveland2014/mainlist | |
http://hashcrack.org/page?n=21072014 | |
https://www.netspi.com/blog/entryid/235/stealing-unencrypted-ssh-agent-keys-from-memory | |
https://www.pentestgeek.com/2014/07/22/phishing-frenzy-hta-powershell-attacks-with-beef/ | |
http://bit.ly/2BpGab7 (+) | |
http://bit.ly/2UNSyZH (+) | |
https://www.shawarkhan.com/2019/01/hijacking-accounts-by-retrieving-jwt.html | |
https://gist.github.com/mehaase/63e45c17bdbbd59e8e68d02ec58f4ca2 | |
http://bit.ly/2MT26jg (+) | |
http://bit.ly/2UKEKis (+) | |
https://versprite.com/blog/hacking-remote-start-system/ | |
https://vulnmind.io/i-heard-you-like-eop-to-system/ | |
https://maskop9.wordpress.com/2019/02/06/analysis-of-jacksbot-backdoor/ | |
https://doar-e.github.io/blog/2019/01/28/introduction-to-turbofan/ | |
https://acru3l.github.io/2019/02/02/exploiting-mb-anti-exploit/ | |
https://medium.com/@mattharr0ey/round-of-use-winrm-code-execution-xml-6e3219d3e31 | |
http://bit.ly/2MTPDfh (+) | |
http://bit.ly/2MUUJrx (+) | |
https://blog.benjojo.co.uk/post/eve-online-bgp-internet | |
https://outpost24.com/blog/X-forwarded-for-SQL-injection | |
https://ysamm.com/?p=185 | |
http://bit.ly/2SyIqaE (+) | |
https://gist.github.com/adamyordan/96da0ad5e72cbc97285f2df340cac43b | |
https://plainsec.org/how-to-bypass-instagram-ssl-pinning-on-android-v78/ | |
http://bit.ly/2TQYTmW (+) | |
https://shenaniganslabs.io/2019/02/13/Dirty-Sock.html | |
http://bit.ly/2BCPZSX (+) | |
https://perception-point.io/resources/research/cve-2019-0539-root-cause-analysis/ | |
https://medium.com/@x41x41x41/unauthenticated-ssrf-in-oracle-ebs-765bd789a145 | |
https://offensi.com/2019/01/31/lfi-in-apigee-portals/ | |
https://medium.com/tenable-techblog/make-it-rain-with-mikrotik-c90705459bc6 | |
https://www.secjuice.com/modsecurity-web-application-firewall-dns-over-https/ | |
https://lgtm.com/blog/ghostscript_CVE-2018-19134_exploit | |
https://www.secureauth.com/labs/advisories/asus-drivers-elevation-privilege-vulnerabilities | |
https://cantunsee.space/ | |
https://leucosite.com/Microsoft-Office-365-Outlook-XSS/ | |
https://medium.com/@elberandre/1-000-ssrf-in-slack-7737935d3884 | |
http://bit.ly/2U0BPCz (+) | |
https://pwn.no0.be/exploitation/wifi/wpa_enterprise/ | |
http://bit.ly/2tvFFaS (+) | |
https://bordplate.no/blog/en/post/debugging-a-windows-service/ | |
https://medium.com/@localh0t/unveiling-amazon-s3-bucket-names-e1420ceaf4fa | |
https://medium.com/@rvrsh3ll/hardening-your-azure-domain-front-7423b5ab4f64 | |
https://erfur.github.io/down_the_rabbit_hole_pt1/ | |
https://toshellandback.com/2015/11/24/ms-priv-esc/ | |
http://bit.ly/2GWaCx9 (+) | |
https://vmcall.github.io/reversal/2019/02/10/battleye-anticheat.html | |
http://bit.ly/2IsFpny (+) | |
https://research.checkpoint.com/extracting-code-execution-from-winrar/ | |
https://0x00sec.org/t/using-uri-to-pop-shells-via-the-discord-client/11673/2 | |
http://bit.ly/2NhVGup (+) | |
https://www.bishopfox.com/news/2019/02/openmrs-insecure-object-deserialization/ | |
https://blog.orange.tw/2019/01/hacking-jenkins-part-1-play-with-dynamic-routing.html | |
https://worldwideweb.cern.ch/ | |
https://ysamm.com/?p=240 | |
http://bit.ly/2tDRA6O (+) | |
https://medium.com/intigriti/abusing-autoresponders-and-email-bounces-9b1995eb53c2 | |
https://www.inputzero.io/2019/02/fuzzing-webkit.html | |
https://rootsh3ll.com/evil-twin-attack/ | |
https://thebabush.github.io/dumbo-llvm-based-dumb-obfuscator.html | |
http://bit.ly/2XpR4qN (+) | |
https://www.ambionics.io/blog/drupal8-rce | |
https://gitlab.com/invuls/iot-projects/iotsecfuzz | |
http://bit.ly/2GODica (+) | |
http://thunderclap.io/ | |
http://bit.ly/2IGJKUf (+) | |
https://www.pdf-insecurity.org | |
https://eklitzke.org/the-cbc-padding-oracle-problem | |
http://www.jackson-t.ca/lg-driver-lpe.html | |
https://paper.seebug.org/822/ | |
https://movaxbx.ru/2019/02/20/triaging-the-exploitability-of-ie-edge-crashes/ | |
http://bit.ly/2NxPIWm (+) | |
https://medium.com/@logicbomb_1/chain-of-hacks-leading-to-database-compromise-b2bc2b883915 | |
https://noclip.website/ | |
http://www.kwasstuff.altervista.org/RIP/index.html | |
https://staaldraad.github.io/post/2019-03-02-universal-rce-ruby-yaml-load/ | |
https://www.vulnano.com/2019/03/facebook-messenger-server-random-memory.html | |
https://ghidra-sre.org/ | |
https://0x90909090.blogspot.com/2019/02/executing-payload-without-touching.html | |
https://disloops.com/cloudfront-hijacking/ | |
http://bit.ly/2XIF4AQ (+) | |
http://blog.ptsecurity.com/2019/02/detecting-web-attacks-with-seq2seq.html | |
https://www.veracode.com/blog/research/exploiting-spring-boot-actuators | |
https://movaxbx.ru/2019/02/16/windows-process-injection-sharing-the-payload/ | |
https://blog.0day.rocks/hiding-through-a-maze-of-iot-devices-9db7f2067a80 | |
http://bit.ly/2HjDsaQ (+) | |
http://bit.ly/2TB245t (+) | |
http://blogs.360.cn/post/Binder_Kernel_Vul_EN.html | |
https://js1k.com/2019-x/demos | |
https://blog.littlevgl.com/2019-02-02/use-ipod-nano6-lcd-for-littlevgl | |
https://hackerone.com/reports/411140 | |
https://hackerone.com/reports/398799 | |
https://medium.com/@rootxharsh_90844/vimeo-ssrf-with-code-execution-potential-68c774ba7c1e | |
https://pentest.blog/n-ways-to-unpack-mobile-malware/ | |
https://ijustwannared.team/2019/03/11/browser-pivot-for-chrome/ | |
https://hausec.com/2019/03/05/penetration-testing-active-directory-part-i/ | |
https://d4stiny.github.io/Reading-Physical-Memory-using-Carbon-Black/ | |
http://woshub.com/copying-large-files-using-bits-and-powershell/ | |
https://webrtchacks.com/fuzzing-janus/ | |
https://pulsesecurity.co.nz/articles/TPM-sniffing | |
https://www.stuffithoughtiknew.com/2019/02/detecting-bloodhound.html | |
http://bit.ly/2UGmozO (+) | |
https://licenciaparahackear.github.io/en/posts/bypassing-a-restrictive-js-sandbox/ | |
https://redtimmysec.wordpress.com/2019/03/07/flexpaper-remote-code-execution/ | |
http://bit.ly/2T4IBWA (+) | |
http://travisaltman.com/windows-privilege-escalation-via-weak-service-permissions/ | |
http://blogs.360.cn/post/RootCause_CVE-2019-0808_EN.html | |
https://rhinosecuritylabs.com/application-security/exploiting-cve-2018-1335-apache-tika/ | |
https://archivebox.io/ | |
https://litherum.blogspot.com/2019/03/addition-font.html | |
https://hackerone.com/reports/470520 | |
http://bit.ly/2ulwA56 (+) | |
https://medium.com/@terjanq/cross-site-content-and-status-types-leakage-ef2dab0a492 | |
http://bit.ly/2Fo9zDP (+) | |
https://medium.com/@benoit.sevens/windows-10-emulation-with-qemu-f41870ed464d | |
https://medium.com/@0x0FFB347/writing-a-custom-shellcode-encoder-31816e767611 | |
https://polict.net/blog/CVE-2018-17057 | |
http://bit.ly/2HwT1wN (+) | |
https://blog.tint0.com/2019/03/a-saga-of-code-executions-on-zimbra.html | |
https://jarlob.github.io/en/blog/not-a-bug-sqli | |
https://liberty-shell.com/sec/2019/03/12/dll-hijacking/ | |
https://lgtm.com/blog/facebook_fizz_CVE-2019-3560 | |
http://offsec.provadys.com/intro-to-file-operation-abuse-on-Windows.html | |
https://medium.com/tenable-techblog/mikrotik-firewall-nat-bypass-b8d46398bf24 | |
http://bit.ly/2ULRPsg (+) | |
https://blog.assetnote.io/bug-bounty/2019/03/19/rce-on-mozilla-zero-day-webpagetest/ | |
https://proofofcalc.com/cve-2019-6453-mIRC/ | |
https://blog.regehr.org/archives/1653 | |
https://securitytxt.org/ | |
https://www.niceideas.ch/roller2/badtrash/entry/deciphering-the-bengladesh-bank-heist | |
https://hackerone.com/reports/297478 | |
http://bit.ly/2OqLKz2 (+) | |
https://medium.com/tenable-techblog/owning-the-network-with-badusb-72daa45d1b00 | |
https://mogwailabs.de/blog/2019/03/repacking-ios-applications/ | |
https://raw.githubusercontent.com/pedrib/PoC/master/advisories/nuuo-cms-ownage.txt | |
http://bit.ly/2YujGj1 (+) | |
http://bit.ly/2Ow20ij (+) | |
https://outflank.nl/blog/2018/10/06/old-school-evil-excel-4-0-macros-xlm/ | |
http://bit.ly/2JJXpdQ (+) | |
https://securelist.com/hacking-microcontroller-firmware-through-a-usb/89919/ | |
https://medium.com/0xcc/one-liner-safari-sandbox-escape-exploit-91082ddbe6ef | |
https://medium.com/@princechaddha/an-unusal-bug-on-braintree-paypal-b8d3ec662414 | |
https://blog.zecops.com/vulnerabilities/analysis-and-reproduction-of-cve-2019-7286/ | |
http://bit.ly/2UXZAM1 (+) | |
https://medium.com/@howard.poston/mapping-the-owasp-top-ten-to-blockchain-69c904394e69 | |
https://nullprogram.com/blog/2019/03/22/ | |
https://blog.jessfraz.com/post/digging-into-risc-v-and-how-i-learn-new-things/ | |
https://hackerone.com/reports/511044 | |
https://mahmoudsec.blogspot.com/2019/04/handlebars-template-injection-and-rce.html | |
https://blog.doyensec.com/2019/04/03/subverting-electron-apps-via-insecure-preload.html | |
http://bit.ly/2TVqqTJ (+) | |
https://masthoon.github.io/exploit/2019/03/29/cygeop.html | |
https://digi.ninja/blog/domain_fronting.php | |
https://gkbrk.com/2019/01/reverse-engineering-the-godot-file-format/ | |
https://modexp.wordpress.com/2019/03/07/process-injection-print-spooler/ | |
https://cfreal.github.io/carpe-diem-cve-2019-0211-apache-local-root.html | |
https://www.drewgreen.net/vulnerabilities-in-tightrope-media-systems-carousel/ | |
https://snyk.io/blog/severe-security-vulnerability-in-bowers-zip-archive-extraction/ | |
https://www.secjuice.com/finding-real-ips-of-origin-servers-behind-cloudflare-or-tor/ | |
https://medium.com/tenable-techblog/filezilla-untrusted-search-path-bc3a7b3ae51e | |
http://bit.ly/2UzN9c0 (+) | |
http://bit.ly/2HXhjAb (+) | |
https://www.zoomeye.org/topic?id=ZoomEye-series-report-VE-en | |
https://hackerone.com/reports/381356 | |
https://medium.com/@d0nut/better-exfiltration-via-html-injection-31c72a2dae8b | |
http://bit.ly/2X5eTCX (+) | |
https://blog.zsec.uk/el-injection-rce/ | |
https://rastamouse.me/2019/01/gpo-abuse-part-1/ | |
http://bit.ly/2Ksl6HR (+) | |
http://tomasuh.github.io/2018/12/28/retefe-unpack.html | |
http://bit.ly/2Uvj2DH (+) | |
https://www.shielder.it/blog/nagios-xi-5-5-10-xss-to-root-rce/ | |
https://wpa3.mathyvanhoef.com/ | |
https://habr.com/en/post/446238/ | |
https://blog.exodusintel.com/2019/04/03/a-window-of-opportunity/ | |
https://www.notsosecure.com/exploiting-ssrf-in-aws-elastic-beanstalk/ | |
https://mp.weixin.qq.com/s/OissE9gAVkKmAXuiIUeOLA | |
http://cturt.github.io/pinball.html | |
http://www.righto.com/2019/04/iconic-consoles-of-ibm-system360.html | |
https://soroush.secproject.com/blog/2014/07/upload-a-web-config-file-for-fun-profit/ | |
http://ibrahimbalic.com/2014/sqlmap-ile-csrf-bypass/ | |
http://tomforb.es/exploiting-xpath-injection-vulnerabilities-with-xcat-1 | |
http://www.relentless-coding.org/projects/jsdetox/ | |
http://hive.ccs.neu.edu/ | |
https://lzo.securitymouse.com/lzo | |
http://blog.oddbit.com/2014/07/21/tracking-down-a-kernel-bug-wit/ | |
http://googleprojectzero.blogspot.pt/2014/07/pwn4fun-spring-2014-safari-part-i_24.html | |
http://atredispartners.blogspot.pt/2014/07/atredis-blackhat-2014-contest-after_24.html | |
http://diablohorn.wordpress.com/2014/07/26/writing-your-own-blind-sqli-script/ | |
http://blogs.mcafee.com/mcafee-labs/dropping-files-temp-folder-raises-security-concerns | |
http://slides.com/mscasharjaved/on-breaking-php-based-cross-site-scripting-protections-in-the-wild#/ | |
http://www.ghacks.net/2014/07/28/repair-extract-broken-rar-archives/ | |
http://gsmmap.org/ | |
https://blog.underdogsecurity.com/rce_in_origin_client/ | |
https://hackerone.com/reports/369451 | |
http://bit.ly/2KMwUF1 (+) | |
https://gist.github.com/glenux/3e705387e30f229c242ea153de6e6a4d | |
http://bit.ly/2ItRHvg (+) | |
https://hackerone.com/reports/473888 | |
https://krbtgt.pw/dacl-permissions-overwrite-privilege-escalation-cve-2019-0841/ | |
https://www.shielder.it/blog/exploit-apache-solr-through-opencms/ | |
https://dejandayoff.com/the-danger-of-exposing-docker.sock/ | |
https://parzelsec.de/timing-attacks-with-machine-learning/ | |
http://bit.ly/2vgAlsN (+) | |
http://bit.ly/2Gydmz1 (+) | |
http://newosxbook.com/articles/OTA.html | |
https://hackerone.com/reports/110293 | |
https://www.labofapenetrationtester.com/2019/04/abusing-PAM.html | |
http://bit.ly/2Xk9t7l (+) | |
https://jerrington.me/posts/2019-01-29-self-hosted-ngrok.html | |
https://ysamm.com/?p=256 | |
https://scriptinjection.blogspot.com/2019/04/oe-classic-280-rce-via-stored-xss.html | |
https://hackerone.com/reports/422043 | |
http://bit.ly/2GBOOEW (+) | |
http://bit.ly/2GFK4PU (+) | |
https://medium.com/@terjanq/xss-auditor-the-protector-of-unprotected-f900a5e15b7b | |
http://bit.ly/2XLQOlb (+) | |
https://habr.com/en/post/449182/ | |
http://bit.ly/2W6YqOK (+) | |
https://blog.trailofbits.com/2019/01/22/fuzzing-an-api-with-deepstate-part-1/ | |
http://bit.ly/2L061xq (+) | |
https://consensys.github.io/smart-contract-best-practices/known_attacks/ | |
https://blog.quarkslab.com/android-application-diffing-engine-overview.html | |
http://bit.ly/2UHi2Yp (+) | |
https://blog.doyensec.com/2019/04/24/rubyzip-bug.html | |
https://sensepost.com/blog/2019/understanding-peap-in-depth/ | |
https://www.linkedin.com/pulse/micro-patching-vulnerabilities-tutorial-0patch-t-k/ | |
https://http3-explained.haxx.se/en/ | |
https://wybiral.github.io/code-art/projects/tiny-mirror/ | |
https://hackerone.com/reports/210779 | |
http://bit.ly/2VE8WQE (+) | |
http://bit.ly/2Y1LhHa (+) | |
https://research.801labs.org/developing-a-dll-injector/ | |
http://bit.ly/2Jbahrp (+) | |
https://www.darkmatter.ae/blogs/security-flaws-uncovered-in-sony-smart-tvs/ | |
https://paper.seebug.org/910/ | |
http://eternalsakura13.com/2019/04/29/CVE-2016-5198/ | |
https://securityriskadvisors.com/blog/aws-iam-exploitation/ | |
https://capsule8.com/blog/exploiting-systemd-journald-part-1/ | |
https://edoverflow.com/2019/ci-knew-there-would-be-bugs-here/ | |
https://medium.com/tenable-techblog/eight-devices-one-exploit-f5fc28c70a7c | |
https://d4stiny.github.io/Remote-Code-Execution-on-most-Dell-computers/ | |
http://bit.ly/2GWPxAL (+) | |
http://www.tomanthony.co.uk/blog/xss-attacks-googlebot-index-manipulation/ | |
http://bit.ly/2IYijVt (+) | |
https://www.virtuesecurity.com/tale-of-a-wormable-twitter-xss/ | |
https://hackerone.com/reports/563870 | |
http://bit.ly/2H9qH0X (+) | |
http://bit.ly/2Lxly8o (+) | |
http://bit.ly/2LyXKks (+) | |
https://www.tarlogic.com/en/blog/attacking-selenium-grid/ | |
http://bit.ly/2LwQ1mK (+) | |
http://bit.ly/2Hbwowt (+) | |
http://bit.ly/2PUMZr3 (+) | |
https://hackerone.com/reports/509924 | |
http://blog.0x42424242.in/2019/03/vstarcam-investigational-security.html | |
http://bit.ly/2JaLkNv (+) | |
http://bit.ly/2Jbl0Da (+) | |
https://medium.com/0xcc/rootpipe-reborn-part-ii-e5a1ffff6afe | |
https://www.nc-lp.com/blog/reverse-engineering-games-for-fun-and-ssrf-part-1 | |
https://classic.minecraft.net | |
https://www.my-internet-explorer.com/ | |
https://hackerone.com/reports/419883 | |
https://hackerone.com/reports/450365 | |
https://zeropwn.github.io/2019-05-13-xss-to-rce/ | |
https://security.lauritz-holtmann.de/advisories/cve-2019-11832/ | |
https://gist.github.com/jupenur/e5d0c6f9b58aa81860bf74e010cf1685 | |
https://astr0baby.wordpress.com/2019/01/26/custom-meterpreter-loader-in-2019/ | |
https://mdsattacks.com/ | |
https://thewover.github.io/Introducing-Donut/ | |
https://zombieloadattack.com/ | |
https://wojciechregula.blog/post/stealing-bear-notes-with-url-schemes/ | |
http://bit.ly/2Ep1u23 (+) | |
https://modexp.wordpress.com/2019/05/10/dotnet-loader-shellcode/ | |
http://bit.ly/2WQBt2E (+) | |
https://rce4fun.blogspot.com/2019/05/panda-antivirus-local-privilege.html | |
http://bit.ly/2LY1qfw (+) | |
https://landgrey.me/richfaces-cve-2018-14667/ | |
https://gist.github.com/wybiral/c8f46fdf1fc558d631b55de3a0267771 | |
https://liveoverflow.com/the-origin-of-script-kiddie-hacker-etymology/ | |
https://www.wpadblock.com/ | |
https://hackerone.com/reports/341908 | |
http://bit.ly/2WjQywF (+) | |
https://medium.com/tenable-techblog/stealing-downloads-from-slack-users-be6829a55f63 | |
