Aggregator
Police shutter MATRIX encrypted chat service used by criminals
CVE-2015-5546 | Adobe Flash Player 11.2.202.491/18.0.0.209 memory corruption (APSB15-19 / EDB-37868)
CVE-2012-4172 | Adobe Shockwave Player 11.6.7.637 memory corruption (APSB12-23 / VU#872545)
CVE-2012-4175 | Adobe Shockwave Player 11.6.7.637 Flow memory corruption (APSB12-23 / VU#872545)
CVE-2012-4173 | Adobe Shockwave Player 11.6.7.637 Flow memory corruption (APSB12-23 / VU#872545)
CVE-2012-4174 | Adobe Shockwave Player up to 8.0.195 memory corruption (VU#872545 / Nessus ID 62702)
Veeam warns of critical RCE bug in Service Provider Console
CVE-2023-36348 | POS Codekop 2.0 filename authorization (ID 173278 / EDB-51551)
Detailing the Attack Surfaces of the WolfBox E40 EV Charger
Data brokers face sweeping new regulations from CFPB
Barrierefreiheit - Neues auf dem 38C3
CloudGoat Official Walkthrough Series: ‘sqs_flag_shop’
Linux Default User Password Attack Detection and Forensics
Cloud Console Cartographer: Mapping the Cloud for Defenders
Cloud Console Cartographer Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. CloudTrail logs) and mapping them to the original user...
The post Cloud Console Cartographer: Mapping the Cloud for Defenders appeared first on Penetration Testing Tools.
obfuscar: Open source obfuscation tool for .NET assemblies
Obfuscar Obfuscar is a basic obfuscator for .NET assemblies. It uses massive overloading to rename metadata in .NET assemblies (including the names of methods, properties, events, fields, types, and namespaces) to a minimal set,...
The post obfuscar: Open source obfuscation tool for .NET assemblies appeared first on Penetration Testing Tools.
attack range: create vulnerable instrumented local or cloud environments
Splunk Attack Range Purpose The Attack Range solves two main challenges in the development of detections. First, it allows the user to quickly build a small lab infrastructure as close as possible to your...
The post attack range: create vulnerable instrumented local or cloud environments appeared first on Penetration Testing Tools.