Pierce_Types_Programming_Languages.pdf
1.8 MB
Types and Programming Language (2002)
Benjamin C. Pierce
Recommended book to learn about type system
Benjamin C. Pierce
Recommended book to learn about type system
π1
Forwarded from Kode Nayuta
aszx87410.github.io
About This Series | Beyond XSS
As a software engineer, you must be familiar with information security. In your work projects, you may have gone through security audits, including static code scanning, vulnerability scanning, or penetration testing. You may have even done more comprehensiveβ¦
Forwarded from A Math Book
Introduction to Computation.pdf
9 MB
Introduction to Computation: Haskell, Logic and Automata ( Donald Sannella - Michael Fourman - Haoran Peng - Philip Wadler ). Springer 2022
π1
Forwarded from 1N73LL1G3NC3
MongoBleed (CVE-2025-14847) - Unauthenticated Memory Leak PoC
A flaw in the zlib library enables attackers to leak sensitive data from MongoDB servers, the attacker can send the payload, without authentication, as the bug is exploited on the network level.
Attackers can exploit this to extract sensitive information from MongoDB servers, including user information, passwords, API keys and more. Although the attacker might need to send a large amount of requests to gather the full database, and some data might be meaningless, the more time an attacker has the more information could be gathered.
Blog: https://www.ox.security/blog/attackers-could-exploit-zlib-to-exfiltrate-data-cve-2025-14847/
Dork:
Affected versions:
A flaw in the zlib library enables attackers to leak sensitive data from MongoDB servers, the attacker can send the payload, without authentication, as the bug is exploited on the network level.
Attackers can exploit this to extract sensitive information from MongoDB servers, including user information, passwords, API keys and more. Although the attacker might need to send a large amount of requests to gather the full database, and some data might be meaningless, the more time an attacker has the more information could be gathered.
Blog: https://www.ox.security/blog/attackers-could-exploit-zlib-to-exfiltrate-data-cve-2025-14847/
Dork:
Shodan: product:"MongoDB"
HUNTER: product.name="MongoDB"
ZoomEye Dork: app="MongoDB"
Affected versions:
8.2.0 to 8.2.2
8.0.0 to 8.0.16
7.0.0 to 7.0.27
6.0.0 to 6.0.26
5.0.0 to 5.0.31
4.4.0 to 4.4.29
4.2.0 and later
4.0.0 and later
3.6.0 and later
Malware Analysis Fundamentals_Participant Guide_2023.pdf
9.9 MB
Malware Analysis Fundamental
Mandiant
Mandiant
β1
advanced.python.for.cybersecurity.pdf.pdf
1.5 MB
Advance Python for Cybersecurity (2024)
Adam Jones
Adam Jones
β1
Forwarded from Programming Deadlock
Hard Mode Rust
https://matklad.github.io/2022/10/06/hard-mode-rust.html
https://matklad.github.io/2022/10/06/hard-mode-rust.html
matklad.github.io
Hard Mode Rust
This post is a case study of writing a Rust application using only minimal, artificially constrained API (eg, no dynamic memory allocation).
It assumes a fair bit of familiarity with the language.
It assumes a fair bit of familiarity with the language.
π1