https://snikt.net/blog/2019/05/22/to-fuzz-a-websocket/ | |
https://medium.com/@ghostlulzhacks/wayback-machine-e678a3567ec | |
http://lordofpwn.kr/index.php/writeup/cve-2019-8506-javascriptcore-exploit/ | |
https://medium.com/@fs0c131y/how-to-brick-all-samsung-phones-6aae4389bea | |
https://www.tarlogic.com/en/blog/backdoors-modulos-apache/ | |
https://zeropwn.github.io/2019-05-22-fun-with-uri-handlers/ | |
https://hackerone.com/reports/505424 | |
https://www.darkmatter.ae/papers-articles/from-zero-to-tfp0-part-1-prologue/ | |
http://bit.ly/2JY17yV (+) | |
http://bit.ly/2EroJZ4 (+) | |
https://theevilbit.github.io/posts/vmware_fusion_11_guest_vm_rce_cve-2019-5514/ | |
https://web-in-security.blogspot.com/2019/02/how-to-spoof-pdf-signatures.html | |
https://shenaniganslabs.io/2019/05/21/LXD-LPE.html | |
https://keikai.io/blog/p/currency-exchange | |
http://bit.ly/2M6nDrV (+) | |
https://petergarner.net/notes/index.php?thisnote=20180202-Travels+with+a+Pi | |
https://ysamm.com/?p=272 | |
https://portswigger.net/blog/abusing-jquery-for-css-powered-timing-attacks | |
https://medium.com/@subTee/flying-toruk-makto-b1bff8f6603c | |
https://www.fcvl.net/vulnerabilities/macosx-gatekeeper-bypass | |
http://bit.ly/2wyCHUx (+) | |
http://bit.ly/2IcgEc2 (+) | |
https://habr.com/en/company/drweb/blog/452076/ | |
https://phoenhex.re/2019-05-15/non-jit-bug-jit-exploit | |
https://labs.spotify.com/2013/06/18/creative-usernames/ | |
https://blog.devsecurity.eu/en/blog/dnspy-deserialization-vulnerability | |
https://blog.devsecurity.eu/en/blog/joplin-electron-rce | |
https://whereisk0shl.top/post/2019-05-11 | |
https://bnbdr.github.io/posts/wd/ | |
http://standa-note.blogspot.com/2018/02/amsi-bypass-with-null-character.html | |
http://bit.ly/2EH1I4m (+) | |
https://techblog.mediaservice.net/2019/03/a-journey-into-iot-hardware-hacking-uart/ | |
https://www.magiclantern.fm/ | |
http://bit.ly/2Wr8O7v (+) | |
https://www.inputzero.io/2019/06/hacking-smart-tv.html | |
http://bit.ly/2I0PuWB (+) | |
http://bit.ly/31aZJz2 (+) | |
https://www.tarlogic.com/en/blog/how-to-attack-kerberos/ | |
http://bit.ly/2K3whps (+) | |
http://homepages.laas.fr/rcayre/mirage-documentation/index.html | |
https://orangewirelabs.wordpress.com/2019/05/30/hacking-ios-xamarin-apps-with-frida/ | |
http://bit.ly/2Ipk2Ab (+) | |
http://bit.ly/31fBbVN (+) | |
https://theevilbit.github.io/posts/getting_root_with_benign_appstore_apps/ | |
http://www.catch22.net/tuts/undocumented-createprocess | |
http://bit.ly/2Z5lwGu (+) | |
https://0x41.cf/infosec/2019/05/28/skype-web-plugin-ez-rce.html | |
http://bit.ly/2WsWu7t (+) | |
https://leakfree.wordpress.com/2015/03/12/php-object-instantiation-cve-2015-1033/ | |
https://blog.duszynski.eu/domain-hijack-through-http-301-cache-poisoning/ | |
https://www.fireeye.com/blog/threat-research/2019/06/hunting-com-objects.html | |
https://medium.com/@lerner98/skiptracing-reversing-spotify-app-3a6df367287d | |
https://secretgeek.github.io/html_wysiwyg/html.html | |
https://medium.com/@notdan/curl-slight-of-hand-exploit-hysteria-29a82e5851d | |
https://blog.ripstech.com/2019/mybb-stored-xss-to-rce/ | |
https://appio.dev/vulns/googleplex-com-blind-xss/ | |
https://rce.wtf/2019/06/10/w2k.html | |
https://rambleed.com/ | |
https://habr.com/ru/company/dsec/blog/454592/ | |
https://medium.com/@two06/fun-with-frida-5d0f55dd331a | |
https://www.sneakymonkey.net/2019/05/22/trickbot-analysis/ | |
http://bit.ly/2WiM2KD (+) | |
https://eybisi.run/Mobile-Malware-Analysis-Overlay-and-How-to-Counter-it/ | |
http://bit.ly/2ID9Y6Y (+) | |
https://payatu.com/microsoft-edge-extensions-host-permission-bypass-cve-2019-0678/ | |
https://howhttps.works/ | |
https://harrisonsand.com/imsi-catcher/ | |
https://wookey-project.github.io/ | |
https://medium.com/@mr_hacker/a-5000-idor-f4268fffcd2e | |
http://bit.ly/2ZzYurC (+) | |
hhttps://www.jaiminton.com/cheatsheet/DFIR/ | |
http://bit.ly/2x8SGJe (+) | |
https://blog.redteam.pl/2019/04/dns-based-threat-hunting-and-doh.html | |
https://hackerone.com/reports/576504 | |
https://jaiverma.github.io/blog/ac-hack | |
https://theofficialflow.github.io/2019/06/18/trinity.html | |
https://blog.xpnsec.com/evading-sysmon-dns-monitoring/ | |
http://bit.ly/2ItogYP (+) | |
https://xor.cat/2019/06/19/fortinet-forticam-vulns/ | |
http://bit.ly/2x2tKmW (+) | |
https://www.twistlock.com/labs-blog/breaking-out-of-coresos-rkt-3-new-cves/ | |
https://habr.com/ru/company/pt/blog/448378/ | |
https://dmsec.io/hacking-thousands-of-websites-via-third-party-javascript-libraries/ | |
https://dassur.ma/things/c-to-webassembly/ | |
https://blog.benjojo.co.uk/post/dive-into-the-world-of-dos-viruses | |
http://m4x0n3.blogspot.pt/2014/07/password-reset-code-bruteforce-account.html | |
https://plus.google.com/+AlexisImperialLegrandGoogle/posts/f9gm2G2BH5g | |
http://habrahabr.ru/post/231369/ | |
http://www.matriux.com/index.php?page=home | |
http://lcamtuf.coredump.cx/p0f3/ | |
http://lcamtuf.blogspot.gr/2014/08/a-bit-more-about-american-fuzzy-lop.html | |
http://www.garage4hackers.com/entry.php?b=3072 | |
http://blog.ptsecurity.com/2014/08/cell-phone-tapping-how-it-is-done-and.html | |
http://blog.internot.info/2014/06/paypals-2-factor-authentication2fa-good.html | |
http://blog.dornea.nu/2014/08/05/android-dynamic-code-analysis-mastering-droidbox/ | |
http://www.dirk-loss.de/python-tools.htm | |
http://usbdescriptors.com/ | |
https://hackademic.co.in/youtube-bug/ | |
https://www.cyberark.com/threat-research-blog/outlook-for-android-xss/ | |
https://alephsecurity.com/2019/06/17/xnu-qemu-arm64-1/ | |
https://www.wzdftpd.net/blog/rust-fuzzers.html | |
https://labs.jumpsec.com/2019/06/20/bypassing-antivirus-with-golang-gopher-it/ | |
http://bit.ly/2XyprhR (+) | |
https://objective-see.com/blog/blog_0x43.html | |
https://www.gironsec.com/blog/2019/06/yet-another-botnet-writeup/ | |
https://ledger-donjon.github.io/Ellipal-Security/ | |
http://bit.ly/2LnK35Z (+) | |
https://exp101t.blogspot.com/2019/04/cve-2017-5121-escape-analysis.html | |
https://dolosgroup.io/blog/2019/6/20/pillaging-the-jenkins-treasure-chest | |
http://bit.ly/2NeWeVf (+) | |
https://blog.duszynski.eu/tor-ip-disclosure-through-http-301-cache-poisoning/ | |
https://blog.jessfraz.com/post/why-open-source-firmware-is-important-for-security/ | |
http://www.enforcementtracker.com/ | |
https://playclassic.games/ | |
https://hackerone.com/reports/562335 | |
https://shhnjk.blogspot.com/2019/07/intro-to-chromes-gold-features.html | |
https://ssl-config.mozilla.org/ | |
https://gitlab.com/kennbroorg/iKy | |
https://blog.ripstech.com/2019/magento-rce-via-xss/ | |
https://decoder.cloud/2019/07/04/creating-windows-access-tokens/ | |
https://nytrosecurity.com/2019/06/30/writing-shellcodes-for-windows-x64/ | |
https://kripken.github.io/blog/binaryen/2019/06/11/fuzz-reduce-productivity.html | |
https://medium.com/bugbountywriteup/knocking-the-idor-6f80e8126ee4 | |
https://ktln2.org/2019/04/30/from-zero-to-hero/ | |
http://bit.ly/2LxSeNn (+) | |
http://bit.ly/2Jnc235 (+) | |
http://bit.ly/2xyhr1G (+) | |
https://medium.com/@alex91ar/debugging-the-samsung-android-kernel-part-1-ab2a9b87c162 | |
https://vulnerablecontainers.org/ | |
https://www.youtube.com/watch?v=VwH6B7aJYDU | |
https://hackerone.com/reports/403417 | |
http://bit.ly/32mecsz (+) | |
https://blog.rakeshmane.com/2019/07/u-xss-in-operamini-for-ios-browser-0-day.html | |
https://chryzsh.github.io/exploiting-privexchange/ | |
https://www.cambus.net/fuzzing-dns-zone-parsers/ | |
http://lordofpwn.kr/index.php/writeup/cve-2019-5825-v8-exploit/ | |
https://withatwist.dev/strong-password-rubygem-hijacked.html | |
http://bit.ly/2KXINHu (+) | |
https://www.secjuice.com/abusing-php-query-string-parser-bypass-ids-ips-waf/ | |
https://enigma0x3.net/2019/07/05/cve-2019-13142-razer-surround-1-1-63-0-eop/ | |
https://medium.com/tenable-techblog/an-exploit-chain-against-citrix-sd-wan-709db08fb4ac | |
https://medium.com/tenable-techblog/an-analysis-of-arlo-6f1b691236b5 | |
https://staaldraad.github.io/post/2019-07-11-bypass-docker-plugin-with-containerd/ | |
https://ledger-donjon.github.io/Unfixable-Key-Extraction-Attack-on-Trezor/ | |
https://medium.com/netscape/hacking-it-out-when-cors-wont-let-you-be-great-35f6206cc646 | |
http://bit.ly/2XYhMdc (+) | |
https://www.bamsoftware.com/hacks/zipbomb/ | |
https://techblog.eyeson.team/post/memelearning/ | |
https://thezerohack.com/hack-any-instagram | |
https://medium.com/@ruvlol/rce-in-jira-cve-2019-11581-901b845f0f | |
http://bit.ly/2Lrs6o8 (+) | |
https://gist.github.com/realoriginal/3a00478efd67b554f09f739380e2c3ba | |
http://bit.ly/2JBDGuB (+) | |
http://bit.ly/2LtS6PJ (+) | |
https://www.corben.io/atlassian-crowd-rce/ | |
https://sysrant.com/500-bounty-man-in-the-middle-on-slack/ | |
https://medium.com/@sansyrox/hacking-tinders-premium-model-43f9f699d44 | |
https://phoenhex.re/2019-07-10/ten-months-old-bug | |
http://bit.ly/2Lz6lD1 (+) | |
https://staaldraad.github.io/post/2019-07-16-cve-2019-13139-docker-build/ | |
http://bit.ly/2XVf4B6 (+) | |
https://harry.garrood.me/blog/malicious-code-in-purescript-npm-installer/ | |
https://medium.com/@ScatteredSecrets/how-to-crack-billions-of-passwords-6773af298172 | |
http://bit.ly/2JN677F (+) | |
https://latacora.micro.blog/2019/07/16/the-pgp-problem.html | |
https://ardern.io/2019/06/20/payload-bxss/ | |
http://bit.ly/2GtDPyi (+) | |
https://blog.ropnop.com/docker-for-pentesters/ | |
http://bit.ly/2YiYOd9 (+) | |
http://bit.ly/2Ohxb4A (+) | |
https://paper.seebug.org/990/ | |
https://zero.lol/2019-07-21-axway-securetransport-xml-injection/ | |
https://blog.assetnote.io/bug-bounty/2019/07/17/rce-on-zoom/ | |
http://bit.ly/2GtMW1R (+) | |
https://trustfoundry.net/basic-rop-techniques-and-tricks/ | |
https://blog.doyensec.com/2019/07/22/jackson-gadgets.html | |
https://blog.trailofbits.com/2019/07/19/understanding-docker-container-escapes/ | |
https://mthbernardes.github.io/rce/2018/03/14/abusing-h2-database-alias.html | |
https://pentest.blog/android-malware-analysis-dissecting-hydra-dropper/ | |
http://orbis.stanford.edu/ | |
http://bit.ly/2Mdl3Pt (+) | |
http://bit.ly/2YIS8cQ (+) | |
http://bit.ly/2Mx0ygL (+) | |
http://bit.ly/2ypIexV (+) | |
https://raw-data.gitlab.io/post/autoit_fud/ | |
https://86hh.github.io/cfg2.html | |
https://rhinosecuritylabs.com/aws/mfa-phishing-on-aws/ | |
https://akayn.github.io/2019/07/25/PwningWebkit.html | |
http://bit.ly/332Tnmm (+) | |
https://medium.com/0xcc/what-the-heck-is-tcp-port-18800-a16899f0f48f | |
http://bit.ly/2Yvu8FK (+) | |
http://bit.ly/2MvQhkY (+) | |
https://maxkersten.nl/binary-analysis-course/binary-types/browser-plug-in/ | |
https://d4stiny.github.io/Local-Privilege-Escalation-on-most-Dell-computers/ | |
http://bit.ly/2Oy9Rzu (+) | |
https://bo0om.ru/telegram-bugbounty-writeup | |
https://amonitoring.ru/article/steamclient-0day/ | |
http://bit.ly/2GWT1UK (+) | |
http://bit.ly/2ZJVcCs (+) | |
https://m0chan.github.io/2019/07/31/How-To-Attack-Kerberos-101.html | |
http://bit.ly/2YTEBuS (+) | |
https://tactifail.wordpress.com/2019/07/26/three-vulns-for-the-price-of-one/ | |
https://blog.flanker017.me/galaxy-leapfrogging-pwning-the-galaxy-s8/ | |
http://bit.ly/2YwaWMQ (+) | |
http://bit.ly/33kIexb (+) | |
https://icyphox.sh/blog/fb50/ | |
https://paper.seebug.org/993/ | |
https://gravitational.com/blog/how-saml-authentication-works/ | |
http://mahmoudsec.blogspot.com/2019/08/exploiting-out-of-band-xxe-using.html | |
http://blog.orange.tw/2019/07/attacking-ssl-vpn-part-1-preauth-rce-on-palo-alto.html | |
https://vimeo.com/341663153 | |
http://www.nothingsecurity.com/ | |
https://www.baseapp.com/iot/antenna-tuning-for-beginners/ | |
https://appio.dev/vulns/clickjacking-xss-on-google-org/ | |
https://medium.com/rangeforce/meteor-blind-nosql-injection-29211775cd01 | |
https://blog.jse.li/posts/chrome-76-incognito-filesystem-timing/ | |
https://go-re.tk | |
https://a13xp0p0v.github.io/2019/08/10/cfu.html | |
https://modexp.wordpress.com/2019/08/12/windows-process-injection-knowndlls/ | |
https://raesene.github.io/blog/2019/08/10/making-it-rain-shells-in-Kubernetes/ | |
https://siguza.github.io/APRR/ | |
http://bit.ly/2Hbr77Q (+) | |
https://medium.com/cruise/container-platform-security-7a3057a27663 | |
https://zero.lol/2019-08-11-the-year-of-linux-on-the-desktop/ | |
http://bit.ly/2YQMhTl (+) | |
http://www.peppermalware.com/2019/07/analysis-of-frenchy-shellcode.html | |
http://bit.ly/2KGOVBa (+) | |
https://research.checkpoint.com/select-code_execution-from-using-sqlite/ | |
https://initblog.com/2019/switcheroo/ | |
https://www.janmeppe.com/blog/regex-for-noobs/ | |
https://salibra.com/p/buying-tea-with-wechat-pay-d3931febd2be | |
http://bit.ly/2KM6v8c (+) | |
https://hackerone.com/reports/637194 | |
https://secrary.com/Random/anti_re_simple/ | |
https://hausec.com/2019/08/12/offensive-lateral-movement/ | |
https://heapspray.io/automating-pentests-with-webdriver.html | |
https://blog.firosolutions.com/exploits/webmin/ | |
http://bit.ly/33VrwoL (+) | |
https://nullprogram.com/blog/2019/07/10/ | |
http://bit.ly/31PNCa6 (+) | |
https://knobattack.com | |
https://davejingtian.org/2019/07/17/usb-fuzzing-a-usb-perspective/ | |
http://bit.ly/2Zkb1Px (+) | |
https://wojciechregula.blog/post/dangerous-get-task-allow-entitlement/ | |
https://amonitoring.ru/article/onemore_steam_eop_0day/ | |
https://gts3.org/2019/cve-2019-0609.html | |
https://www.tarlogic.com/en/blog/vulnerabilities-in-ampache/ | |
https://blog.regehr.org/archives/1687 | |
https://jordanpotti.com/2019/08/26/phishing-with-saml-and-sso-providers/ | |
http://bit.ly/2ZyvrrT (+) | |
https://gist.github.com/nstarke/ed0aba2c882b8b3078747a567ee00520 | |
https://osandamalith.com/2019/08/27/running-shellcode-directly-in-c/ | |
http://bit.ly/2MJy1pg (+) | |
https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a | |
http://bit.ly/2ZkSZkW (+) | |
http://bit.ly/2L3Sq69 (+) | |
http://bit.ly/2Ugodnw (+) | |
https://blog.semmle.com/uboot-rce-nfs-vulnerability/ | |
https://verifpal.com/ | |
https://labs.mwrinfosecurity.com/blog/autocad-designing-a-kill-chain/ | |
https://samczsun.com/the-0x-vulnerability-explained/ | |
https://blog.bi0s.in/2019/08/18/Pwn/Browser-Exploitation/cve-2019-11707-writeup/ | |
https://palant.de/2019/08/19/kaspersky-in-the-middle-what-could-possibly-go-wrong/ | |
https://medium.com/tenable-techblog/rooting-routeros-with-a-usb-drive-16d7b8665f90 | |
http://hatriot.github.io/blog/2019/08/22/exploiting-leaked-process-and-thread-handles/ | |
https://winworldpc.com/library/operating-systems | |
https://iximiuz.com/en/posts/from-docker-container-to-bootable-linux-disk-image/ | |
http://www.windytan.com/2019/08/capturing-pal-video-with-sdr-and-few.html | |
http://www.primalsecurity.net/python-tutorials/ | |
https://bitbucket.org/mattinfosec/wordhound/ | |
https://fuzion24.github.io/android/gradle/xposed/jar/java/build/sdk/2014/08/15/android-gradle-xposed/ | |
http://dustri.org/b/torbrowserbundleorg.html | |
http://www.room362.com/blog/2014/08/14/milkman-creating-processes-as-any-currently-logged-in-user/ | |
https://www.miknet.net/security/optimizing-birthday-attack/ | |
http://www.ioactive.com/pdfs/Remote_Automotive_Attack_Surfaces.pdf | |
http://docs.cs.up.ac.za/programming/asm/derick_tut/syscalls.html | |
https://isc.sans.edu/forums/diary/Web+Server+Attack+Investigation+-+Installing+a+Bot+and+Reverse+Shell+via+a+PHP+Vulnerability/18543 | |
http://jvns.ca/blog/2014/08/12/what-happens-if-you-write-a-tcp-stack-in-python/ | |
https://doegox.github.io/ElectronicColoringBook/ | |
https://hackerone.com/reports/498052 | |
https://ysamm.com/?p=280 | |
https://hackerone.com/reports/446593 | |
https://www.corben.io/jenkins-to-full-pwnage/ | |
https://www.contextis.com/en/blog/common-language-runtime-hook-for-persistence | |
https://mogwailabs.de/blog/2019/04/attacking-rmi-based-jmx-services/ | |
https://research.securitum.com/security-analysis-of-portal-element/ | |
https://blog.trailofbits.com/2019/09/02/rewriting-functions-in-compiled-binaries/ | |
