bOt@zerobytes.monsterM · 1 year agoFinally added a raspberry pie to my lab!!plus-squareibb.coexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFinally added a raspberry pie to my lab!!plus-squareibb.cobOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoThreat Hunting Newsletterplus-squaremarcusedmondson.substack.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThreat Hunting Newsletterplus-squaremarcusedmondson.substack.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoRateMyAI - Prompt Composer - A Generative AI Testing Toolplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRateMyAI - Prompt Composer - A Generative AI Testing Toolplus-squaregithub.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoCan machines dream of secure code? From AI hallucinations to software vulnerabilities | Snykplus-squaresnyk.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCan machines dream of secure code? From AI hallucinations to software vulnerabilities | Snykplus-squaresnyk.iobOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year ago#NoFilter - Abusing Windows Filtering Platform for Privilege Escalationplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link#NoFilter - Abusing Windows Filtering Platform for Privilege Escalationplus-squaregithub.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoi think i solved deepfakes? poke holes in this pleaseplus-squarex.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linki think i solved deepfakes? poke holes in this pleaseplus-squarex.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoSecurity Researcher Creates an Open Source Security Research Sharing Platformplus-squarerosesecurityresearch.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSecurity Researcher Creates an Open Source Security Research Sharing Platformplus-squarerosesecurityresearch.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoSearch Engines for Researchersplus-squaredocs.google.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSearch Engines for Researchersplus-squaredocs.google.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoAbyss Locker Ransomware strikes from the depthsplus-squarewww.shadowstackre.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAbyss Locker Ransomware strikes from the depthsplus-squarewww.shadowstackre.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agogood primer into Windows Kernel Driversplus-squareblog.neuvik.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkgood primer into Windows Kernel Driversplus-squareblog.neuvik.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoOne of our talented interns open sourced a log anonymizing tool - LogLickerplus-squarepermiso.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOne of our talented interns open sourced a log anonymizing tool - LogLickerplus-squarepermiso.iobOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoRichard Stallman on why GNU su didn't support the "wheel" groupplus-squareftp.gnu.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRichard Stallman on why GNU su didn't support the "wheel" groupplus-squareftp.gnu.orgbOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoComparison of popular security benchmarks (and dangers associated with them)plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkComparison of popular security benchmarks (and dangers associated with them)plus-squaregithub.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoTelegram Channels Unveiled: The Hidden Dangers Lurking in Shared Filesplus-squaresocradar.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTelegram Channels Unveiled: The Hidden Dangers Lurking in Shared Filesplus-squaresocradar.iobOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoAzerbaijan cut fiber optic internet cable, disrupting Karabakh's stable internet connectionplus-squarenews.amexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAzerbaijan cut fiber optic internet cable, disrupting Karabakh's stable internet connectionplus-squarenews.ambOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoPodman API service listening on TCP can be used from websitesplus-squareproofnet.deexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPodman API service listening on TCP can be used from websitesplus-squareproofnet.debOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoWhat Is Trusted Computing?plus-squareblog.simonfarshid.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhat Is Trusted Computing?plus-squareblog.simonfarshid.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoAnimated Video on Buffer Overflow Attacks and DeGoogled Phonesplus-squarevideo.simplifiedprivacy.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnimated Video on Buffer Overflow Attacks and DeGoogled Phonesplus-squarevideo.simplifiedprivacy.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoShellcode with GCC and LD (Part 1)plus-squaresh3llsp4wn.github.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkShellcode with GCC and LD (Part 1)plus-squaresh3llsp4wn.github.iobOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoAI-Powered Fuzzing: Breaking the Bug Hunting Barrierplus-squaresecurity.googleblog.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAI-Powered Fuzzing: Breaking the Bug Hunting Barrierplus-squaresecurity.googleblog.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink