eBPF Rootkit
🛡️eBPF Security
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.com·1d
🔓Hacking
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.club·1d
💣ZIP Vulnerabilities
Flag this post
Microsoft Access .accdb encryption and simple Python implementation
yingtongli.me·2d
🔐Archive Encryption
Flag this post
Practical steps to minimize key exposure using AWS Security Services
aws.amazon.com·1d
🏠Homelab Security
Flag this post
A decades-old threat command is making a comeback - so don't let the "finger" of doom affect you
techradar.com·3d
📟Terminal Forensics
Flag this post
Metasploit Wrap-Up 11/21/2025
rapid7.com·1d
🛡️CLI Security
Flag this post
This Week in Security: Cloudflare Wasn’t DNS, BADAUDIO, and Not a Vuln
hackaday.com·1d
🔓Hacking
Flag this post
TokenHolder Hack Analysis
blog.verichains.io·17h
🎫Kerberos Attacks
Flag this post
Attackers are using “Sneaky 2FA” to create fake sign-in windows that look real
malwarebytes.com·3d
🔓Hacking
Flag this post
7-Zip: Attackers Inject Malicious Code
heise.de·2d
💣ZIP Vulnerabilities
Flag this post
Building a Windows-based homelab to prep for IT roles. What should I add next to be more employable?
🏠Homelab Pentesting
Flag this post
Microsoft named a Leader in the Gartner® Magic Quadrant™ for Access Management for the ninth consecutive year
microsoft.com·1d
🏺Kerberos Archaeology
Flag this post
LINE Messaging Bugs Open Asian Users to Cyber Espionage
darkreading.com·1d
🔤EBCDIC Privacy
Flag this post
The Original OTP: Inside the Only Encryption Proven to Be Unbreakable
hackernoon.com·1d
🔐Cryptographic Archaeology
Flag this post
Loading...Loading more...