http://bit.ly/2lGFkBx (+) | |
http://bit.ly/2k22O3H (+) | |
https://gist.github.com/roycewilliams/cf7fce5777d47a8b22265515dba8d004 | |
http://bit.ly/2k53EwL (+) | |
https://leveldown.de/blog/tensorflow-sidechannel-analysis/ | |
https://medium.com/@byte_St0rm/adventures-in-the-wonderful-world-of-amsi-25d235eb749c | |
https://losttraindude.itch.io/zfrag | |
https://pfery.com/create-your-own-portable-rfid-pentest-kit/ | |
https://habr.com/en/post/466801/ | |
https://leucosite.com/Microsoft-Edge-uXSS/ | |
https://www.komodosec.com/post/an-accidental-ssrf-honeypot-in-google-calendar | |
https://incogbyte.github.io/pathtraversal/ | |
http://bit.ly/2kxhWGM (+) | |
http://bit.ly/2kGM0Q0 (+) | |
https://giuliocomi.blogspot.com/2019/08/insecure-secrets-encryption-at-rest.html | |
https://simjacker.com/ | |
http://bit.ly/2lSCoSp (+) | |
https://blog.openzeppelin.com/libra-vulnerability-summary/ | |
http://blogs.360.cn/post/When-GC-Triggers-Callback.html | |
https://blog.aquasec.com/dns-spoofing-kubernetes-clusters | |
https://blog.cystack.net/subdomain-takeover/ | |
https://xlab.tencent.com/en/2019/09/12/deep-analysis-of-cve-2019-8014/ | |
http://bit.ly/2meGnJr (+) | |
http://bit.ly/2mc1A6F (+) | |
https://www.vusec.net/projects/netcat/ | |
http://blog.lambdaconcept.com/doku.php?id=research:graywire | |
http://allenchou.net/2019/08/trigonometry-basics-sine-cosine/ | |
https://blog.ripstech.com/2019/bitbucket-path-traversal-to-rce/ | |
https://iwantmore.pizza/posts/cve-2019-10392.html | |
http://bit.ly/2lWASis (+) | |
https://0x00sec.org/t/reversing-hackex-an-android-game/16243 | |
https://teamrot.fi/2019/05/23/self-hosted-burp-collaborator-with-custom-domain | |
https://vavkamil.cz/2019/09/11/serverless-blind-xss-hunter-with-cloudflare-workers/ | |
http://bit.ly/2kI1fbK (+) | |
https://blog.semmle.com/android-deserialization-vulnerabilities/ | |
http://bit.ly/2kRpyUv (+) | |
https://carvesystems.com/news/command-injection-with-usb-peripherals/ | |
https://docs.google.com/document/d/1XWzlOOuoTE7DUK60qTk1Wz1VNhbPaHqKEzyxPfyW4GQ | |
https://dirkjanm.io/azure-ad-privilege-escalation-application-admin/ | |
https://research.securitum.com/server-side-template-injection-on-the-example-of-pebble/ | |
http://bit.ly/2lX3yI2 (+) | |
https://blog.openzeppelin.com/bypassing-smart-contract-timelocks/ | |
http://bit.ly/2lZczQP (+) | |
https://aem1k.com/oo/ | |
https://smallstep.com/blog/everything-pki/ | |
https://hackerone.com/reports/692603 | |
https://medium.com/@terjanq/dom-clobbering-techniques-8443547ebe94 | |
https://samcurry.net/analysis-of-cve-2019-14994/ | |
http://bit.ly/2kGLOjK (+) | |
https://blog.grimm-co.com/post/guided-fuzzing-with-driller/ | |
https://modexp.wordpress.com/2019/08/30/minidumpwritedump-via-com-services-dll/ | |
https://pentestlab.blog/2019/09/11/microsoft-exchange-mailbox-post-compromise/ | |
http://bit.ly/2mW6FjW (+) | |
https://interrupt.memfault.com/blog/ble-throughput-primer | |
https://alephsecurity.com/2019/09/02/Z3-for-webapp-security/ | |
https://ackcent.com/blog/in-depth-freemarker-template-injection/ | |
https://adapt-and-attack.com/2019/08/29/proxying-com-for-stable-hijacks/ | |
https://medium.com/@memn0ps/http-request-smuggling-cl-te-7c40e246021c | |
https://blog.xpnsec.com/bypassing-macos-privacy-controls/ | |
https://medium.com/@akshukatkar/rce-with-flask-jinja-template-injection-ea5d0201b870 | |
http://bit.ly/2lXfyJy (+) | |
https://medium.com/@vickieli/how-to-find-more-idors-ae2db67c9489 | |
http://bit.ly/2ltl8DK (+) | |
https://hsivonen.fi/string-length/ | |
https://nathandavison.com/blog/haproxy-http-request-smuggling | |
https://frederik-braun.com/firefox-ui-xss-leading-to-rce.html | |
http://bit.ly/2o9MCPZ (+) | |
https://frichetten.com/blog/bypass-guardduty-pentest-alerts | |
https://enciphers.github.io/Mobexler/ | |
https://pentestlab.blog/2017/06/07/uac-bypass-fodhelper/ | |
http://bit.ly/2nfcQ3d (+) | |
http://bit.ly/2pCAqHL (+) | |
http://bit.ly/2oN3uvR (+) | |
https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/ | |
https://starlabs.sg/advisories/19-8038/ | |
http://bit.ly/2VaTQ2d (+) | |
https://sysenter-eip.github.io/VBParser | |
http://bit.ly/2pIHGCh (+) | |
https://thesw4rm.gitlab.io/nfqueue_c2/2019/09/15/Command-and-Control-via-TCP-Handshake/ | |
https://medium.com/intigriti/gotcha-taking-phishing-to-a-whole-new-level-72eda9e30bef | |
https://eddiez.me/spotify-vacuum/ | |
http://rl337.org/2012/07/31/in-java-when-is-math-abs-negative/ | |
http://bit.ly/2oOXGSq (+) | |
https://hackerone.com/reports/631956 | |
https://5alt.me/2019/10/HackMD%20Stored%20XSS%20and%20HackMD%20Desktop%20RCE/ | |
https://medium.com/bugbountywriteup/sql-injection-to-lfi-to-rce-536bed29a862 | |
https://nightowl131.github.io/AAPG/ | |
https://theappanalyst.com/bird.html | |
http://bit.ly/33ljTql (+) | |
https://securing.github.io/SCSVS/ | |
https://alex.kaskaso.li/post/revisiting-email-spoofing | |
http://bit.ly/2B5NZSt (+) | |
http://bit.ly/2IEgpay (+) | |
https://medium.com/swlh/php-type-juggling-vulnerabilities-3e28c4ed5c09 | |
https://xerub.github.io/ios/iboot/2018/05/10/de-rebus-antiquis.html | |
https://x-c3ll.github.io//posts/CVE-2018-7081-RCE-ArubaOS/ | |
https://www.preempt.com/blog/drop-the-mic-2-active-directory-open-to-more-ntlm-attacks/ | |
https://collapseos.org/ | |
http://www.pouet.net/prod.php?which=83222 | |
http://bit.ly/2Mtnpbj (+) | |
http://bit.ly/2J0wSpP (+) | |
http://bit.ly/2IXw455 (+) | |
https://redteamzone.com/ThinVNC/ | |
https://iwantmore.pizza/posts/meterpreter-psattack.html | |
https://www.praetorian.com/blog/running-a-net-assembly-in-memory-with-meterpreter | |
https://medium.com/@netscylla/pentesters-guide-to-oracle-hacking-1dcf7068d573 | |
https://osandamalith.com/2019/10/12/bypassing-the-webarx-web-application-firewall-waf/ | |
http://bit.ly/2VQ3ac8 (+) | |
http://bit.ly/31oU5bi (+) | |
https://www.sudo.ws/alerts/minus_1_uid.html | |
http://bit.ly/32s7JMc (+) | |
https://dmaasland.github.io/posts/mcafee.html | |
https://hernan.de/blog/2019/10/15/tailoring-cve-2019-2215-to-achieve-root/ | |
https://blog.paloaltonetworks.com/2019/10/cloud-kubernetes-vulnerabilities/ | |
https://dirkjanm.io/office-365-network-attacks-via-insecure-reply-url/ | |
http://bit.ly/2IF9X3f (+) | |
https://christopher-vella.com/2019/09/06/recent-edr-av-observations/ | |
http://bit.ly/33BSlx5 (+) | |
http://bit.ly/35KORdl (+) | |
https://jvns.ca/blog/2019/10/03/sql-queries-don-t-start-with-select/ | |
https://buer.haus/2019/10/18/a-tale-of-exploitation-in-spreadsheet-file-conversions/ | |
https://www.shielder.it/blog/exploiting-an-old-novnc-xss-cve-2017-18635-in-openstack/ | |
https://x-c3ll.github.io//posts/CSS-Injection-Primitives/ | |
http://bit.ly/2Jg9J2v (+) | |
https://cturt.github.io/ps2-yabasic.html | |
https://habr.com/en/company/dsec/blog/472762/ | |
http://bit.ly/2PhNa1k (+) | |
https://research.securitum.com/jwt-json-web-token-security/ | |
http://bit.ly/32Ja1XH (+) | |
http://bit.ly/2qJmUmx (+) | |
http://bit.ly/2BL3Ypn (+) | |
https://medium.com/@MalFuzzer/dissecting-ardamax-keylogger-f33f922d2576 | |
https://medium.com/@philiptsukerman/activation-contexts-a-love-story-5f57f82bccd | |
http://www.snaponair.com/ | |
https://binji.github.io/posts/raw-wasm-making-a-maze-race/ | |
http://bit.ly/34kr6aJ (+) | |
https://research.securitum.com/prototype-pollution-rce-kibana-cve-2019-7609/ | |
http://bit.ly/2BVSEqP (+) | |
https://lab.wallarm.com/race-condition-in-web-applications/ | |
http://bit.ly/365EwsH (+) | |
https://pulsesecurity.co.nz/advisories/untitled-goose-game-deserialization | |
http://www.hydrogen18.com/blog/reddit-android-app-leaks-images.html | |
https://medium.com/tenable-techblog/routeros-chain-to-root-f4e0b07c0b21 | |
http://bit.ly/2qchqQY (+) | |
https://hackerone.com/reports/629892 | |
http://bit.ly/2NrrxcA (+) | |
https://incolumitas.com/2019/10/19/model-based-fuzzing-of-the-WPA3-dragonfly-handshake/ | |
https://hellveticafont.com/ | |
https://byuu.net/compact-discs/structure | |
https://rastating.github.io/opsec-in-the-after-life/ | |
https://blog.teddykatz.com/2019/11/05/github-oauth-bypass.html | |
http://bit.ly/2PWO3g0 (+) | |
https://dualuse.io/blog/curryfinger/ | |
https://labs.f-secure.com/blog/ou-having-a-laugh/ | |
https://www.riccardoancarani.it/bloodhound-tips-and-tricks/ | |
https://pentestlab.blog/2019/11/05/persistence-powershell-profile/ | |
https://bcdevices.github.io/zephyr/ble/2019/10/30/zephyr-ble-testing.html | |
http://bit.ly/2qsNu39 (+) | |
http://bit.ly/2NoUXsX (+) | |
https://blog.netspi.com/escape-nodejs-sandboxes/ | |
https://reverse.put.as/2019/10/29/crafting-an-efi-emulator/ | |
https://medium.com/@lerner98/rage-against-the-maschine-3357be1abc48 | |
https://iwantmore.pizza/posts/cve-2019-1414.html | |
https://nathandavison.com/blog/abusing-http-hop-by-hop-request-headers | |
https://argus-sec.com/remote-attack-bosch-drivelog-connector-dongle/ | |
https://maxkersten.nl/binary-analysis-course/malware-analysis/corona-ddos-bot/ | |
https://blog.vastart.dev/2019/10/stack-overflow-cve-2019-17424.html | |
http://whythefuckwasibreached.com/ | |
https://lightcommands.com/ | |
http://homakov.blogspot.pt/2014/02/how-i-hacked-github-again.html | |
http://insertco.in/2014/02/10/how-i-hacked-instagram/ | |
http://blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-boundaries.html | |
http://neosysforensics.blogspot.com.es/2010/02/la-papelera-de-reciclaje-en-windows.html | |
https://bitbucket.org/blackaura/browserfuzz | |
http://jeanphix.me/Ghost.py/ | |
http://16s.us/docs/sshlog/ | |
https://www.us-cert.gov/ncas/alerts/TA14-017A | |
http://www.lauradhamilton.com/random-lessons-online-poker-exploit | |
http://blog.alguien.at/2014/02/hackeando-el-router-zte-zxv10-w300-v21.html | |
https://archive.org/details/shmoocon-2014 | |
http://www.devttys0.com/2014/02/cracking-linksys-crypto/ | |
https://www.youtube.com/watch?v=waEeJJVZ5P8 | |
http://www.digitaljournal.com/news/world/13-year-old-defies-big-brother-and-refuses-to-be-fingerprinted/article/370009 | |
http://blog.opensecurityresearch.com/2014/08/learning-exploitation-with-fsexploitme.html | |
http://ccsir.org/how-to-ddos-through-facebook-datacenter-with-almost-1gbs-theyve-started-to-care/ | |
https://pypi.python.org/pypi/ooniprobe | |
http://recon.cx/2014/video/ | |
https://www.youtube.com/watch?v=___jEOjGCOY | |
https://jordan-wright.github.io/blog/2013/11/07/how-to-pentest-iphone-apps-with-burp/ | |
https://www.netsparker.com/blog/web-security/ruby-on-rails-security-basics/ | |
http://zenhax.com/viewtopic.php?f=16&t=87 | |
http://w00tsec.blogspot.pt/2014/08/scan-internet-screenshot-all-things.html | |
http://www.bsdnow.tv/tutorials/openvpn | |
http://www.nsaplayset.org/ | |
http://h4des.org/blog/index.php?/archives/345-Introducing-alertR-Open-Source-alerting-system.html | |
https://www.google.com/?hl=xx-hacker&gws_rd=ssl | |
https://fletchto99.dev/2019/november/slack-vulnerability/ | |
https://blog.teddykatz.com/2019/11/12/github-actions-dos.html | |
https://terjanq.github.io/Bug-Bounty/Google/cache-attack-06jd2d2mz2r0/index.html | |
https://mike-n1.github.io/Chain_XSS | |
https://pentestlab.blog/2019/11/13/persistence-accessibility-features/ | |
http://tpm.fail/ | |
http://re.alisa.sh/notes/iBoot-address-space.html | |
https://decoder.cloud/2019/11/13/from-arbitrary-file-overwrite-to-system/ | |
https://c0nradsc0rner.com/2016/07/03/ecb-byte-at-a-time/ | |
http://bit.ly/374r7S9 (+) | |
http://bit.ly/2qW7JpO (+) | |
https://shenaniganslabs.io/2019/11/12/Ghost-Potato.html | |
http://bit.ly/34ZdguH (+) | |
http://bit.ly/2NMg74t (+) | |
http://bit.ly/2CLkyWI (+) | |
https://portswigger.net/research/cracking-recaptcha-turbo-intruder-style | |
http://bit.ly/34b23Hk (+) | |
https://www.notsosecure.com/oob-exploitation-cheatsheet/ | |
http://bit.ly/2Qh4qUT (+) | |
http://bit.ly/2OwK1Zv (+) | |
http://bit.ly/2QB0ChD (+) | |
http://bit.ly/37ntoIl (+) | |
https://medium.com/@two06/amsi-as-a-service-automating-av-evasion-2e2f54397ff9 | |
https://timvisee.com/blog/stealing-private-keys-from-secure-file-sharing-service/ | |
http://bit.ly/37uwOJl (+) | |
https://blog.silentsignal.eu/2019/04/18/drop-by-drop-bleeding-through-libvips/ | |
https://www.shelliscoming.com/2019/11/retro-shellcoding-for-current-threats.html | |
https://pomb.us/build-your-own-react/ | |
https://webassembly-security.com/polyglot-webassembly-module-html-js-wasm/ | |
https://jcjc-dev.com/2019/11/11/esp32-arduino-bluetooth-halloween-costume/ | |
https://research.securitum.com/xss-in-amp4email-dom-clobbering/ | |
https://ysamm.com/?p=343 | |
https://0xeb-bp.github.io/blog/2019/11/21/practical-guide-pass-the-ticket.html | |
https://blog.xpnsec.com/exploring-mimikatz-part-1/ | |
https://blog.benjojo.co.uk/post/userspace-usb-drivers | |
https://blog.orange.tw/2019/11/HiNet-GPON-Modem-RCE.html | |
https://staaldraad.github.io/post/2019-11-24-argument-injection/ | |
https://mrexodia.github.io/reversing/2019/09/28/Analyzing-keyboard-firmware-part-1 | |
https://dreadlocked.github.io/2019/10/25/kentico-cms-rce/ | |
https://medium.com/bugbountywriteup/breaking-down-sha-256-algorithm-2ce61d86f7a3 | |
https://blog.flanker017.me/examining-and-exploiting-android-vendor-binder-services-part1/ | |
https://bkerler.github.io/2019/11/15/bring-light-to-the-darkness/ | |
http://bit.ly/2R13owE (+) | |
https://kiwec.net/blog/posts/beating-c-with-brainfuck/ | |
http://bit.ly/2Dqvj13 (+) | |
https://s0lly.itch.io/cellivization | |
http://bit.ly/2rjDZDX (+) | |
https://about.gitlab.com/blog/2019/11/29/shopping-for-an-admin-account/ | |
http://bit.ly/2OS4n0D (+) | |
https://h0mbre.github.io/Learn-C-By-Creating-A-Rootkit | |
http://bit.ly/2OTDeuv (+) | |
https://blog.talosintelligence.com/2019/11/hunting-for-lolbins.html | |
https://puzzor.github.io/Linksys-Velop-Vulneraibility-Series | |
https://rushter.com/blog/public-ssh-keys/ | |
http://bit.ly/2PlmQSi (+) | |
https://medium.com/@drakkars/hacking-an-android-tv-in-2-minutes-7b6f29518ff3 | |
https://m417z.com/The-De-anonymization-of-the-Technion-Confessions-Admin/ | |
https://medium.com/swlh/hacking-xml-data-a64c870b0988 | |
https://sensepost.com/blog/2019/obtaining-shells-via-logitech-unifying-dongles/ | |
http://xyproblem.info/ | |
https://www.imbushuo.net/blog/archives/725 | |
https://www.dylanpaulus.com/2019-11-24-how-fb-avoids-adblockers/ | |
https://hipotermia.pw/bb/http-desync-idor | |
https://amonitoring.ru/article/origin_lpe_disclosure/ | |
https://www.ragestorm.net/blogs/?p=486 | |
https://www.coalfire.com/The-Coalfire-Blog/December-2019/Deserialized-Double-Dirty | |
https://x-c3ll.github.io/posts/Pivoting-MySQL-Proxy/ | |
https://www.vdalabs.com/2019/09/25/windows-credential-theft-rdp-internet-explorer-11/ | |
https://itm4n.github.io/cdpsvc-dll-hijacking/ | |
https://medium.com/@ricardoiramar/reusing-cookies-23ed4691122b? | |
https://diverto.github.io/2019/11/18/Cracking-LUKS-passphrases | |
https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html | |
http://bit.ly/2skmNhQ (+) | |
https://www.mdsec.co.uk/2019/12/macos-filename-homoglyphs-revisited/ | |
https://promon.co/security-news/strandhogg/ | |
https://medium.com/@ss23/php-autloading-local-file-inclusion-by-design-71aafe627877 | |
https://n4r1b.netlify.com/en/posts/2019/11/understanding-wdboot-windows-defender-elam/ | |
https://decoder.cloud/2019/12/06/we-thought-they-were-potatoes-but-they-were-beans/ | |
https://starship.rs/ | |
https://ivrodriguez.com/introducing-security-plist/ | |
https://eng.getwisdom.io/hacking-github-with-unicode-dotless-i/ | |
https://medium.com/@dPhoeniixx/vimeo-upload-function-ssrf-7466d8630437 | |
https://brandonhinkel.com/breaking-hardened-mifare-proxmark3/ | |
https://aboutdfir.com/jailbreaking-checkra1n-configuration/ | |
https://pentest.blog/explore-hidden-networks-with-double-pivoting/ | |
https://medium.com/maverislabs/cve-2019-17123-cbc946c99f8 | |
https://osintcurio.us/2019/07/16/searching-instagram/ | |
