π [ ReconOne_, ReconOne ]
GitHub Recon in Manual mode - Part 3 - Database
credits: techgaun/github-dorks
#recon #recontips #github #AttackSurface #bugbountytips #reconone #Database #gitrecon
π₯ [ tweet ]
GitHub Recon in Manual mode - Part 3 - Database
credits: techgaun/github-dorks
#recon #recontips #github #AttackSurface #bugbountytips #reconone #Database #gitrecon
π₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
π [ bishopfox, Bishop Fox ]
We just published a detailed analysis of #CVE-2023-3519, which we previously wrote about. Today, weβre going even further into how this #RCE vulnerability can be exploited.
Our team created a #python script for generating shellcode given the fixup address and callback URL by calling nasm from Python. The final #exploit with addresses for VPX version 13.1-48.47 is available on our #GitHub.
π bfx.social/3YjMxpz
#infosec #Citrix
π₯ [ tweet ]
We just published a detailed analysis of #CVE-2023-3519, which we previously wrote about. Today, weβre going even further into how this #RCE vulnerability can be exploited.
Our team created a #python script for generating shellcode given the fixup address and callback URL by calling nasm from Python. The final #exploit with addresses for VPX version 13.1-48.47 is available on our #GitHub.
π bfx.social/3YjMxpz
#infosec #Citrix
π₯ [ tweet ]
π₯4