Latest Hacking News-- A serious vulnerability has been discovered in the Waze app that could allow tracking other users’ locations in real-time. The Waze App Vulnerability Could Allow Tracking Users’ Location on Latest Hacking News. View original article on Latest Hacking News
Hasta la vista, baby
InfoSec Write-ups - Medium-- TryHackMe Skynet machine walkthroughContinue reading on InfoSec Write-ups » View original article on InfoSec Write-ups - Medium
My first bug on Google: Observation wins!
InfoSec Write-ups - Medium-- My first bug on GoogleThe clearer you see, the better you win!So, I was trying Google this time to see if I get something interseting in it. I spent like 20 days on an acquisition and finally I found some interesting stuffs over there. This is the tell about one of them:)While I was … Continue reading My first bug on Google: Observation wins!
Multiple Mobile Browsers Suffer Address Bar Spoofing Vulnerabilities
Latest Hacking News-- Mobile users are exposed to a serious security problem due to vulnerable browsers on their devices. Security researchers have disclosed Multiple Mobile Browsers Suffer Address Bar Spoofing Vulnerabilities on Latest Hacking News. View original article on Latest Hacking News
Manuka – A Modular OSINT Honeypot For Blue Teamers
KitPloit - PenTest Tools!-- Manuka is an Open-source intelligence (OSINT) honeypot that monitors reconnaissance attempts by threat actors and generates actionable intelligence for Blue Teamers. It creates a simulated environment consisting of staged OSINT sources, such as social media profiles and leaked credentials, and tracks signs of adversary interest, closely aligning to MITRE’s PRE-ATT&CK framework. … Continue reading Manuka – A Modular OSINT Honeypot For Blue Teamers
7 Best Voice Chat Apps For Gamers
Dark Hacker World-- Are you a gamer? Looking for gaming chat apps, If right, then, You are at the best place to find the best and free voice chat apps for gamers.A gamer like to socialize with his/her teammates while playing a game. Good communication can lead you to win the game.Most of the game … Continue reading 7 Best Voice Chat Apps For Gamers
Pesidious – Malware Mutation Using Reinforcement Learning And Generative Adversarial Networks
KitPloit - PenTest Tools!-- Malware Mutation using Deep Reinforcement Learning and GANs The purpose of the tool is to use artificial intelligence to mutate a malware (PE32 only) sample to bypass AI powered classifiers while keeping its functionality intact. In the past, notable work has been done in this domain with researchers either looking at … Continue reading Pesidious – Malware Mutation Using Reinforcement Learning And Generative Adversarial Networks
TryHackMe- Ignite CTF Writeup (Detailed)
InfoSec Write-ups - Medium-- Welcome folks!! We are going to do Ignite CTF on TryHackMe.Continue reading on InfoSec Write-ups » View original article on InfoSec Write-ups - Medium
Google Remove Malicious Adblockers From Web Store For Collecting User Data
Latest Hacking News-- Google has recently removed two malicious adblockers from the web store after they were found collecting user data. Uninstall them Google Remove Malicious Adblockers From Web Store For Collecting User Data on Latest Hacking News. View original article on Latest Hacking News
Using a PIE binary as a Shared Library — HCSC-2020 CTF Writeup
InfoSec Write-ups - Medium-- Using a PIE binary as a Shared Library — HCSC-2020 CTF WriteupThe challenge “Baseline test” was a great reverse engineering challenge with hard difficulty at the Hungarian Cyber Security Challenge 2020 CTF Qualifiers hosted by the National Cyber-Security Center of Hungary on the platform Avatao Next.The challengePoints: 300Difficulty: hardAnswer some simple questions.InstructionsThe baseline test is … Continue reading Using a PIE binary as a Shared Library — HCSC-2020 CTF Writeup