https://decoder.cloud/2019/12/18/from-dropboxupdater-to-nt-authoritysystem/ | |
https://medium.com/@rootxharsh_90844/abusing-feature-to-steal-your-tokens-f15f78cebf74 | |
https://nagarrosecurity.com/blog/interactive-buffer-overflow-exploitation | |
https://know.bishopfox.com/research/cve-2019-18935-remote-code-execution-in-telerik-ui | |
https://blog.tetrane.com/2019/11/17/Analyzing_an_Out_of_Bounds_read_in_a_TTF_font_file.html | |
https://lab.wallarm.com/securing-and-attacking-graphql-part-1-overview/ | |
https://dsfile-analysis.blogspot.com/2019/12/normal-0-false-false-false-en-us-x-none.html | |
https://bowero.nl/blog/2019/12/15/c-what-the-fuck/ | |
https://neilkakkar.com/unix.html | |
https://yurichev.com/blog/SA_XOR/ | |
https://leucosite.com/Edge-Chromium-EoP-RCE/ | |
http://bit.ly/34Rnm0g (+) | |
https://iwantmore.pizza/posts/meterpreter-ppid-spoofing.html | |
https://anee.me/reversing-a-real-world-249-bytes-backdoor-aadd876c0a32 | |
http://bit.ly/35UMgNM (+) | |
https://blog.umangis.me/a-deep-dive-into-ios-code-signing/ | |
https://offensi.com/2019/12/16/4-google-cloud-shell-bugs-explained-introduction/ | |
https://medium.com/@R0X4R/graphql-idor-leads-to-information-disclosure-175eb560170d | |
https://know.bishopfox.com/blog/5-privesc-attack-vectors-in-aws | |
https://securitylab.github.com/research/ubuntu-whoopsie-daisy-overview | |
http://bit.ly/2ZstdI5 (+) | |
https://mp.weixin.qq.com/s/okU2y0izfnKXXtXG3EfLkQ | |
https://bertjwregeer.keybase.pub/2019-12-10%20-%20error_page%20request%20smuggling.pdf | |
https://fredericb.info/2016/10/amlogic-s905-soc-bypassing-not-so.html | |
https://www.blackhillsinfosec.com/how-to-hack-hardware-using-uart/ | |
http://bit.ly/2Mulp3y (+) | |
https://alephsecurity.com/2019/12/29/revised-homograph-attacks/ | |
http://bit.ly/2tnUn78 (+) | |
https://jpdias.me/infosec/hardware/2019/12/26/uberhid.html | |
https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html | |
https://gist.github.com/ykoster/4d2c3792d438e04bb73529017a6e1177 | |
https://sec.alexflor.es/post/minipwn/ | |
https://blog.zeddyu.info/2019/12/08/HTTP-Smuggling-en/ | |
https://whereisk0shl.top/post/a-simple-story-of-dssvc | |
http://bit.ly/36ecGdz (+) | |
http://bit.ly/2PYAQmQ (+) | |
https://blog.quarkslab.com/a-deep-dive-into-samsungs-trustzone-part-1.html | |
https://keenlab.tencent.com/en/2020/01/02/exploiting-wifi-stack-on-tesla-model-s/ | |
https://blog.jonlu.ca/posts/experiments-and-growth-hacking | |
https://medium.com/@frycos/yet-another-net-deserialization-35f6ce048df7 | |
http://bit.ly/36kD8lE (+) | |
https://tech.michaelaltfield.net/2020/01/02/buskill-laptop-kill-cord-dead-man-switch/ | |
http://bit.ly/2FBDJUC (+) | |
http://bit.ly/2tGKrG0 (+) | |
https://community.turgensec.com/ssh-hacking-guide/ | |
https://pentestlab.blog/2020/01/07/persistence-appinit-dlls/ | |
https://webassembly-security.com/fuzzing-wasm-javascript-dharma-chrome-v8/ | |
https://cablehaunt.com/ | |
https://www.ambionics.io/blog/php-mt-rand-prediction | |
https://gravitational.com/blog/ssh-handshake-explained/ | |
http://bit.ly/2R6XSau (+) | |
https://www.pentagrid.ch/en/blog/fuzzing_java_with_jqf/ | |
https://duo.com/labs/research/secure-boot-in-the-era-of-the-t2 | |
https://redfast00.github.io/12-31-2019/reverse-engineering-uefi.html | |
https://medium.com/@ryancor/reverse-engineering-encrypted-code-segments-b01aead67701 | |
https://medium.com/@catalyst256/osint-certificate-transparency-lists-a603c9d2b776 | |
https://www.allysonomalley.com/2020/01/06/saying-goodbye-to-my-favorite-5-minute-p1/ | |
http://rubyplants.com/ | |
http://www.p01.org/defender_of_the_favicon/ | |
https://immunant.com/blog/2020/01/quake3/ | |
https://blog.isec.pl/all-is-xss-that-comes-to-the-net/ | |
http://bit.ly/2FRi1fo (+) | |
https://yeggor.github.io/UEFI_BinDiff/ | |
https://blog.redteam.pl/2019/12/chrome-portal-element-fuzzing.html | |
http://windows-internals.com/cet-on-windows/ | |
http://bit.ly/2NxAz8G (+) | |
https://alephsecurity.com/2020/01/14/ruckus-wireless/ | |
http://bit.ly/371T6l9 (+) | |
https://httptoolkit.tech/blog/debugging-https-without-global-root-ca-certs/ | |
https://medium.com/tenable-techblog/lets-reverse-engineer-discord-1976773f4626 | |
http://bit.ly/2TubqiN (+) | |
https://medium.com/@alexkaskasoli/pull-based-cd-pipelines-for-security-4e044b403f56 | |
https://darvincitech.wordpress.com/2019/12/23/detect-frida-for-android/ | |
https://pentest.blog/advisory-seagate-central-storage-remote-code-execution/ | |
https://blog.jse.li/posts/torrent/ | |
https://citizen428.net/blog/learning-fsharp-writing-a-raytracer/ | |
http://deadliestwebattacks.com/2013/12/03/selector-the-almighty-subjugator-of-elements/ | |
http://marc.durdin.net/2014/09/risks-with-third-party-scripts-on-internet-banking-sites/ | |
http://securitysucks.info/exploit-phps-mail-to-get-remote-code-execution/ | |
https://www.cert.org/blogs/certcc/post.cfm?EntryID=203 | |
http://xmodulo.com/2014/08/sniff-http-traffic-command-line-linux.html | |
https://gist.github.com/jedisct1/e63d46822b9d95fe6702 | |
http://www.exploresecurity.com/wp-content/uploads/custom/SSL_manual_cheatsheet.html | |
http://blog.tadaweb.com/2014/08/how-to-find-not-so-secret-documents-with-search-engines/ | |
http://blog.dornea.nu/2014/08/21/howto-debug-android-apks-with-eclipse-and-ddms/ | |
http://h30499.www3.hp.com/t5/Fortify-Application-Security/The-BREACH-attack-explained/ba-p/6605030 | |
https://konklone.com/post/why-google-is-hurrying-the-web-to-kill-sha-1 | |
http://www.skfu.xxx/2014/09/ps4-state-of-things-part-i-titleids.html | |
https://medium.com/@tareksiddiki/story-of-a-beg-bounty-hunter-e9a1f58ddf9e | |
http://fuzzinginfo.files.wordpress.com/2012/05/ben_nagy_how_to_fail_at_fuzzing.pdf | |
https://code.google.com/p/corkami/source/detail?r=1906 | |
https://hufman.github.io/stories/bmwconnectedapps | |
http://bit.ly/2GiohNo (+) | |
http://bit.ly/37kXXxT (+) | |
https://decoder.cloud/2020/01/20/from-hyper-v-admin-to-system/ | |
https://gist.github.com/nstarke/a611a19aab433555e91c656fe1f030a9 | |
http://bit.ly/38AguGU (+) | |
https://www.ayrx.me/analyzing-kony-mobile-applications | |
https://posts.specterops.io/mimidrv-in-depth-4d273d19e148 | |
https://0xsha.io/posts/mass-exploitation-hunting-while-sleeping | |
https://securitylab.github.com/research/chromium-ipc-vulnerabilities | |
https://penthertz.com/blog/testing-LoRa-with-SDR-and-handy-tools.html | |
https://sidechannel.tempestsi.com/the-cypher-injection-saga-9698d19bed4 | |
https://web-in-security.blogspot.com/2020/01/cve-2020-2655-jsse-client.html | |
http://bit.ly/2tJ0ROo (+) | |
https://www.perimeterx.com/blog/analyzing_magecart_malware_from_zero_to_hero/# | |
https://trmm.net/Charliewatch | |
http://bit.ly/30SbdYr (+) | |
https://lapcatsoftware.com/articles/Safari-runs-disabled-extensions.html | |
https://nathandavison.com/blog/exploiting-email-address-parsing-with-aws-ses | |
https://hackerone.com/reports/759247 | |
https://rderik.com/blog/using-lldb-for-reverse-engineering/ | |
https://hacker.house/lab/windows-defender-bypassing-for-meterpreter/ | |
http://bit.ly/2uOWK3r (+) | |
https://www.crummie5.club/pwning-a-pwned-citrix/ | |
https://www.onsecurity.co.uk/blog/abusing-kerberos-from-linux | |
http://bit.ly/38XUNRn (+) | |
https://insert-script.blogspot.com/2020/01/internet-explorer-mhtml-why-you-should.html | |
http://bit.ly/3aT2ObT (+) | |
https://blog.gypsyengineer.com/en/security/cve-2020-1925-ssrf-in-apache-olingo.html | |
https://medium.com/@maxi./finding-and-exploiting-cve-2018-7445-f3103f163cc1 | |
https://posts.specterops.io/attacking-azure-azure-ad-and-introducing-powerzure-ca70b330511a | |
https://www.mdsec.co.uk/2020/01/deep-dive-to-citrix-adc-remote-code-execution-cve-2019-19781/ | |
https://littlegptracker.com/ | |
https://bad-radio.solutions/notes_nrf51822 | |
https://medium.com/@vmsp/blocking-your-adblocker-967d1c6e48f2 | |
http://bit.ly/2SmJ7Rn (+) | |
https://www.perimeterx.com/tech-blog/2020/whatsapp-fs-read-vuln-disclosure/ | |
https://techblog.mediaservice.net/2020/01/ok-google-bypass-the-authentication/ | |
https://www.n00py.io/2020/02/exploiting-ldap-server-null-bind/ | |
https://landgrey.me/blog/11/ | |
https://blog.assetnote.io/bug-bounty/2020/02/01/expanding-attack-surface-react-native/ | |
http://bit.ly/2GWYw5F (+) | |
https://blog.doyensec.com/2020/02/03/heap-exploit.html | |
http://bit.ly/31xKocu (+) | |
https://www.sudo.ws/alerts/pwfeedback.html | |
https://blog.kitor.pl/blog/avocent-ip-kvm-any-sip-hack | |
http://bit.ly/2GZpbij (+) | |
https://sandboxescaper.blogspot.com/2019/12/chasing-polar-bears-part-one.html | |
http://blog.ant0i.net/2020/02/down-rabbit-hole-of-harvested-personal.html | |
https://habr.com/en/post/486856/ | |
http://www.simonweckert.com/googlemapshacks.html | |
https://www.hackerhealth.net/ | |
https://medium.com/bugbountywriteup/haxing-minesweeper-e79ece9f5d16 | |
http://b.fl7.de/2014/09/amazon-stored-xss-book-metadata.html | |
http://blog.nativeflow.com/the-futex-vulnerability | |
http://cultofthedyingsun.wordpress.com/2014/09/12/death-by-magick-number-fingerprinting-kippo-2014/ | |
http://www.pugo.org/project/pshttpd/ | |
http://vicenteaguileradiaz.com/tools/ | |
http://www.nosqlmap.net/ | |
http://media.ccc.de/browse/conferences/mrmcd/mrmcd14/ | |
http://www.contextis.co.uk/resources/blog/hacking-canon-pixma-printers-doomed-encryption/ | |
https://www.youtube.com/playlist?list=PLmfJypsykTLVGqTWJMu4ybJPiew7PUkH2 | |
http://blog.spiderlabs.com/2014/09/leveraging-lfi-to-get-full-compromise-on-wordpress-sites.html | |
http://blog.opensecurityresearch.com/2014/09/hostapd-wpe-now-with-more-pwnage.html | |
http://insert-script.blogspot.co.at/2014/09/sitekiosk-breakout.html | |
http://dfir.org/?q=node/8/ | |
http://www.whited00r.com/ | |
http://pwnable.kr/ | |
http://pathonproject.com/zb/?5b343c33591c9cc9#Pc9t/zKg8zWJUNkqqvYhuuL7Lofz8PGTX7R3qat0i/8= | |
http://blog.binamuse.com/2014/09/coregraphics-memory-corruption.html | |
http://avlidienbrunn.se/angular.txt | |
https://erenyagdiran.github.io/I-was-just-asked-to-crack-a-program-Part-1/ | |
https://code.google.com/p/miasm/ | |
http://breenmachine.blogspot.ca/2014/09/transfer-file-over-dns-in-windows-with.html | |
http://forensic.n0fate.com/?page_id=1180 | |
http://thehackernews.com/2014/09/hacking-ebay-accounts.html | |
http://www.cloudscan.me/2014/09/cve-2014-4406-apple-sa-2014-09-17-5-os.html | |
http://www.martinvigo.com/a-look-into-lastpass/ | |
https://blog.cloudflare.com/keyless-ssl-the-nitty-gritty-technical-details/ | |
http://countuponsecurity.com/2014/09/22/malicious-documents-pdf-analysis-in-5-steps/ | |
http://www.theamazingking.com/crypto.php | |
http://javahacker.com/a-javascript-challenge-for-nordic-js/ | |
https://gist.github.com/ethicalhack3r/cb06f575c6ba28644e9a | |
http://www.rafayhackingarticles.net/2014/10/a-tale-of-another-sop-bypass-in-android.html | |
http://hexed.it/ | |
http://lansec.net/project/scoutbot/ | |
http://marketplace.eclipse.org/content/contrast-eclipse | |
http://pastebin.com/VyMs3rRd | |
http://d.uijn.nl/?p=32 | |
http://marc.info/?l=qmail&m=141183309314366&w=2 | |
https://diablohorn.wordpress.com/2011/10/19/8009-the-forgotten-tomcat-port/ | |
http://opensecuritytraining.info/HTID.html | |
https://dnsleaktest.com/ | |
http://blog.cobaltstrike.com/2014/10/01/user-driven-attacks/ | |
https://shirt.codes/ | |
http://www.cs.bham.ac.uk/~exr/lectures/opsys/10_11/lectures/os-dev.pdf | |
http://www.righto.com/2014/09/mining-bitcoin-with-pencil-and-paper.html | |
http://www.futuresouth.us/yahoo_hacked.html | |
http://blog.valverde.me/2014/01/03/reverse-engineering-my-bank's-security-token | |
http://handleopenurl.com/scheme | |
http://www.powershellmagazine.com/2014/10/03/building-netcat-with-powershell/ | |
http://www.irongeek.com/i.php?page=videos/derbycon4/mainlist | |
http://blog.logrhythm.com/security/do-you-trust-your-computer/ | |
http://www.cyrozap.com/2014/09/29/reversing-the-symantec-vip-access-provisioning-protocol/ | |
http://vagmour.eu/persistence-1/ | |
http://thejh.net/misc/website-terminal-copy-paste | |
http://nahamsec.com/2014/10/a-tale-of-2-yahoo-bug-bounty-reports/ | |
https://tosdr.org/ | |
http://q.viva64.com/ | |
https://plus.google.com/+AlexisImperialLegrandGoogle/posts/gJDrVSuteUT | |
http://ceukelai.re/?p=11 | |
http://googleonlinesecurity.blogspot.pt/2014/10/this-poodle-bites-exploiting-ssl-30.html | |
http://www.bsk-consulting.de/2014/10/04/smart-dll-execution-malware-analysis-sandbox-systems/ | |
http://seclists.org/fulldisclosure/2014/Oct/53 | |
https://www.drupal.org/SA-CORE-2014-005 | |
http://securityaffairs.co/wordpress/29104/hacking/authentication-vulnerability-paypal-mobile.html | |
http://blog.toft.io/exploiting-unsecure-web-servers-with-svn-directories/ | |
http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Hacking-my-smart-TV-an-old-new-thing/ba-p/6645844 | |
http://www.appliednsm.com/introducing-flowbat/ | |
http://conference.hitb.org/hitbsecconf2014kul/materials/ | |
https://sysforensics.org/2014/10/forensics-in-the-amazon-cloud-ec2.html | |
http://applidium.com/en/news/hacking_the_navigo/ | |
https://www.securusglobal.com/community/2014/10/13/bypassing-wafs-with-svg/ | |
https://gist.github.com/anonymous/64ba9e34a018ebd86f70 | |
http://openideals.com/2014/10/13/linux-commands-for-bluetooth-namespace-messaging/ | |
http://www.websecuritylog.com/2014/10/facebook--bug-bounty.html | |
http://brutelogic.wordpress.com/2014/10/14/an-ssh-short-story-hack/ | |
http://blog.detectify.com/post/100600514143/hostile-subdomain-takeover-using-heroku-github-desk | |
https://corkami.googlecode.com/svn/trunk/src/angecryption/ | |
https://dutzi.github.io/tamper/ | |
http://cyberarms.wordpress.com/2014/10/16/mana-tutorial-the-intelligent-rogue-wi-fi-router/ | |
http://digital-forensics.sans.org/community/downloads | |
http://www.roe.ch/SSLsplit | |
http://www.agarri.fr/blog/ | |
https://ruxcon.org.au/slides/ | |
https://ruxconbreakpoint.com/slides/ | |
http://securityaffairs.co/wordpress/29302/hacking/serious-flaw-addthis.html | |
https://blog.prakharprasad.com/2014/10/hackerone-vulnerability-common-response.html | |
http://www.securitysift.com/passive-reconnaissance/ | |
http://cylonjs.com/ | |
https://amp.twimg.com/v/7cb46f6d-9589-43c1-9ac9-3ac1ab697413 | |
https://dhowe.github.io/AdNauseam/ | |
http://blog.dornea.nu/2014/09/17/generate-all-ip-addresses-from-asn/ | |
http://www.sectechno.com/2014/10/26/balbuzard-malware-analysis-tool/ | |
https://www.apple.com/privacy/docs/iOS_Security_Guide_Oct_2014.pdf | |
http://blog.dornea.nu/2014/07/07/disect-android-apks-like-a-pro-static-code-analysis/ | |
http://blog.infobytesec.com/2014/10/abusing-dialog-for-fun-and-profit.html | |
http://www.net-security.org/insecure-archive.php | |
http://n0where.net/how-to-iptables-firewall/ | |
http://rationallyparanoid.com/articles/diskless-ssh-honeypot-alpine-linux.html | |
http://ezprompt.net/ | |
http://packetlife.net/library/cheat-sheets/ | |
https://security.stackexchange.com/questions/56181/hack-into-a-computer-through-mac-and-ip-address | |
http://blog.it-securityguard.com/bugbounty-the-5000-google-xss/ | |
http://iamajin.blogspot.in/2014/11/when-gifs-serve-javascript.html | |
http://features.jsomers.net/how-i-reverse-engineered-google-docs/ | |
https://code.facebook.com/posts/844436395567983/introducing-osquery/ | |
http://edge-security.blogspot.com.es/2014/10/wfuzz-21-released.html | |
http://cultofthedyingsun.wordpress.com/2014/11/01/antivirus-evading-executable-and-post-exploitation-with-the-veil-evasion-framework-and-metasploit/ | |
https://www.sektioneins.de/en/blog/14-11-03-drupal-sql-injection-vulnerability-PoC.html | |
http://digi.ninja/projects/http_traceroute.php | |
http://blog.badtrace.com/post/how-i-got-a-root-shell-in-my-nas-0day-inside/ | |
https://medium.com/@oleavr/anatomy-of-a-code-tracer-b081aadb0df8 | |
https://community.rapid7.com/community/metasploit/blog/2014/10/28/r7-2014-15-gnu-wget-ftp-symlink-arbitrary-filesystem-access | |
