Cloud Security
100 Methods for Container Attacks
https://redteamrecipe.com/100-Method-For-Container-Attacks
@Engineer_Computer
100 Methods for Container Attacks
https://redteamrecipe.com/100-Method-For-Container-Attacks
@Engineer_Computer
ExpiredDomains.com
redteamrecipe.com is for sale! Check it out on ExpiredDomains.com
Buy redteamrecipe.com for 195 on GoDaddy via ExpiredDomains.com. This premium expired .com domain is ideal for establishing a strong online identity.
exploit
1. CVE-2023-36167:
An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component
https://github.com/TraiLeR2/CVE-2023-36167
2. CVE-2023-36163:
BuildaGate5library - Reflected Cross-Site Scripting (XSS)
https://github.com/TraiLeR2/CVE-2023-36163
@Engineer_Computer
1. CVE-2023-36167:
An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component
https://github.com/TraiLeR2/CVE-2023-36167
2. CVE-2023-36163:
BuildaGate5library - Reflected Cross-Site Scripting (XSS)
https://github.com/TraiLeR2/CVE-2023-36163
@Engineer_Computer
GitHub
GitHub - TraiLeR2/CVE-2023-36168: An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted…
An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component - TraiLeR2/CVE-2023-36168
Cybercrime ops:
#MindMap of the connections between various cybercrime brands, organizations, and peoples.
🔹 https://kumu.io/pancak3/cybercrime-ops-demo#cybercrime-ops-demo/
@Engineer_Computer
#Site
#MindMap of the connections between various cybercrime brands, organizations, and peoples.
🔹 https://kumu.io/pancak3/cybercrime-ops-demo#cybercrime-ops-demo/
@Engineer_Computer
#Site
Offensive_Enumeration_in_Active_Directory_1689053159.pdf
745.9 KB
Offensive Enumeration in Active Directory
@Engineer_Computer
@Engineer_Computer
🌺🌸🌺 22 تیرماه روز ملی «فناوری اطلاعات» بر همه فعالان این عرصه مبارک باد.
🌺🌸🌺🌸🌺🌸🌺🌸🌺🌸🌺🌸🌺🌸
@Engineer_Computer
🌺🌸🌺🌸🌺🌸🌺🌸🌺🌸🌺🌸🌺🌸
@Engineer_Computer
Apple has issued a new round of Rapid Security Response (RSR) updates to address a new zero-day bug exploited in attacks and impacting fully-patched iPhones, Macs, and iPads
https://www.bleepingcomputer.com/news/apple/apple-releases-emergency-update-to-fix-zero-day-exploited-in-attacks/
@Engineer_Computer
https://www.bleepingcomputer.com/news/apple/apple-releases-emergency-update-to-fix-zero-day-exploited-in-attacks/
@Engineer_Computer
Discover the power of MITRE ATT&CK! This widely adopted framework categorizes tactics, techniques, and procedures used in cyberattacks, helping security professionals build strong defense strategies.
Learn more: https://thehackernews.com/2023/07/how-to-apply-mitre-att-to-your.html
@Engineer_Computer
Learn more: https://thehackernews.com/2023/07/how-to-apply-mitre-att-to-your.html
@Engineer_Computer
Audio
رادیو جادی ۱۵۱ - بیلاخ هم قبوله
یکی از طولانیترین رادیوگیکها! از مداخلههای دولتی به نفع کاربران آمازون و مییم و گپی طولانی با @danialbehzadi در مورد فدیورس و جهانی که *شاید* بعد از دود شدن شرکتهای سخت و استوار پدیدار بشه و مقداری حرفهای دیگه...
https://youtu.be/1eNFaW0ycWE
یکی از طولانیترین رادیوگیکها! از مداخلههای دولتی به نفع کاربران آمازون و مییم و گپی طولانی با @danialbehzadi در مورد فدیورس و جهانی که *شاید* بعد از دود شدن شرکتهای سخت و استوار پدیدار بشه و مقداری حرفهای دیگه...
https://youtu.be/1eNFaW0ycWE
تفاوت SAN و NAS و CAS در یک جدول ، مختصر و مفید
@Engineer_Computer
@Engineer_Computer
Heads up, everyone! Microsoft has released updates to fix 130 security flaws, including 6 zero-day vulnerabilities being actively exploited. Update your software now to keep your systems secure.