http://cyber.bgu.ac.il/content/how-leak-sensitive-data-isolated-computer-air-gap-near-mobile-phone-airhopper | |
http://randomthoughts.greyhats.it/2014/10/osx-local-privilege-escalation.html | |
http://acez.re/ps-vita-level-1-webkitties-3/ | |
https://timtaubert.de/blog/2014/10/http-public-key-pinning-explained/ | |
http://crimsonglow.ca/~kjiwa/x86-dos-boot-sector-in-c.html | |
http://www.hydrantlabs.org/Security/Google/Chrome/ | |
http://blog.noobroot.com/2014/02/owncloud-600a-when-xss-vulnerability.html | |
http://gacksecurity.blogspot.co.uk/2014/02/beef-and-armitage-get-married.html | |
http://forum.yubico.com/viewtopic.php?f=26&t=1171 | |
http://blackhatlibrary.net/Azazel | |
http://blog.sucuri.net/2014/02/php-backdoors-hidden-with-clever-use-of-extract-function.html | |
http://www.devttys0.com/2014/02/wrt120n-fprintf-stack-overflow/ | |
http://www.sjdjweis.com/linux/proxyarp/ | |
https://hackerone.com/reports/1356 | |
http://vagosec.org/2014/02/google-drive-clickjacking-vulnerability/ | |
http://www.tripwire.com/state-of-security/vulnerability-management/creating-iphone-rootkits-and-like-the-nsas-dropout-jeep/ | |
https://community.rapid7.com/community/metasploit/blog/2014/02/18/lets-talk-about-your-security-breach-with-metasploit-literally | |
http://grahamcluley.com/2014/02/passwords-leaked-live-tv-flood-emergency/ | |
https://www.youtube.com/watch?v=VggwVuboLoo | |
http://www.zerodayclothing.com/ | |
http://packetstormsecurity.com/files/129081/VL-936.txt | |
https://labs.integrity.pt/articles/from-0-day-to-exploit-buffer-overflow-in-belkin-n750-cve-2014-1635/ | |
https://mozilla.github.io/server-side-tls/ssl-config-generator/ | |
http://decalage.info/vba_tools | |
http://sourceforge.net/projects/justniffer/ | |
http://www.irongeek.com/xss-sql-injection-fuzzing-barcode-generator.php | |
http://ferdogan.net/PDF-Malware-Analiz-Teknikleri/ | |
https://www.paloaltonetworks.com/content/dam/paloaltonetworks-com/en_US/assets/pdf/reports/Unit_42/unit42-wirelurker.pdf | |
http://argus-sec.com/blog/remote-attack-aftermarket-telematics-service/ | |
http://tyranidslair.blogspot.co.uk/2014/11/whens-documenturl-not-documenturl-cve.html | |
https://opensource.srlabs.de/projects/badusb | |
http://forensicsfromthesausagefactory.blogspot.ae/2014/11/imaging-drives-protected-with-apple.html | |
http://tonyarcieri.com/cream-the-scary-ssl-attack-youve-probably-never-heard-of | |
http://nethack4.org/blog/building-c.html | |
http://lcamtuf.blogspot.pt/2014/11/pulling-jpegs-out-of-thin-air.html | |
http://www.fredericb.info/2014/11/exploitation-of-philips-smart-tv.html | |
http://sijmen.ruwhof.net/weblog/256-cross-site-scripting-in-millions-of-web-sites | |
http://www.fruitywifi.com/ | |
http://www.procdot.com/index.htm | |
https://wireedit.com | |
http://forensic.n0fate.com/tools/chainbreaker/ | |
https://www.jssec.org/dl/android_securecoding_en_20140701.pdf | |
http://huaweihg612hacking.wordpress.com/2012/11/07/jtaging-the-broadcom-bcm6368-hg612/ | |
http://bartblaze.blogspot.pt/2014/11/malware-spreading-via-steam-chat.html | |
https://www.trustedsec.com/november-2014/meterssh-meterpreter-ssh/ | |
http://www.swordsec.com/download/20FantasticKaliLinuxTools.pdf | |
http://blog.h3xstream.com/2014/11/remote-code-execution-by-design.html | |
http://2014.zeronights.org/conference-materials.html | |
http://xmodulo.com/access-linux-command-cheat-sheets-command-line.html | |
http://www.openvim.com/tutorial.html | |
http://www.coalfire.com/The-Coalfire-Blog/November-2014/Reverse-Shells-and-Your-Car | |
https://opensoc.github.io/ | |
https://bitbucket.org/al14s/rawr/wiki/Home | |
http://hasherezade.net/IAT_patcher/ | |
http://goo.gl/AkU519 (+) | |
http://webstersprodigy.net/2014/11/19/use-after-free-exploits-for-humans-part-1-exploiting-ms13-080-on-ie8-winxpsp3/ | |
http://smealum.net/ninjhax/ | |
http://klikki.fi/adv/wordpress.html | |
http://tyranidslair.blogspot.co.uk/2014/11/stupid-is-as-stupid-does-when-it-comes.html | |
http://www.nosuchcon.org/talks/2014/ | |
https://www.youtube.com/user/unixfreaxjp/videos | |
http://unibios.free.fr/cdsystem.html | |
http://screeps.com/ | |
http://mtayseer.net/2014/11/06/your-python-smells-like-java/ | |
http://googleonlinesecurity.blogspot.pt/2014/12/are-you-robot-introducing-no-captcha.html | |
http://www.anandprakash.pw/search/label/bug%20bounty | |
http://securityaffairs.co/wordpress/30755/hacking/hacking-paypal-account-poc.html | |
http://www.labofapenetrationtester.com/2014/11/powershell-for-client-side-attacks.html | |
https://pacsec.jp/psj14archive.html | |
http://blog.fox-it.com/2014/11/18/cryptophp-analysis-of-a-hidden-threat-inside-popular-content-management-systems/ | |
http://www.behindthefirewalls.com/2014/12/cve-2014-9016-and-cve-2014-9034-PoC.html | |
https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-011/-entrypass-n5200-credentials-disclosure | |
http://farlight.org/ | |
http://wafbypass.me/w/index.php/Main_Page | |
http://www.qemu-advent-calendar.org/ | |
http://pdos.csail.mit.edu/scigen/ | |
http://blog.dewhurstsecurity.com/2014/12/09/how-i-hacked-facebook.html | |
http://josipfranjkovic.blogspot.pt/ | |
https://gist.github.com/worawit/84ab41358b8465966224 | |
http://cxsecurity.com/issue/WLB-2014120030 | |
https://securityreliks.wordpress.com/2010/08/20/devtcp-as-a-weapon/ | |
http://desowin.org/usbpcap/tour.html | |
http://cybersecurity.upv.es/attacks/offset2lib/offset2lib.html | |
http://securityintelligence.com/spoofedme-social-login-attack-discovered-by-ibm-x-force-researchers/ | |
https://evil32.com/ | |
http://pen-testing.sans.org/blog/pen-testing/2014/12/04/cross-site-scripting-through-file-metedata | |
http://samiux.blogspot.pt/2014/12/howto-arpon-on-kali-linux-109a.html | |
https://forsec.nl/2014/12/reading-outlook-using-metasploit/ | |
http://h30499.www3.hp.com/t5/Fortify-Application-Security/Leveraging-SimpleHTTPServer-as-a-Simple-Web-Honeypot/ba-p/6682905 | |
http://www.jfedor.org/aaquake2/ | |
http://alexnisnevich.github.io/untrusted/ | |
http://researchcenter.paloaltonetworks.com/2014/12/google-chrome-exploitation-case-study/ | |
https://blog.gaborszathmari.me/2014/12/10/wordpress-exploitation-with-xss/ | |
http://securityaffairs.co/wordpress/31120/hacking/fixed-critical-flaw-blogger-allows-write-posts-blog.html | |
http://morris.guru/detecting-kippo-ssh-honeypots/ | |
http://briskinfosec.blogspot.in/2014/12/reverce-shells-for-exploit-command.html?m=1 | |
http://www.cipherdyne.org/blog/2014/12/ram-disks-and-saving-your-ssd-from-afl-fuzzing.html | |
http://homakov.blogspot.gr/2014/11/hacking-file-uploaders-with-race.html | |
https://blog.whitehatsec.com/hackerkast-11-bonus-round/ | |
http://blog.opensecurityresearch.com/2012/02/json-csrf-with-parameter-padding.html | |
http://dogber1.blogspot.fr/2009/05/table-of-reverse-engineered-bios.html | |
http://insert-script.blogspot.co.at/2014/12/multiple-pdf-vulnerabilites-text-and.html | |
http://blog.malwaretracker.com/2014/12/cve-2014-4114cve-2014-6352-evade-av-by.html?spref=tw | |
http://robertheaton.com/2014/12/08/fun-with-your-friends-facebook-and-tinder-session-tokens/ | |
http://js1k.com/2014-dragons/demo/1854 | |
http://nathanfriend.io/inspirograph/ | |
http://git-blame.blogspot.pt/2014/12/git-1856-195-205-214-and-221-and.html | |
http://sintheticlabs.com/blog/a-look-inside-facebooks-source-code.html | |
http://hak-it.blogspot.pt/2014/12/stored-xss-on-facebook-and-twitter_18.html | |
http://pen-testing.sans.org/blog/pen-testing/2014/12/10/awkward-binary-file-transfers-with-cut-and-paste | |
http://hooked-on-mnemonics.blogspot.pt/p/injdmp.html | |
http://www.darknet.org.uk/2014/12/bluemaho-project-bluetooth-security-testing-suite/ | |
http://xgusix.com/blog/analyzing-a-malicious-excel-file-with-oledump-py/ | |
https://titanous.com/posts/docker-insecurity | |
http://lifeat.tetrane.com/2014/12/ie-crash-analysis.html | |
http://breenmachine.blogspot.gr/2014/12/raining-shells-ambari-0-day.html | |
https://securityblog.redhat.com/2014/12/10/analysis-of-the-cve-2013-6435-flaw-in-rpm/ | |
http://www.justanotherhacker.com/2011/12/writing-a-stealth-web-shell.html | |
http://web-in-security.blogspot.pt/2014/11/detecting-and-exploiting-xxe-in-saml.html | |
https://media.defcon.org/DEF%20CON%2022/DEF%20CON%2022%20video%20and%20slides/ | |
http://www.keurighack.com/ | |
https://www.druid.es/content/gopro-firmware-forensic | |
http://hackertyper.com/ | |
https://trmm.net/thunderstrike | |
http://attack-secure.com/hacked-facebook-word-document/ | |
http://mis.fortunecook.ie/ | |
http://www.signedness.org/tools/ | |
https://code.google.com/p/google-security-research/issues/detail?id=118 | |
http://www.wains.be/pub/networking/tcpdump_advanced_filters.txt | |
http://aluigi.altervista.org/mytoolz.htm | |
http://dnscrypt.org/ | |
http://khr0x40sh.wordpress.com/2014/06/10/moftastic_powershell/ | |
http://gkbrk.com/blog/read?name=reverse_engineering_the_speedtest_net_protocol | |
http://www.vanimpe.eu/2014/12/13/using-elk-dashboard-honeypots/ | |
http://blog.h3xstream.com/2014/12/predicting-struts-csrf-token-cve-2014.html | |
http://blog.xbc.nz/2014/12/lastpass-attempt-at-client-side-android.html | |
http://breenmachine.blogspot.gr/2014/12/mssql-mitm-ftw-ettercap-and-responder.html | |
https://blog.hboeck.de/archives/863-Dont-update-NTP-stop-using-it.html | |
https://bettercrypto.org/ | |
http://www.montulli.org/theoriginofthe%3Cblink%3Etag | |
http://www.its.caltech.edu/~costis/sgb_hack/ | |
https://stribika.github.io/2015/01/04/secure-secure-shell.html | |
https://code.google.com/p/usboblivion/ | |
https://endrift.com/mgba/2014/12/28/classic-nes/ | |
http://www.insinuator.net/2014/12/revisiting-an-old-friend-shell-globbing/ | |
https://blog.haschek.at/post/fd9bc | |
http://ednolo.alumnos.upv.es/?p=1883 | |
http://ednolo.alumnos.upv.es/papers/advisories/CVE-2015-0554_pirelli.txt | |
http://www.ifc0nfig.com/moonpig-vulnerability/ | |
https://hatriot.github.io/blog/2015/01/06/ntpdc-exploit/ | |
http://hackerschool.org/DefconCTF/17/B300.html | |
http://moviecode.tumblr.com/ | |
https://cmd.fm/ | |
http://habrahabr.ru/company/pt/blog/247709/ | |
http://zoczus.blogspot.de/2015/01/yammercom-same-origin-method-execution.html?spref=tw | |
http://rtwaysea.net/blog/blog-2013-10-18-long.html | |
http://michenriksen.com/blog/gitrob-putting-the-open-source-in-osint/ | |
http://seclist.us/inception-is-a-physical-memory-manipulation-and-hacking-tool-exploiting-pci-based-dma.html | |
http://networkfilter.blogspot.pt/2015/01/be-your-own-vpn-provider-with-openbsd.html | |
http://www.hexacorn.com/blog/2015/01/08/decompiling-compiled-autoit-scripts-64-bit-take-two/ | |
https://milo2012.wordpress.com/2015/01/08/proxy-tester-script/ | |
http://blog.sucuri.net/2015/01/website-backdoors-leverage-the-pastebin-service.html | |
https://blog.avast.com/2015/01/06/linux-ddos-trojan-hiding-itself-with-an-embedded-rootkit/ | |
http://web-in-security.blogspot.pt/2015/01/save-your-cloud-exploiting-eucalyptus.html?spref=tw | |
http://www.giac.org/paper/gpen/6684/aix-penetration-testers/125890 | |
http://randomthoughts.greyhats.it/2015/01/osx-bluetooth-lpe.html | |
http://www.shortbus.ninja/phishbait-scraping-the-web-for-email-addresses/ | |
http://smealum.net/?p=517 | |
http://blog.lse.epita.fr/articles/75-sstpinball.html | |
http://script-ed.org/?p=1671 | |
https://www.imperialviolet.org/2014/02/22/applebug.html | |
https://gist.github.com/joernchen/a7c031b6b8df5d5d0b61 | |
http://www.droidsec.org/news/2014/02/26/on-the-webview-addjsif-saga.html | |
http://lanmaster53.com/2013/07/multi-post-csrf/ | |
http://7h3ram.github.io/ | |
http://blog.cassidiancybersecurity.com/post/2014/02/Bitcrypt-broken | |
http://www.welivesecurity.com/2014/02/21/an-in-depth-analysis-of-linuxebury/ | |
http://bromiumlabs.files.wordpress.com/2014/02/bypassing-emet-4-1.pdf | |
http://recon.cx/2013/schedule/schedule.html | |
http://labs.bromium.com/2014/02/25/dissecting-the-newest-ie10-0-day-exploit-cve-2014-0322/ | |
http://r000t.com/who-hacked-ec-council/ | https://twitter.com/JamieCaitlin/status/438391518697512960 | |
http://www.w3.org/People/Raggett/book4/ch02.html | |
http://drops.wooyun.org/papers/4621#yjs_add_arg=9893 | |
http://breakingbits.net/2015/01/18/taking-over-godaddy-accounts-using-csrf | |
http://potatohatsecurity.tumblr.com/post/108756906604/admin-google-com-reflected-cross-site-scripting | |
http://omriher.blogspot.co.il/2015/01/captipper-malicious-http-traffic.html | |
http://www.hackwhackandsmack.com/?p=452 | |
http://www.labofapenetrationtester.com/2015/01/fun-with-dns-txt-records-and-powershell.html | |
http://blog.defragger.org/radare-max++.html | |
http://resources.infosecinstitute.com/intelligence-information-gathering-collecting-twitter-followers-25-lines-python/ | |
http://www.checkpoint.com/downloads/partners/TCC-Silverlight-Jan2015.pdf | |
http://sectooladdict.blogspot.co.il/2014/12/el-30-injection-java-is-getting-hacker.html | |
http://raidersec.blogspot.ca/2013/06/how-browsers-store-your-passwords-and.html | |
http://packetstormsecurity.com/files/122655/LIXIL-Satis-Toilet-Hard-Coded-Bluetooth-PIN.html | |
http://www.lofibucket.com/articles/oscilloscope_quake.html | |
http://chargen.matasano.com/chargen/2015/1/27/vulnerability-overview-ghost-cve-2015-0235.html | |
https://hackerone.com/reports/44146 | |
http://potatohatsecurity.tumblr.com/post/108197611404/yahoo-root-access-sql-injection-tw-yahoo-com | |
https://gitweb.torproject.org/user/jvoisin/mat.git | |
http://www.gironsec.com/blog/2015/01/owning_modems_and_routers_silently/ | |
https://forsec.nl/2015/01/bash-data-exfiltration-through-dns-using-bash-builtin-functions/ | |
http://securitycafe.ro/2014/12/19/how-to-intercept-traffic-from-java-applications/ | |
http://chichou.0ginr.com/blog/1023 | |
https://capsop.com/phpmyadmin | |
http://www.malwaretech.com/2015/01/using-kernel-rootkits-to-conceal.html | |
http://wouter.coekaerts.be/2015/resurrecting-phantomreference | |
https://fail0verflow.com/blog/2014/hubcap-chromecast-root-pt1.html (-root-pt2.html) | |
https://milo2012.wordpress.com/2015/01/09/pentesting-firebird-database/ | |
http://kukuruku.co/hub/infosec/backdoor-in-a-public-rsa-key | |
http://www.rfcreader.com/ | |
http://js-dos.com/ | |
http://innerht.ml/blog/ie-uxss.html | |
http://www.bulbsecurity.com/more-book-exercises-guessable-credentials-apache-tomcat/ | |
http://wiki.secarmour.com/2013/02/ssi-injection-attack.html | |
https://binjitsu.readthedocs.org/en/latest/ | |
http://0x00string.com/hacktionary/index.php?title=AllShare_Cast | |
http://securitycafe.ro/2015/01/05/understanding-php-object-injection/ | |
https://blog.netspi.com/advisory-xxe-injection-oracle-database-cve-2014-6577/ | |
http://www.davidlitchfield.com/Privilege_Escalation_via_Oracle_Indexes.pdf | |
http://h30499.www3.hp.com/t5/Fortify-Application-Security/Owning-SQLi-vulnerability-with-SQLmap/ba-p/6698577 | |
http://drops.wooyun.org/papers/4762 | |
http://keygenmusic.net/ | |
http://shipyourenemiesglitter.com/ | |
http://danlec.com/blog/hackerones-first-xss | |
http://zoczus.blogspot.pt/2015/02/evercookieswf-stored-cross-site.html | |
http://potatohatsecurity.tumblr.com/post/110024705384/google-com-mobile-feedback-url-redirect | |
http://samdmarshall.com/re.html | |
https://gitlab.maikel.pro/maikeldus/WhatsSpy-Public/wikis/home | |
https://net-ninja.net/article/2010/Oct/04/taking-control-of-a-jsp-environment/ | |
http://breakingmalware.com/vulnerabilities/one-bit-rule-bypassing-windows-10-protections-using-single-bit/ | |
https://www.checkmarx.com/2014/08/20/swift-security-issues/ | |
https://rateip.com/blog/sql-injections-in-mysql-limit-clause/ | |
http://adsecurity.org/?p=1275 | |
https://isc.sans.edu/forums/diary/Finding+Privilege+Escalation+Flaws+in+Linux/19207/ | |
http://labs.bromium.com/2015/02/02/exploiting-badiret-vulnerability-cve-2014-9322-linux-kernel-privilege-escalation/ | |
http://saijogeorge.com/css-puns/ | |
http://vanilla-js.com/ | |
http://danlec.com/blog/hacking-stackoverflow-com-s-html-sanitizer | |
http://philippeharewood.com/paging-cursors-leaking-data-in-graph-api/ | |
http://www.shellcheck.net/ | |
https://jimshaver.net/2015/02/11/decrypting-tls-browser-traffic-with-wireshark-the-easy-way/ | |
http://seclists.org/fulldisclosure/2015/Feb/56 | |
http://sourceforge.net/projects/packeth/ | |
http://shubh.am/exploiting-markdown-syntax-and-telescope-persistent-xss-through-markdown-cve-2014-5144/ | |
http://blog.sucuri.net/2015/02/creative-evasion-technique-against-website-firewalls.html | |
https://www.trustedsec.com/january-2015/account-hunting-invoke-tokenmanipulation/ | |
http://www.evilsocket.net/2015/01/29/nike-fuelband-se-ble-protocol-reversed/ | |
http://www.insinuator.net/2015/01/evasion-of-cisco-acls-by-abusing-ipv6-discussion-of-mitigation-techniques/ | |
https://rh0dev.github.io/blog/2015/fun-with-info-leaks/ | |
http://haxelion.eu/article/LD_NOT_PRELOADED_FOR_REAL/ | |
http://pixelscommander.com/en/javascript/nasa-coding-standarts-for-javascript-performance/ | |
https://littleosbook.github.io/ | |
http://jasminderpalsingh.info/single.php?p=84 | |
http://sekurak.pl/xss-w-domenie-www-google-com-postini-header-analyzer/ | |
http://www.7xter.com/2015/02/how-i-hacked-your-facebook-photos.html | |
http://blog.cobaltstrike.com/2015/02/25/my-favorite-powershell-post-exploitation-tools/ | |
http://infosec42.blogspot.de/2015/02/exploit-seagate-blackarmor-network.html | |
http://blog.secureideas.com/2015/02/adventures-in-ldap-injection-exploiting.html | |
http://s1gnalcha0s.com/node/2015/01/31/SSJS-webshell-injection.html | |
http://www.en.pentester.es/2015/02/from-case-insensitive-to-rce.html | |
http://www.proteansec.com/linux/installing-using-cuckoo-malware-analysis-sandbox/ | |
https://blogs.rsa.com/dns-poisoning-used-boleto-fraud/ | |
http://w00tsec.blogspot.pt/2015/02/firmware-forensics-diffs-timelines-elfs.html | |
http://www.vulnerability-lab.com/get_content.php?id=1432 | |
http://xmodulo.com/presentation-command-line-linux.html | |
http://twitterbiogenerator.com/ | |
https://beyondbinary.io/advisory/seagate-nas-rce/ | |
https://www.smacktls.com/#freak | |
http://thorly.batr.am/ | |
https://gist.github.com/worawit/33cc5534cb555a0b710b | |
http://blog.rootshell.be/2015/03/04/phpmoadmin-0-day-nmap-script/ | |
https://blog.whitehatsec.com/dnstest-monitor-your-dns-for-hijacking/ | |
https://samsclass.info/124/proj14/norton.htm | |
http://secureornot.blogspot.co.il/2015/03/gopro-update-mechanism-exposes-multiple.html | |
https://barrebas.github.io/blog/2015/02/22/maximum-overkill-two-from-format-string-vulnerability-to-remote-code-execution/ | |
http://securitycafe.ro/2015/02/23/bypassing-windows-lock-screen-via-flash-screensaver/ | |
http://www.xexexe.cz/2015/02/bruteforcing-tp-link-routers-with.html | |
http://www.vnsecurity.net/research/2015/02/12/msie-vuln-analysis.html | |
http://www.contextis.com/resources/blog/automating-removal-java-obfuscation/ | |
http://pixelambacht.nl/2015/sans-bullshit-sans/ | |
http://drops.wooyun.org/papers/5107 | |
https://hackerone.com/reports/48516 | |
http://sakurity.com/blog/2015/03/05/RECONNECT.html | |
https://manifestsecurity.com/appie/ | |
http://christian-schneider.net/ChromeSopBypassWithSvg.html | |
https://lqdc.github.io/making-finfisher-undetectable.html | |
https://www.nccgroup.com/media/481815/technical-advisory-multiple-vulnerabilities-in-mailenable.pdf | |
http://theelectronjungle.com/2015/02/15/use-after-free-in-vlc-2.1.x/ | |
http://w00tsec.blogspot.pt/2015/02/extracting-raw-pictures-from-memory.html | |
http://www.malwaretech.com/2014/04/coding-malware-for-fun-and-not-for.html | |
https://keboch.wordpress.com/2008/11/09/please-accept-this-spider-as-payment/ | |
https://gist.github.com/dchest/7225cf79c1ea2166489c | |
http://googleprojectzero.blogspot.pt/2015/03/exploiting-dram-rowhammer-bug-to-gain.html | |
http://www.7xter.com/2015/03/how-i-exposed-your-private-photos.html | |
http://nullsecurity.net/tools.html | |
http://www.securitysift.com/pecloak-py-an-experiment-in-av-evasion/ | |
http://www.pritect.net/blog/esc_sql-doh-wordpress-sql-injection-vulnerability | |
http://jumpespjump.blogspot.in/2013/01/making-usb-flash-drive-hw-trojan.html | |
http://secniche.blogspot.pt/2015/03/a-real-world-story-of-cve-2014-6332-rce.html | |
http://www.halfdog.net/Security/2015/HavingFunWithDmesg/ | |
http://0xthem.blogspot.gr/2015/03/hijacking-ssh-to-inject-port-forwards.html | |
http://securitycafe.ro/2015/01/28/intercepting-functions-from-statically-linked-libraries/ | |
http://www.hackersusethis.com/ | |
http://blog.nibblesec.org/2015/03/the-old-is-new-again-cve-2011-2461-is.html | |
http://sekurak.pl/kolejny-xss-w-www-google-com-custom-search-engine/ | |
http://netwars-project.com/webdoc | |
https://x-ryl669.github.io/Frost/ | |
https://mozillasecurity.github.io/dharma/ | |
http://breakingmalware.com/vulnerabilities/vulnerability-patching-learning-from-avg-on-doing-it-right/ | |
http://labs.detectify.com/post/114572572966/stealing-files-from-web-servers-by-exploiting-a | |
http://highon.coffee/blog/ssh-meterpreter-pivoting-techniques/ | |
http://www.security-explorations.com/en/SE-2014-02-details.html | |
http://carnal0wnage.attackresearch.com/2015/03/devooops-revision-control-git.html | |
http://ultimatehackingarticles.blogspot.pt/2013/01/error-based-sql-injection-tutorial.html | |
https://bughardy.me/a-ghost-tale/ | |
https://www.nccgroup.com/en/blog/2015/02/abusing-blu-ray-players-pt-1-sandbox-escapes/ | |
http://shrigley.com/source_code_archive/ | |
https://www.reddit.com/r/networking/comments/2gjzof/its_been_a_rough_week/ | |
http://blog.saynotolinux.com/2014/03/01/yahoos-pet-show-of-horrors-abusing-a-crossdomain-proxy-to-leak-a-users-email/ | |
http://www.jakoblell.com/blog/2013/10/30/real-world-csrf-attack-hijacks-dns-server-configuration-of-tp-link-routers-2/ | |
http://neocri.me/documentation/using-ssh-certificate-authentication/ | |
https://www.netspi.com/blog/entryid/220/dekrypto-padding-oracle-attack-against-ibm-websphere-commerce-cve-2013-05230 | |
http://pwnrules.com/yahoo-suggestions-vulnerability/ | |
http://www.reddit.com/r/apple/comments/1zh3gw/iphone_5s_continues_to_track_your_motion_even/ | |
http://packetstormsecurity.com/files/125442/Office-365-Account-Hijacking.html | |
http://www.netresec.com/?page=Blog&month=2013-10&post=Command-line-Forensics-of-hacked-PHP-net | |
http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Process-Introspection-with-Python/ba-p/6402821 | |
http://libgen.org/scimag/ | |
http://quals.sec.codebits.eu/cb/1487ab262e8deb6ec5b9dd49a18d8ac5a/ | |
http://danlec.com/blog/xss-via-a-spoofed-react-element | |
http://tomforb.es/dell-system-detect-rce-vulnerability | |
http://kamil.hism.ru/posts/about-vrg-and-delete-any-youtube-video-issue.html | |
http://blackarch.org/index.html | |
http://packetstormsecurity.com/files/131185/jbossjmx-exec.txt | |
http://shadow-file.blogspot.pt/2015/02/bowcaster-feature-multipartform-data.html | |
http://www.netresec.com/?page=Blog&month=2015-03&post=China%27s-Man-on-the-Side-Attack-on-GitHub | |
http://blog.lumberlabs.com/2012/04/why-app-developers-should-care-about.html | |
https://blog.netspi.com/all-you-need-is-one-a-clickonce-love-story/ | |
https://hsmr.cc/palinopsia/ | |
http://www.tuxmealux.net/2015/03/10/code-injection/ | |
http://h30499.www3.hp.com/t5/Fortify-Application-Security/XPATH-Assisted-XXE-Attacks/ba-p/6721576 | |
https://code.google.com/p/google-security-research/issues/detail?id=222 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1202858 | |
http://marcoramilli.blogspot.pt/2015/02/notorious-hacking-groups.html | |
http://www.mreagle0x.xyz/2015/01/the-tricky-vineco-xss-and-how-to-filter.html | |
http://nahamsec.com/lack-of-domain-verification-by-google/ | |
http://pouyadarabi.blogspot.pt/2015/03/facebook-bypass-ads-account-roles.html | |
http://www.parrotsec.org/ | |
http://nullonerror.org/2015/04/05/escondendo-informacoes-dentro-de-imagens/ | |
http://forum.xda-developers.com/android/development/guide-root-method-lg-devices-t3049772 | |
https://hackerone.com/reports/46916 | |
https://sploitfun.wordpress.com/ | |
http://smerity.com/articles/2015/amazon_information_leakage.html | |
https://www.reddit.com/r/netsec/comments/2xl412/abusing_rfc_5227_to_dos_windows_hosts/ | |
https://haiderm.com/column-truncation-sql-injection-vulnerability/ | |
http://www.websegura.net/advisories/facebook-rfd-and-open-file-upload/ | |
https://stackoverflow.com/questions/3115559/exploitable-php-functions | |
http://blog.loadzero.com/blog/tracking-down-a-segfault-in-grep/ | |
http://cachemonet.com/ | |
http://sixteencolors.net/ | |
https://dougvitale.wordpress.com/2011/12/21/deprecated-linux-networking-commands-and-their-replacements/ | |
http://intothesymmetry.blogspot.ch/2015/04/open-redirect-in-rfc6749-aka-oauth-20.html | |
https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/ | |
https://ma.ttias.be/remote-code-execution-via-http-request-in-iis-on-windows/ | |
http://www.openwall.com/lists/oss-security/2015/04/14/4 | |
https://blog.criticalstack.com/envdb-ask-your-environment-questions/ | |
http://blog.h3xstream.com/2015/04/crossdomainxml-beware-of-wildcards.html | |
http://0xdabbad00.com/2015/04/12/looking_for_security_trouble_spots_in_go_code/ | |
http://blog.maintenancewindow.ca/post/2015/03/29/Making-Smart-Locks-Smarter-%28aka.-Hacking-the-August-Smart-Lock%29 | |
http://niiconsulting.com/checkmate/2015/04/server-side-request-forgery-ssrf/ | |
http://www.labofapenetrationtester.com/2015/02/using-windows-screensaver-as-backdoor.html | |
http://beginners.re/ | |
http://sirdarckcat.blogspot.hk/2014/05/matryoshka-web-application-timing.html | |
http://blog.0x3a.com/post/110052845124/an-in-depth-analysis-of-the-fiesta-exploit-kit-an | |
http://8088mph.blogspot.pt/2015/04/cga-in-1024-colors-new-mode-illustrated.html | |
http://crpgaddict.blogspot.pt/2015/04/game-183-shadowforge-1989.html | |
http://visualgo.net/ | |
http://xn--mric-bpa.fr/blog/blackjack.html | |
https://miki.it/blog/2015/4/20/the-power-of-dns-rebinding-stealing-wifi-passwords-with-a-website/ | |
http://blog.innerht.ml/twitter-crlf-injection/ | |
https://binary.ninja/ | |
http://www.kitploit.com/2015/04/rekall-most-complete-memory-analysis.html | |
http://tfpwn.com/files/fd-wnr2000v4.txt | |
http://www.openwall.com/lists/oss-security/2015/04/22/12 | |
https://hashcat.net/misc/postgres-pth/postgres-pth.pdf | |
https://blog.netspi.com/playing-content-type-xxe-json-endpoints/ | |
http://bartblaze.blogspot.co.uk/2015/03/c99shell-not-dead.html | |
http://www.malcolmstagg.com/bdp-s390.html | |
http://v0ids3curity.blogspot.de/2015/04/exploiting-php-bug-66550-sqlite.html | |
https://reclaim-your-privacy.com/wiki/Anonabox_Analysis | |
http://www.s3cur1ty.de/node/687 | |
https://www.reddit.com/r/PHP/comments/1l7baq/creating_a_user_from_the_web_problem/ | |
http://blog.malerisch.net/2015/04/pwning-hp-thin-client.html | |
http://www.rafayhackingarticles.net/2015/04/sucuri-waf-xss-filter-bypass.html | |
http://klikki.fi/adv/wordpress2.html | |
http://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt | |
https://cisofy.com/lynis/ | |
http://www.paulosyibelo.com/2015/04/facebooks-parse-dom-xss.html | |
https://haiderm.com/oracle-sql-injection-guides-and-whitepapers/ | |
http://www.devttys0.com/2015/04/what-the-ridiculous-fuck-d-link/ | |
https://www.idontplaydarts.com/2011/11/decrypting-suhosin-sessions-and-cookies/ | |
http://www.secgeek.net/youtube-vulnerability/ | |
http://bobao.360.cn/learning/detail/357.html | |
https://chentiangemalc.wordpress.com/2015/04/17/patching-a-null-pointer-access-violation/ | |
http://www.floyd.ch/?p=584 | |
http://www.gameofhacks.com/ | |
http://feross.org/hacks/ahh-windows/ | |
http://blog.bentkowski.info/2015/05/xss-via-file-upload-wwwgooglecom.html | |
https://hackerone.com/reports/14883 | |
https://www.firefart.at/how-to-crack-mifare-classic-cards/ | |
https://blog.sucuri.net/2015/04/critical-persistent-xss-0day-in-wordpress.html | |
http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/ | |
http://malware-unplugged.blogspot.ie/2015/01/hunting-and-decrypting-communications.html | |
http://www.vulnerability-lab.com/get_content.php?id=1474 | |
http://synacktiv.ninja/ressources/synacktiv_drupal_xxe_services.pdf | |
http://blog.atx.name/reverse-engineering-radio-weather-station/ | |
https://drive.google.com/a/ase/folderview?id=0B2G2LjIu7WbdfjhaUmVzc1lCR2hUdk5fZllCOHdtbFItbU5qYzdqZGVxdmlnRkJyYVQ4VU0 | |
http://io.smashthestack.org/ | |
http://natmchugh.blogspot.co.uk/2015/05/how-to-make-two-binaries-with-same-md5.html | |
https://deya2diab.wordpress.com/2015/02/21/yahoo-main-domain-xss/ | |
http://seclist.us/poodle-attack-poc-implementation-of-the-poodle-attack.html | |
https://git.hacklab.kr/snippets/13 | |
https://bokken.re/ | |
https://blog.netspi.com/forcing-xxe-reflection-server-error-messages/ | |
http://blog.bentkowski.info/2015/04/xss-via-host-header-cse.html | |
http://hextechsecurity.com/?p=123 | |
http://blog.silentsignal.eu/2015/05/07/cve-2014-3440-symantec-critical-system-protection-remote-code-execution/ | |
http://www.viva64.com/en/a/0084/ | |
https://blog.cloudflare.com/an-introduction-to-javascript-based-ddos/ | |
http://blog.amossys.fr/Automated%20Reverse%20Engineering%20of%20Cryptographic%20Algorithms.html | |
http://www.windows93.net/ | |
http://code.snipcademy.com/tutorials/command-line/steak/cooking | |
https://weakdh.org/ | |
http://blog.bentkowski.info/2015/05/xss-via-windowstop-google-safen-up.html | |
https://dnsdumpster.com/ | |
http://www.contextis.com/resources/blog/manually-testing-ssltls-weaknesses/ | |
http://jumpespjump.blogspot.ca/2015/05/many-ways-of-malware-persistence-that.html | |
http://www.kazamiya.net/en/artifact/wipe/deletedsc | |
https://rya.nc/cert-tricks.html | |
http://security.cs.rpi.edu/courses/binexp-spring2015/ | |
http://blog.gdssecurity.com/labs/2015/4/29/automated-data-exfiltration-with-xxe.html | |
http://www.adlice.com/bho-a-spy-in-your-browser/ | |
https://drive.google.com/a/share/folderview?id=0B7rtSe_PH_fTWDQ0RC1DeWVoVUE&usp=sharing# | |
http://www.manuel-strehl.de/dev/minimal_git_folder | |
http://instantlyfuzzyshark.tumblr.com/post/119456076505/unauthorized-deletion-of-google-collections | |
http://sakurity.com/blog/2015/05/21/starbucks.html | |
http://www.benhayak.com/2015/05/stealing-private-photo-albums-from-Google.html | |
http://www.kitploit.com/2015/05/remote-dll-injector-v20-command-line.html | |
http://www.binvul.com/viewthread.php?tid=508 | |
http://ab0files.com/writing-a-metasploit-post-exploitation-module | |
http://www.backerstreet.com/rec/rec.htm | |
http://seclist.us/updates-windows-exploit-suggester-revision-v-2-5.html | |
http://www.pagerduty.com/blog/the-discovery-of-apache-zookeepers-poison-packet/ | |
http://sakurity.com/blog/2015/05/08/pusher.html | |
https://stackoff.ru/pochemu-reklama-v-skajpe-ne-tolko-urodliva-no-eshhe-i-opasna/ | |
http://securityinside.info/evitando-hsts-una-cuestion-de-tiempo/ | |
http://venom.crowdstrike.com/ | |
http://cory.li/bytecode-hacking/ | |
https://www.altsci.com/ipsec/ | |
https://blog.netspi.com/gpu-cracking-rebuilding-box/ | |
http://stacksmasher.me/tutorials/browser-anonymity-and-security/ | |
https://reverse.put.as/2015/05/29/the-empire-strikes-back-apple-how-your-mac-firmware-security-is-completely-broken/ | |
http://labs.detectify.com/post/120088174539/building-an-xss-polyglot-through-swf-and-csp | |
https://www.exploit-db.com/docs/35152.pdf | |
http://caca.zoy.org/wiki/zzuf | |
http://samy.pl/opensesame/ | |
http://hackerhurricane.blogspot.nl/2015/05/defending-against-powershell-shells.html | |
http://xn--thibaud-dya.fr/robots.txt.html | |
http://web-in-security.blogspot.de/2015/05/how-to-attack-xml-encryption-in-ibm.html | |
https://blog.whitehatsec.com/magic-hashes/ | |
http://blog.balicbilisim.com/gomulu-cihaz-guvenligi-ve-zollard-botnet-analizi/ | |
http://jaanuskp.blogspot.cz/2015/05/cve-2015-3200.html | |