Learn more: https://thehackernews.com/2023/07/microsoft-releases-patches-for-130.html
@Engineer_Computer
Learn more: https://thehackernews.com/2023/07/microsoft-releases-patches-for-130.html
@Engineer_Computer
info
OSCE³ and OSEE Study Guide
https://github.com/CyberSecurityUP/OSCE3-Complete-Guide
Red Team Tactics
Dirty Pagetable: A Novel Exploitation Technique To Rule Linux Kernel
https://yanglingxi1993.github.io/dirty_pagetable/dirty_pagetable.html
@Engineer_Computer
OSCE³ and OSEE Study Guide
https://github.com/CyberSecurityUP/OSCE3-Complete-Guide
Red Team Tactics
Dirty Pagetable: A Novel Exploitation Technique To Rule Linux Kernel
https://yanglingxi1993.github.io/dirty_pagetable/dirty_pagetable.html
@Engineer_Computer
GitHub
GitHub - CyberSecurityUP/OSCE3-Complete-Guide: OSWE, OSEP, OSED, OSEE
OSWE, OSEP, OSED, OSEE. Contribute to CyberSecurityUP/OSCE3-Complete-Guide development by creating an account on GitHub.
⚡️ SonicWall and Fortinet both address critical vulnerabilities in their network security software. Update SonicWall's GMS and Analytics, and Fortinet's FortiOS and FortiProxy immediately to protect against unauthorized access.
Read: https://thehackernews.com/2023/07/new-vulnerabilities-disclosed-in.html
@Engineer_Computer
Read: https://thehackernews.com/2023/07/new-vulnerabilities-disclosed-in.html
@Engineer_Computer
info
Study materials for the Certified Red Team Pentesting (CRTP) exam
https://github.com/0xStarlight/CRTP-Notes
@Engineer_Computer
#businessadvisor #cyberdefense #data #cybersecurityawareness #cybersecuritytraining #cybercrime #cyberdefense #networksecurity
#securityaudit #intelligenceéconomique #analytics #research #mal #malware #reverseengineering #engineering #team #business #software #security
#BusinessSecureContinuity
Study materials for the Certified Red Team Pentesting (CRTP) exam
https://github.com/0xStarlight/CRTP-Notes
@Engineer_Computer
#businessadvisor #cyberdefense #data #cybersecurityawareness #cybersecuritytraining #cybercrime #cyberdefense #networksecurity
#securityaudit #intelligenceéconomique #analytics #research #mal #malware #reverseengineering #engineering #team #business #software #security
#BusinessSecureContinuity
با مهندسی کشف بیشتر آشنا شویم
https://d4rkciph3r.medium.com/establishing-a-detection-engineering-program-from-the-ground-up-b170811166c
@Engineer_Computer
https://d4rkciph3r.medium.com/establishing-a-detection-engineering-program-from-the-ground-up-b170811166c
@Engineer_Computer
Medium
Establishing a Detection Engineering Program from the ground-up
This is a concise writeup summarising my perspective on establishing a detection engineering program effectively and efficiently with…
🗒 Subdomain Takeover leading to Full Account Takeover
https://hacktus.tech/subdomain-takeover-leading-to-full-account-takeover
@Engineer_Computer
https://hacktus.tech/subdomain-takeover-leading-to-full-account-takeover
@Engineer_Computer
Hacktus
Subdomain Takeover leading to Full Account Takeover
Introduction
In this blog post, I will walk you through the discovery of a critical vulnerability in redacted.com. This vulnerability allowed me to take over any user's account by exploiting a subdomain takeover, which led to account takeovers due to...
In this blog post, I will walk you through the discovery of a critical vulnerability in redacted.com. This vulnerability allowed me to take over any user's account by exploiting a subdomain takeover, which led to account takeovers due to...