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/1219337 | |
http://www.dimitrifourny.com/2014/03/08/how-i-have-fuzzed-php/ | |
http://pastebin.com/0EqWGmTi | |
http://linuxaria.com/howto/ssh-in-2-steps-on-linux-with-google-authenticator?lang=en | |
http://console-cowboys.blogspot.co.uk/2014/03/the-curious-case-of-ninjamonkeypiratela.html | |
http://bas.bosschert.nl/steal-whatsapp-database/ | |
https://code.google.com/p/chromium/issues/detail?id=240058 | |
http://zairon.wordpress.com/2014/03/06/obfuscated-shellcode-inside-a-malicious-rtf-document/ | |
http://www.palkeo.com/code/stealing-bitcoin.html | |
http://www.2uo.de/myths-about-urandom/ | |
http://0xa.li/php-date-is-xssable/ | |
https://intrepidusgroup.com/insight/2014/03/atv-password-log-bug/ | |
http://mreagle0x.blogspot.in/2014/03/how-can-i-get-your-facebook-account.html | |
https://bugzilla.mozilla.org/show_bug.cgi?id=949446 | |
https://labs.portcullis.co.uk/blog/raspberry-ph0wn/ | |
http://labs.detectify.com/post/120855545341/google-xss-turkey | |
http://topolik-at-work.blogspot.cz/2015/06/cve-2015-3096-rosetta-flash-fix-bypass.html | |
http://ddecode.com/phpdecoder/ | |
https://www.exploit-db.com/exploits/37098/ | |
https://cxsecurity.com/issue/WLB-2015050153 | |
http://blog.jpcert.or.jp/.s/2015/05/a-new-uac-bypass-method-that-dridex-uses.html | |
http://media.ccc.de/browse/conferences/camp1999/ | |
https://blog.coresecurity.com/2015/05/18/ms15-011-microsoft-windows-group-policy-real-exploitation-via-a-smb-mitm-attack/ | |
https://www.anfractuosity.com/projects/timeshifter/ | |
http://www.defenceindepth.net/2013/11/oracle-listener-11107-information.html | |
http://n0where.net/best-onion-links-deep-web/ | |
https://hackerone.com/reports/52042 | |
http://mksben.l0.cm/2015/06/bypassing-xss-filter-showmodaldialog.html | |
http://www.benhayak.com/2015/06/same-origin-method-execution-some.html | |
http://seclists.org/fulldisclosure/2015/May/122 | |
https://html5sec.org/cspbypass/ | |
https://forum.bugcrowd.com/t/sqlmap-tamper-scripts-sql-injection-and-waf-bypass/423 | |
http://cheeky4n6monkey.blogspot.pt/2015/06/extracting-pictures-from-ms-office-2007.html | |
http://www.shelliscoming.com/2015/06/tls-injector-running-shellcodes-through.html | |
https://benmmurphy.github.io/blog/2015/06/04/redis-eval-lua-sandbox-escape/ | |
http://0xdabbad00.com/2015/04/18/go_code_auditing/ | |
https://expdev-kiuhnm.rhcloud.com/2015/05/11/contents/ | |
https://blog.benjojo.co.uk/post/auditing-github-users-keys | |
http://security.coverity.com/blog/2015/Jun/a-slice-of-pie.html | |
http://www.patrick-wied.at/static/nudejs/ | |
http://jstnkndy.blogspot.pt/2015/06/a-fun-attack-path-starting-with-xxe.html | |
http://zoczus.blogspot.pt/2015/04/plupload-same-origin-method-execution.html | |
http://cybersyndicates.com/2015/06/sms-log-alert/ | |
https://gist.github.com/joernchen/d868521352f1ccd25095 | |
https://chloe.re/2015/06/20/a-month-with-badonions/ | |
https://yifan.lu/2015/06/21/hacking-the-ps-vita/ | |
https://blog.haschek.at/post/fd854 | |
http://blog.pangu.io/ie-uninit-memory/ | |
https://mborgerson.com/deconstructing-the-xbox-boot-rom | |
http://www.fuzzysecurity.com/tutorials/20.html | |
https://www.linkedin.com/pulse/cli-skype-roman-x-shafigullin | |
http://potatohatsecurity.tumblr.com/post/94565729529/defcon-22-badge-challenge-walkthrough | |
http://people.zoy.org/~sam/filsdepute.txt | |
http://thehackerblog.com/the-noscript-misnomer-why-should-i-trust-vjs-zendcdn-net/ | |
https://www.veracode.com/blog/2015/06/angularjs-expression-security-internals | |
http://joevennix.com/2015/06/24/Adventures-in-Browser-Exploitation-Part-II--Safari-8-UXSS.html | |
http://www.pc-help.org/obscure.htm | |
https://reverse.put.as/2015/07/01/reversing-prince-harmings-kiss-of-death/ | |
https://paragonie.com/blog/2015/06/preventing-xss-vulnerabilities-in-php-everything-you-need-know | |
http://vladz.devzero.fr/015_lsm-backdoor.html | |
http://nullsecure.org/threat-intel-web-crew/ | |
http://blog.mazinahmed.net/2015/06/facebook-messenger-multiple-csrf.html | |
http://blog.csnc.ch/2015/06/xslt-security-and-server-side-request-forgery/ | |
http://container-solutions.com/content/uploads/2015/06/15.06.15_DockerCheatSheet_A2.pdf | |
https://www.whitehatters.academy/hackfu-2015-badge-loyalty-system/ | |
http://drops.wooyun.org/papers/6905 | |
http://davidjorm.blogspot.pt/2015/07/101-ways-to-pwn-phone.html | |
https://hiddencodes.wordpress.com/2015/06/18/deobfuscate-javascript-using-phantomjs-headless-browser/ | |
http://grimhacker.com/wordpress/2015/04/10/gp3finder-group-policy-preference-password-finder/ | |
http://blog.quarkslab.com/quarkslabs-chatsecure-review.html | |
https://www.exploitee.rs/index.php/Wink_Hub | |
https://djbunny5.com/2015/06/26/dns-amplification-attacks/ | |
https://truesecdev.wordpress.com/2015/07/01/exploiting-rootpipe-again/ | |
https://pierrekim.github.io/blog/2015-07-01-poc-with-RCE-against-127-iptime-router-models.html | |
https://blog.bugcrowd.com/advice-from-a-researcher-xxe/ | |
https://cellhack.net/login/ | |
http://blog.innerht.ml/cascading-style-scripting/ | |
https://thehackerblog.com/stealing-lastpass-passwords-with-clickjacking/ | |
http://www.firmware.re/ | |
http://www.mbsd.jp/Whitepaper/rpo.pdf | |
https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/ | |
http://gfragkos.blogspot.co.uk/2015/06/linkedin-security-issue-unvalidated.html | |
http://nahamsec.com/yahoo-image-processing-xspa/ | |
http://blog.tokumaru.org/2013/03/csrf-and-cookie-monster-bug.html | |
http://samsymons.com/blog/reverse-engineering-with-radare2-part-1/ | |
https://k0st.wordpress.com/2015/07/05/identifying-and-exploiting-rom-0-vulnerabilities/ | |
https://kr5hou2zh4qtebqk.onion.to/ezines/ | |
https://jonasnick.github.io/blog/2015/07/08/exploiting-csgojackpots-weak-rng/ | |
http://josipfranjkovic.blogspot.ru/2015/07/the-easiest-bug-bounties-i-have-ever-won.html | |
https://goo.gl/y17Bep | |
https://www.dropbox.com/s/sax2a5fm3z3q2nt/iChainbreaker_OSX.zip?dl=0 | |
https://localh0t.github.io/wildpwn-v0.1-unix-wildcard-attacks/ | |
https://www.offensivebits.com/?p=89 | |
https://zeltser.com/c2-dns-tunneling/ | |
http://blog.ghettoha.xxx/reversing-powersaves-for-amiibo | |
https://defuse.ca/bochs-hacking-guide.htm | |
http://blog.cr4.sh/2015/07/building-reliable-smm-backdoor-for-uefi.html | |
https://www.securify.nl/blog/SFY20150601/securify_spot_the_bug_challenge_2015_contest_analysis.html | |
https://thejh.net/written-stuff/openssh-6.8-xsecurity | |
http://www.contextis.com/resources/blog/dnswatch-when-full-dns-tunnel-just-too-much/ | |
http://noone.org/talks/ssh-tricks/ssh-tricks-rmll.html | |
http://0x27.me/HackBack/0x00.txt | |
http://emulator101.com/ | |
http://blog.ptsecurity.com/2015/07/best-reverser-write-up-analyzing.html | |
https://k0st.wordpress.com/2012/10/23/rip-or-pillage-dvcs-story-about-git/ | |
http://www.sac.sk/files.php?d=7 | |
http://0x90909090.blogspot.fr/2015/07/no-one-expect-command-execution.html | |
https://k0st.wordpress.com/2015/07/13/identifying-and-exploiting-ibm-websphere-application-server/ | |
http://www.sleuthkit.org/autopsy/ | |
https://securityblog.redhat.com/2015/07/23/libuser-vulnerabilities/ | |
http://seclists.org/fulldisclosure/2015/Jul/11 | |
http://labs.bromium.com/2015/07/10/government-grade-malware-a-look-at-hackingteams-rat/ | |
https://fuzzing-project.org/tutorial-cflags.html | |
https://frederik-braun.com/using-subresource-integrity.html | |
https://blogs.securiteam.com/index.php/archives/2502 | |
https://www.sektioneins.de/en/blog/15-07-07-dyld_print_to_file_lpe.html | |
https://digital-forensics.sans.org/community/summits | |
http://overthewire.org/wargames/ | |
http://www.nopwn.com/ | |
https://fin1te.net/articles/messenger-site-wide-csrf/ | |
http://blog.portswigger.net/2015/08/server-side-template-injection.html | |
http://labs.detectify.com/post/125256364141/how-i-disabled-your-chrome-security-extensions | |
https://gist.github.com/Wack0/bcc5a196f0874a39b08f | |
http://pastebin.com/raw.php?i=6fcdqfbd | |
https://sturmflut.github.io/ubuntu/touch/2015/05/07/hacking-ubuntu-touch-index/ | |
http://cr.yp.to/djbdns/notes.html | |
http://www.rc4nomore.com/ | |
http://www.contextis.com/resources/blog/wireless-phishing-captive-portals/ | |
http://mihai.bazon.net/blog/externalinterface-is-unreliable | |
http://www.anti-reversing.com/1813/ | |
http://blog.cobaltstrike.com/2015/07/22/winrm-is-my-remote-access-tool/ | |
http://x42.obscurechannel.com/2015/07/26/cracking-the-roku-v2-wpa2-psk/ | |
https://hackerone.com/reports/58679 | |
https://paul.reviews/behavioral-profiling-the-password-you-cant-change/ | |
http://silentbreaksecurity.com/exploiting-ms15-076-cve-2015-2370/ | |
http://www.ehacking.net/2015/07/bypass-anti-virus-with-shellter-on-kali.html | |
http://www.cyberciti.biz/faq/apple-mac-osx-find-wi-fi-network-password/ | |
https://cymon.io/ | |
https://jve.linuxwall.info/blog/index.php?post/2015/07/26/Using-Mozilla-Investigator-%28MIG%29-to-detect-unknown-hosts | |
http://bugs.proftpd.org/show_bug.cgi?id=4143#c0 | |
http://pbiernat.blogspot.co.uk/2014/09/bypassing-python-sandbox-by-abusing.html | |
https://medium.com/@ValdikSS/detecting-vpn-and-its-configuration-and-proxy-users-on-the-server-side-1bcc59742413 | |
http://opengarages.org/handbook/2014_car_hackers_handbook_compressed.pdf | |
http://www.codeandux.com/writing-a-simple-decompiler-for-net-part-1/ | |
http://arxiv.org/pdf/1507.06955v1.pdf | |
https://blog.netspi.com/auto-dumping-domain-credentials-using-spns-powershell-remoting-and-mimikatz/ | |
https://xebialabs.com/periodic-table-of-devops-tools/ | |
https://www.youtube.com/watch?v=Jk5Yad598vs | |
https://plus.google.com/u/0/+AleksandrDobkin-Google/posts/JMwA7Y3RYzV | |
http://tinyhack.com/2014/03/12/implementing-a-web-server-in-a-single-printf-call/ | |
http://www.debasish.in/2014/03/in-memory-kernel-driverioctlfuzzing.html | |
http://capstone-engine.org/bot.html | |
http://www.scs.stanford.edu/brop/ | |
http://blog.didierstevens.com/2014/03/20/xorsearch-finding-embedded-executables/ | |
http://swfid.zz.mu/swfid | |
http://blog.includesecurity.com/2014/03/exploit-CVE-2014-0038-x32-recvmmsg-kernel-vulnerablity.html | |
http://blog.shubh.am/ssrf-is-dangerous/ | |
https://www.securusglobal.com/community/2014/03/17/how-i-got-root-with-sudo/ | |
http://blog.veracode.com/2014/03/introducing-the-ios-reverse-engineering-toolkit/ | |
http://sorting.at/ | |
https://gist.github.com/homakov/9383241 | |
http://sakurity.com/blog/2015/08/13/middlekit.html | |
http://x42.obscurechannel.com/2015/08/14/netripper_metasploit/ | |
http://blog.gojhonny.com/2015/08/domain-administrator-in-17-seconds.html | |
http://jpinsoft.net/DeepSound/Documentation.aspx | |
https://sysexit.wordpress.com/2015/07/29/bypassing-the-windows-8-1-picture-password-feature-with-a-kernel-debugger/ | |
http://codewhitesec.blogspot.in/2015/07/symantec-endpoint-protection.html?m=1 | |
https://gun.io/blog/building-a-twitterbot-in-node-to-post-xss-payloads/ | |
http://baileysoriginalirishtech.blogspot.pt/2015/06/applocker-schmapplocker.html | |
http://noxxi.de/research/sophos-utm-webprotection-bypass2.html | |
http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_034_Lukas_Java.pdf | |
http://volatility-labs.blogspot.pt/2015/08/recovering-teamviewer-and-other.html | |
https://speakerdeck.com/ange/lets-write-a-pdf-file | |
https://www.exploit-db.com/exploits/37669/ | |
http://rotlogix.com/2015/08/23/exploiting-the-mercury-browser-for-android/ | |
http://vulnerabledoma.in/camp2015_sop/ | |
https://zyan.scripts.mit.edu/blog/backdooring-js/ | |
http://www.openwall.com/lists/oss-security/2015/08/04/8 | |
http://rossmarks.co.uk/blog/?p=609 | |
https://blog.netspi.com/powershell-remoting-cheatsheet/ | |
http://itsjack.cc/blog/2015/08/surveying-codecanyon-scripts-xss-lfi-sqli-more/ | |
http://3vildata.tumblr.com/post/125666311707/abusing-the-mpc-hc-webui-to-steal-private-pictures | |
http://antukh.com/blog/2015/08/22/dark-appsec/ | |
https://www.blackhat.com/docs/us-15/materials/us-15-Brossard-SMBv2-Sharing-More-Than-Just-Your-Files-wp.pdf | |
http://www.codereversing.com/blog/archives/261 | |
https://gbmaster.wordpress.com/2015/08/13/x86-exploitation-101-integer-overflow-adding-one-more-aaaaaaaaaaand-its-gone/ | |
https://blogs.securiteam.com/index.php/archives/2550 | |
https://dfir.it/blog/2015/07/18/toxic-pdf-walkthrough-bsides-london-challenge/ | |
http://metalcaptcha.heavygifts.com/ | |
http://www.7xter.com/2015/08/hacking-facebook-pages.html | |
https://www.youtube.com/watch?v=2Kw6VPlBz9w | |
https://labs.integrity.pt/articles/xxe-all-the-things-including-apple-ioss-office-viewer/ | |
https://pierrekim.github.io/advisories/2015-totolink-0x02.txt | |
https://gist.github.com/subTee/732330ebfeb5c63b1296 | |
https://gist.github.com/pakt/c70073a0e0de1f47f579 | |
http://seclists.org/fulldisclosure/2015/Aug/21 | |
https://blog.sucuri.net/2015/08/persistent-xss-vulnerability-in-wordpress-explained.html | |
https://www.gitbook.com/book/radare/radare2book/details | |
https://goo.gl/xgGGt4 | |
https://crowdshield.com/blog.php?name=reverse-engineering-a-critical-wordpress-0day-exploit | |
http://googleprojectzero.blogspot.de/2015/08/attacking-ecmascript-engines-with.html | |
http://blog.ropchain.com/2015/08/16/analysis-of-exploit-targeting-office-2007-2013-ms15-022/ | |
http://intothesymmetry.blogspot.it/2015/08/apple-safari-sop-bypass-cve-2015-3753.html | |
https://code.google.com/p/chromium/issues/detail?id=526293 | |
http://norvig.com/sudoku.html | |
http://www.sec-down.com/wordpress/?p=553 | |
https://www.bishopfox.com/blog/2015/08/coldfusion-bomb-a-chain-reaction-from-xss-to-rce/ | |
http://raz0r.name/articles/css-attacks/ | |
http://zx.rs/6/DroidDucky---Can-an-Android-quack-like-a-duck/ | |
http://www.intelligentexploit.com/view-details.html?id=21905 | |
https://gist.github.com/mattifestation/47f9e8a431f96a266522 | |
http://insecurety.net/?p=765 | |
http://www.malwaretech.com/2015/08/creating-ultimate-tor-virtual-network.html | |
http://blog.ioactive.com/2015/09/the-beauty-of-old-school-backdoors.html | |
http://www.hexacorn.com/blog/2015/08/15/two-pe-tools-you-might-have-never-heard-of-now-you-do/ | |
http://blog.crowdstrike.com/native-java-bytecode-debugging-without-source-code/ | |
https://gbmaster.wordpress.com/2015/08/03/x86-exploitation-101-off-by-one-and-an-uninvited-friend-joins-the-party/ | |
http://www.pentestpartners.com/blog/hacking-defcon-23s-iot-village-samsung-fridge/ | |
http://cybermashup.com/2015/08/25/how-to-crack-ubuntu-disk-encryption-and-passwords/ | |
http://translate.wooyun.io/2015/09/01/Bypass-WAF-Cookbook.html | |
https://hackerone.com/reports/77065 | |
http://dreamsofastone.blogspot.de/2015/07/reverse-engineering-nostalgia.html | |
http://www.filet-o-firewall.com/ | |
http://ownsecurity.blogspot.ro/2015/08/how-i-found-sweets-inside-google.html | |
https://warroom.securestate.com/index.php/spawning-shells-over-bluetooth/ | |
http://thehackerblog.com/sonar-a-framework-for-scanning-and-exploiting-internal-hosts-with-a-webpage/ | |
https://www.jkry.org/ouluhack/Toyota%20Touch%20%26%20Go | |
http://www.phrack.org/papers/self-patching-msxml.html | |
https://cturt.github.io/ps4.html | |
https://tinyurl.com/pv868t6 | |
http://blog.cryptographyengineering.com/2015/09/lets-talk-about-imessage-again.html | |
http://trainwatch.u0d.de/ | |
https://oreoshake.github.io/xss/rce/bugbounty/2015/09/08/xss-to-rce.html | |
http://mohamedmfouad.blogspot.pt/2015/09/starbucks-critical-flaws-allow-hackers.html | |
http://goo.gl/MKvt4p | |
https://isc.sans.edu/diary/PDF+%2B+maldoc1+%3D+maldoc2/20079 | |
https://gist.github.com/atcuno/3425484ac5cce5298932 | |
http://nullsecure.org/building-your-own-passivedns-feed/ | |
http://l.avala.mp/blog/pwnage-per-port-22opentcpssh/ | |
http://drops.wooyun.org/papers/8298 | |
http://wololo.net/2015/09/22/exploit-psx-games-psp-vita/ | |
https://www.lucidchart.com/techblog/2015/08/31/the-worst-mistake-of-computer-science/ | |
https://goo.gl/Dk0Iin (+) | |
https://xem.github.io/hex/ | |
http://www.linusakesson.net/programming/tty/ | |
https://ucnv.github.io/pnglitch/ | |
http://ashishpadelkar.com/index.php/2015/09/23/facebook-simple-technical-bug-worth-7500/ | |
http://g-laurent.blogspot.pt/2015/09/demistifying-responder-wpad.html | |
http://alex.hyperiongray.com/posts/302352-pwn-the-docs | |
http://sourceforge.net/projects/exploitresolver/ | |
http://www.thijsbroenink.com/2015/08/bruteforcing-coupon-codes-for-discount.html | |
https://gist.github.com/subTee/28b7439d3dfa07053b61 | |
https://gist.github.com/colinmahns/e3c38c5eae6c4bf6441d | |
http://theta44.org/karma/ | |
http://drops.wooyun.org/papers/8261 | |
http://www.securitygalore.com/site3/safari-pasv | |
http://blog.perimeterx.com/bugzilla-cve-2015-4499 | |
https://docs.google.com/document/d/1v1TkWZtrhzRLy0bYXBcdLUedXGb9njTNIJXa3u9akHM/edit?pli=1# | |
http://d.hatena.ne.jp/end0tknr/20150830/1440885918 | |
https://www.rcesecurity.com/2015/09/cve-2014-7216-a-journey-through-yahoos-bug-bounty-program/ | |
https://goo.gl/0fcbEB | |
http://sijmen.ruwhof.net/weblog/584-how-i-could-hack-internet-bank-accounts-of-danish-largest-bank-in-a-few-minutes | |
https://security.bugs.gallery | |
http://www.sw1tch.net/blog/gone-kingphishin-part-1-kingphisher-beef-digital-ocean-kali | |
https://gist.github.com/wirehack7/fccc32806221c4c803dd | |
https://testssl.sh/ | |
http://dangerousprototypes.com/2015/09/08/a-xsvf-assemblerdisassembler-in-python/ | |
http://www.room362.com/2012/02/ms08068-ms10046-fun-until-2018.html | |
http://www.bigendiansmalls.com/mainframe-bind-shell-source-code/ | |
https://www.davidsopas.com/acunetix-got-rfded/ | |
http://lucb1e.com/rp/cookielesscookies/ | |
https://www.rapid7.com/docs/Hacking-IoT-A-Case-Study-on-Baby-Monitor-Exposures-and-Vulnerabilities.pdf | |
http://conorpp.com/blog/proxying-bluetooth-devices-for-security-analysis-using-btproxy/ | |
https://www.notsosecure.com/2015/09/24/remote-code-execution-via-php-unserialize/ | |
https://dfirblog.wordpress.com/2015/09/27/dissecting-powershell-attacks/ | |
http://www.sekoia.fr/blog/malware-and-com-object-the-paradise-of-covert-channels/ | |
https://blog.coresecurity.com/2015/09/28/abusing-gdi-for-ring0-exploit-primitives/ | |
http://www.clicktorelease.com/blog/svg-google-logo-in-305-bytes | |
http://www.leakedin.com/ | |
https://www.mdsec.co.uk/2015/09/an-introduction-to-hardware-hacking-the-ripe-atlas-probe/ | |
https://www.davidsopas.com/reflected-file-download-cheat-sheet/ | |
https://inventropy.us/blog/constructing-an-xss-vector-using-no-letters | |
http://subt0x10.blogspot.pt/2015/09/simple-example-of-encoded-mimikatz-upx.html | |
https://gist.github.com/mak/bd71962aae98ab0b0441 | |
http://www.malwarefieldguide.com/LinuxChapter2.html | |
https://williammahler.github.io/Capstone.js-bookmarklet/ | |
https://www.fabionatalucci.it/individuate-vulnerabilita-su-ilmessaggero-it-full-disclosure/ | |
http://blog.dornea.nu/2015/10/02/manage-pki-using-openssl/ | |
https://blog.perimeterx.com/bugzilla-cve-2015-4499/ | |
http://blog.silentsignal.eu/2014/07/28/how-to-got-root-access-on-fireeye-os/ | |
http://andreicostin.com/secadv/HP_MIPIO_backdoor.txt | |
https://shubh.am/exploiting-url-shortners-to-discover-sensitive-resources-2/ | |
https://quequero.org/2015/09/black-hat-arsenal-peepdf-challenge-2015-writeup/ | |
https://www.sysdream.com/exploiting-symfony2-profiler | |
https://bwall.github.io/libemu-scapy-for-shellcode-on-the-network/ | |
http://www.sekoia.fr/blog/when-a-brazilian-string-smells-bad/ | |
https://hackertarget.com/hacker-tools-mr-robot/ | |
https://www.nowsecure.com/blog/2015/08/17/raspberry-pi-hang-instruction/ | |
http://blog.naver.com/1n73ction/220499561862 | |
https://www.synack.com/labs/blog/how-i-hacked-hotmail/ | |
https://pierrekim.github.io/blog/2015-10-07-Huawei-routers-vulnerable-to-multiple-threats.html | |
http://wroot.org/posts/babadook-connection-less-powershell-persistent-and-resilient-backdoor/ | |
https://www.mdsec.co.uk/2015/10/vulnerability-in-sed-systems-decimator-d3/ | |
http://cynosureprime.blogspot.pt/2015/09/how-we-cracked-millions-of-ashley.html | |
http://mazinahmed.net/uploads/Evading%20All%20Web-Application%20Firewalls%20XSS%20Filters.pdf | |
http://www.bishopfox.com/blog/2015/09/the-active-directory-kill-chain-is-your-company-at-risk/ | |
http://blog.knownsec.com/2015/10/wordpress-xmlrpc-brute-force-amplification-attack-analysis/ | |
https://dl.packetstormsecurity.net/papers/general/cisco_ios_rootkits.pdf | |
https://www.idontplaydarts.com/2015/09/cross-domain-timing-attacks-against-lucene/ | |
http://lalo.li/lsd/?ultra-hard-version | |
http://javahacker.com/the-first-javascript-misdirection-contest/ | |
http://an7isec.blogspot.co.il/ | |
http://gynvael.coldwind.pl/?lang=en&id=533 | |
http://engineering.prezi.com/blog/2014/03/24/prezi-got-pwned-a-tale-of-responsible-disclosure/ | |
https://blog.mozilla.org/security/2014/03/25/using-fuzzdb-for-testing-website-security/ | |
http://openzfsonosx.org/ | |
http://ropshell.com/ | |
http://securehoney.net/blog/how-to-dissect-android-flappy-bird-malware.html#.UyxQzHV_spw | |
http://blog.safetechinnovations.com/pentest/ebay-authentication-bypass/ | |
http://nginx.com/admin-guide/ | |
http://mathiasbynens.be/notes/pbkdf2-hmac | |
http://geelen.github.io/x-gif/#/http://i.imgur.com/iKXH4E2.gif | |
http://dorey.github.io/JavaScript-Equality-Table/ | |
http://blog.tunnelshade.in/2015/09/interesting-flash-xss-on-vkcom.html | |
https://hackerone.com/reports/96294 | |
https://www.exploit-db.com/exploits/38360/ | |
https://w3challs.com/syscalls/ | |
http://www.room362.com/2014/04/executing-code-via-smb-dcom-without.html | |
http://d.hatena.ne.jp/masa141421356/20150914/1442239071 | |
http://fatsquirrel.org/oldfartsalmanac/random/reverse-engineering-a-vintage-wireless-keypad-with-an-rtl-sdr/ | |
http://blog.mindedsecurity.com/2015/09/autoloaded-file-inclusion-in-magento.html | |
http://noxxi.de/research/http-evader.html | |
https://labs.mwrinfosecurity.com/blog/2015/09/25/a-practical-guide-to-cracking-password-hashes/ | |
http://linux-audit.com/elf-binaries-on-linux-understanding-and-analysis/ | |
http://www.metzdowd.com/pipermail/cryptography/2015-October/026685.html | |
http://blog.knownsec.com/2015/09/linux-drm_legacy_lock_free-null-pointer-dereference-analysis/ | |
https://www.7elements.co.uk/resources/blog/cve-2015-2342-remote-code-execution-within-vmware-vcenter/ | |
http://www.repeater-builder.com/antenna/pdf/beer-barel-cavity.pdf | |
http://goo.gl/uTw6PN | |
http://foxglovesecurity.com/2015/10/26/car-hacking-for-plebs-the-untold-story/ | |
https://cyberarms.wordpress.com/2015/10/04/anti-virus-bypass-with-shellter-5-1-on-kali-linux/ | |
http://sourceforge.net/projects/awap/ | |
http://securityaffairs.co/wordpress/40727/hacking/hack-decrypt-whatsapp-database.html | |
https://www.accuvant.com/blog/exploiting-jmx-rmi | |
http://lcamtuf.coredump.cx/edison_fuzz/ | |
https://blog.goeswhere.com/2015/10/ssh-key-capture/ | |
http://seckb.yehg.net/2012/06/xss-gaining-access-to-httponly-cookie.html | |
https://www.swordshield.com/2015/10/extracting-password-hashes-from-large-ntds-dit-files/ | |
http://jumpespjump.blogspot.pt/2015/09/how-i-hacked-my-ip-camera-and-found.html | |
http://arxiv.org/pdf/1511.00444v2.pdf | |
https://goo.gl/rWptw1 | |
https://www.bamsoftware.com/hacks/deflate.html | |
http://ec.europa.eu/taxation_customs/vies/vatResponse.html | |
http://blog.dewhurstsecurity.com/2015/11/10/mobile-security-certificate-pining.html | |
http://grangeia.io/2015/11/09/hacking-tomtom-runner-pt1/ | |
http://www.debuginfo.com/tools/chkmatch.html | |
https://gef.readthedocs.org/en/latest/ | |
https://gitlab.com/rav7teif/linux.wifatch | |
http://legalhackers.com/advisories/Google-AdWords-API-libraries-XXE-Injection-Vulnerability.txt | |
http://www.icewall.pl/?p=696&lang=en | |
http://blog.checkpoint.com/2015/11/05/check-point-discovers-critical-vbulletin-0-day/ | |
http://tinyhack.com/2015/11/08/teensy-lc-u2f-key/ | |
http://blog.a-way-out.net/blog/2015/11/06/host-header-injection/ | |
http://blog.talosintel.com/2015/10/dangerous-clipboard.html | |
http://www.greyhathacker.net/?p=738 | |
https://instant.io/ | |
http://www.unfitbits.com/ | |
http://stegosploit.info/ | |
http://maustin.net/2015/11/12/hipchat_rce.html | |
http://ryhanson.com/angular-expression-injection-walkthrough/ | |
http://silentbreaksecurity.com/invoke-dcsync-because-we-all-wanted-it/ | |
https://gist.github.com/subTee/4843a1d9e7a9fcdb4417 | |
http://meat.pisto.horse/2015/11/rooting-linksys-x2000-router-system.html | |
https://chloe.re/2015/11/09/csrf-blocker-block-csrf-attacks-the-right-way/ | |
https://blog.filippo.io/the-sad-state-of-smtp-encryption/ | |
https://respectxss.blogspot.de/2015/11/a-tale-of-breaking-saps-successfactorss.html | |
http://homepage.ntlworld.com/jonathan.deboynepollard/FGA/nslookup-flaws.html | |
https://www.sensepost.com/blog/2015/wadi-fuzzer/ | |
https://blog.gaborszathmari.me/2015/11/11/tricking-google-authenticator-totp-with-ntp/ | |
http://yahoo-security.tumblr.com/post/122883273670/apache-traffic-server-http2-fuzzing | |
http://superlogout.com/ | |
http://www.n0tr00t.com/2015/11/27/cve-2015-8213.html | |
http://lizardhq.org/2015/11/25/dell-foundation-services.html | |
http://www.th3r3p0.com/vulns/jenkins/jenkinsVuln.html | |
http://goo.gl/O07NBR (+) | |
https://packetstormsecurity.com/files/134064/mchtml-exec.txt | |
http://www.pentest.guru/index.php/2015/10/19/ditch-psexec-spraywmi-is-here/ | |
https://jbeekman.nl/blog/2015/03/reverse-engineering-uefi-firmware/ | |
http://goo.gl/HCRlCE (+) | |
http://blog.knownsec.com/2015/11/analysis-of-redis-unauthorized-of-expolit/ | |
https://blog.srcclr.com/spring-social-core-vulnerability-disclosure/ | |
http://www.spect.cl/blog/2015/11/security-audit-scrapyd/ | |
http://www.sciencedirect.com/science/article/pii/S1742287615000146 | |
http://www.labofapenetrationtester.com/2015/11/week-of-continuous-intrusion-day-1.html | |
http://goo.gl/9TtRd8 (+) | |
http://www.adriancourreges.com/blog/2015/11/02/gta-v-graphics-study/ | |
http://thepiratebook.net/ | |
https://security.linkedin.com/blog-archive#11232015 | |
http://blog.valverde.me/2015/12/07/bad-life-advice/ | |
https://gist.github.com/crowell/92ed41884db35d73e2fc | |
http://magikh0e.ihtb.org/pubPapers/ssh_gymnastics_tunneling.html | |
http://decidedlygray.com/2015/11/19/evil-access-point-with-auto-backdooring-ftw/ | |
http://yahoo-security.tumblr.com/post/134549767190/attacking-http2-implementations | |
http://www.sekoia.fr/blog/windows-driver-signing-bypass-by-derusbi/ | |
https://goo.gl/Pei7cP (+) | |
http://silentbreaksecurity.com/malicious-outlook-rules/ | |
https://odzhan.wordpress.com/2015/11/17/asmcodes-pic/ | |
https://w00tsec.blogspot.pt/2015/11/arris-cable-modem-has-backdoor-in.html | |
https://www.mdsec.co.uk/2015/12/protected-mode-a-case-of-when-no-means-yes/ | |
http://neonprimetime.blogspot.pt/2015/11/xsl-payload-xxe-rce-e3xpl0it.html | |
http://blog.fortinet.com/post/when-baby-monitors-are-a-model-for-iot-security | |
https://blog.coresecurity.com/2015/12/09/exploiting-windows-media-center/ | |
https://hackerone.com/reports/100829 | |
http://racksburg.com/choosing-an-http-status-code/ | |
https://nvisium.com/blog/2015/12/07/injecting-flask/ | |
https://vagmour.eu/facebook-open-redirect-vulnerability-that-does-the-social-engineering-job-too/ | |
https://sites.google.com/site/zerodayresearch/BadWinmail.pdf | |
https://isc.sans.edu/diary/Scanning+tricks+with+scapy/20381 | |
http://antincode.com/post/131952657591/xss-via-xml-post | |
http://www.greyhathacker.net/?p=894 | |
https://odzhan.wordpress.com/2015/11/19/dllpic-injection-on-windows-from-wow64-process/ | |
http://ethanheilman.tumblr.com/post/133488739430/is-playstation-4-network-traffic-especially | |
https://www.raspberrypi.org/forums/viewtopic.php?f=66&t=126892 | |
http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.html | |
https://usn.pw/blog/gen/2015/06/09/filenames/ | |
http://hn.premii.com/#/article/10686676 | |
http://opensecuritytraining.info/IntroX86.html | |
http://labs.detectify.com/post/133528218381/chrome-extensions-aka-total-absence-of-privacy | |
https://blog.srcclr.com/amazon-aws-sdk-for-java-vulnerability-disclosure/ | |
https://blogs.akamai.com/2015/12/developing-a-poc-step-by-step.html | |
http://blog.totallynotmalware.net/?p=15 | |
http://oldweb.today/ | |
http://bnrg.cs.berkeley.edu/~randy/Courses/CS39K.S13/anarchistcookbook2000.pdf | |
https://goo.gl/qexIz4 (+) | |
http://www.exfiltrated.com/research-Instagram-RCE.php#Ruby_RCE | |
http://l0.cm/xxn/ | |
http://goo.gl/ysJ9ku (+) | |
http://www.contextis.com/resources/blog/data-exfiltration-blind-os-command-injection/ | |
http://mainframed767.tumblr.com/post/133340564417/nmap-enumerating-vtam-applications | |
http://blog.knownsec.com/wp-content/uploads/2015/12/Sqlmap-exploit_en.txt | |
https://blogs.securiteam.com/index.php/archives/2671 | |
https://www.poshsecurity.com/blog/2015/12/7/how-the-skype-team-failed-at-powershell | |
https://goo.gl/dUiZjx (+) | |
https://goo.gl/zQsIfv (+) | |
http://blog.regehr.org/archives/1282 | |
http://blog.amossys.fr/How_to_reverse_unknown_protocols_using_Netzob.html | |
https://jbp.io/2015/11/23/abusing-u2f-to-store-keys/ | |
http://agrrrdog.blogspot.ca/2015/11/3-attacks-on-cisco-tacacs-bypassing.html | |
http://www.codereversing.com/blog/archives/282 | |
http://www.kfirlavi.com/blog/2012/11/14/defensive-bash-programming | |
https://julianoliver.com/output/log_2015-12-18_14-39 | |
https://www.secgeek.net/bookfresh-vulnerability/ | |
http://www.agarri.fr/kom/archives/2015/12/17/amf_parsing_and_xxe/index.html | |
https://www.optiv.com/blog/bypassing-csrf-tokens-via-xss | |
http://www.rootsh3ll.com/2015/11/aircrack-boost-script/ | |
https://httphacker.github.io/gethead/ | |
https://blog.cloudflare.com/tools-for-debugging-testing-and-using-http-2/ | |
http://sethsec.blogspot.com.tr/2015/12/exploiting-server-side-request-forgery.html | |
https://adsecurity.org/?page_id=1821 | |
http://x42.obscurechannel.com/?p=197 | |
http://hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html | |
http://zoczus.blogspot.pt/2014/05/how-reverse-dns-can-help-us-with-xss.html | |
http://www.exploit-monday.com/2015/12/the-powersploit-manifesto.html | |
https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/ | |
http://marcoramilli.blogspot.pt/2015/12/spotting-malicious-node-relays.html | |
http://toshellandback.com/2015/11/24/ms-priv-esc/ | |
http://oswatch.org/ | |
http://azac.pl/cobol-on-wheelchair/ | |
http://showterm.io/ | |
http://www.ubercomp.com/posts/2014-01-16_facebook_remote_code_execution | |
https://code.google.com/p/google-security-research/issues/detail?id=675 | |
https://guidovranken.files.wordpress.com/2015/12/https-bicycle-attack.pdf | |
http://www.securityfocus.com/archive/1/536930 | |
https://blog.korelogic.com/blog/2015/12/04/linksys-0day-unauth-infodisco | |
http://dev.cra0kalo.com/?p=400 | |
http://www.impulseadventure.com/photo/jpeg-snoop.html | |
http://www.shellntel.com/blog/2015/9/23/assessing-enterprise-wireless-networks | |
https://blog.g0tmi1k.com/dvwa/bruteforce-high/ | |
http://randywestergren.com/running-a-hidden-tor-service-with-docker-compose/ | |
http://goo.gl/tJ00NN (+) | |
http://blog.mindedsecurity.com/2015/11/reliable-os-shell-with-el-expression.html | |
http://routersecurity.org/checklist.php | |
http://c0rni3sm.blogspot.pt/2016/01/referrer-leakage-from-https-to-https.html | |
https://digi.ninja/projects/zonetransferme.php | |
http://www.greyhathacker.net/?p=911 | |
https://blog.srcclr.com/handlebars_vulnerability_research_findings/ | |
https://blog.risingstack.com/web-authentication-methods-explained/ | |
http://www.portoscuso.com/codef/index.html | |
https://gist.github.com/hasegawayosuke/00f7253e22e228462b91 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment