| | Compromising Rspack Using GitHub Actions (praetorian.com) |
|
1 point by arshxyz 5 months ago | past
|
| | Obtaining Remote Code Execution in F5-Bigip via AJP Request Smuggling (praetorian.com) |
|
1 point by bouncyhat on Oct 26, 2023 | past | 1 comment
|
| | Technical Advisory – Azure B2C – Crypto Misuse and Account Compromise (praetorian.com) |
|
2 points by PretzelFisch on Feb 25, 2023 | past
|
| | Azure B2C – Crypto Misuse and Account Compromise (praetorian.com) |
|
1 point by Terretta on Feb 19, 2023 | past
|
| | Uncontrollable AWS IAM: Sts:GetSessionToken, GetCallerIdentity, and Policy Sim (praetorian.com) |
|
2 points by nutbear on June 17, 2022 | past
|
| | Spring Core on JDK9 is vulnerable to remote code execution (praetorian.com) |
|
157 points by groundshark on March 30, 2022 | past | 70 comments
|
| | Nosey Parker: An AI Based Secrets Scanner That Out Sniffs the Competition (praetorian.com) |
|
5 points by twoshores67 on March 22, 2022 | past
|
| | GoKart, a Smarter Go Security Scanner (praetorian.com) |
|
2 points by ngaut on Aug 23, 2021 | past
|
| | GoKart (praetorian.com) |
|
1 point by InitialBP on Aug 19, 2021 | past
|
| | Bypassing Google's Santa Application Whitelisting on macOS (#hacking) (praetorian.com) |
|
1 point by myover on June 12, 2019 | past
|
| | Cloud Data Exfiltration via GCP Storage Buckets and How to Prevent It (praetorian.com) |
|
1 point by myover on June 6, 2019 | past
|
| | What we learned from 100 Pen Tests, 75 Organizations, 450 Attack Vectors [pdf] (praetorian.com) |
|
1 point by myover on Sept 2, 2016 | past
|
| | Reversing and Exploiting Embedded Devices: The Software Stack (Part 1) (praetorian.com) |
|
3 points by ashitlerferad on June 4, 2016 | past
|
| | Reversing and Exploiting Embedded Devices: The Software Stack (Part 1) (praetorian.com) |
|
1 point by ndesaulniers on June 3, 2016 | past
|
| | Reversing and Exploiting Embedded Devices: The Software Stack (Part 1) (praetorian.com) |
|
2 points by myover on June 2, 2016 | past
|
| | 11 Steps to Mitigate WPAD Attack (Defense In-depth) (praetorian.com) |
|
1 point by jabraham_ on May 25, 2016 | past
|
| | Signal Protocol and Deniable Authentication (praetorian.com) |
|
3 points by kkl on May 17, 2016 | past
|
| | Great Example of an Engineering Culture at Work in Security Services (praetorian.com) |
|
1 point by myover on April 26, 2016 | past
|
| | JTAGulator vs. JTAGenum, Hardware Hacking Tools for IoT Devices (praetorian.com) |
|
2 points by myover on April 20, 2016 | past
|
| | SPAM Filters: A Reliable Protection Against Phishing Attacks? (praetorian.com) |
|
4 points by myover on April 12, 2016 | past
|
| | End-To-End WhatsApp Encryption: Why Signal Protocol Is So Well-Designed (praetorian.com) |
|
6 points by myover on April 7, 2016 | past
|
| | Machine Learning Tutorial (praetorian.com) |
|
4 points by myover on Feb 15, 2016 | past | 2 comments
|
| | Statistics Based Password Cracking Rules Released (praetorian.com) |
|
4 points by myover on Feb 11, 2016 | past
|
| | Ruby Unsafe Reflection Vulnerabilities (praetorian.com) |
|
1 point by myover on Feb 9, 2016 | past
|
| | Introducing Gladius: Automatic Responder Cracking for Internal Pentests (praetorian.com) |
|
5 points by myover on Feb 4, 2016 | past
|
| | Introducing MitM-VM and Trudy… a Dead Simple TCP Intercepting Proxy Tool Set (praetorian.com) |
|
4 points by myover on Feb 2, 2016 | past
|
| | IPv6 Has Arrived – Is Your Security Infrastructure Prepared? (praetorian.com) |
|
2 points by myover on Jan 28, 2016 | past
|
| | The Reason My Lamp Is Insecure (praetorian.com) |
|
3 points by myover on Jan 26, 2016 | past
|
| | Getting Started with Damn Vulnerable Router Firmware (DVRF) v0.1 (praetorian.com) |
|
3 points by myover on Jan 23, 2016 | past
|
| | JavaScript Sensor API and New Browser Features Raise Privacy Concerns (praetorian.com) |
|
6 points by myover on Jan 19, 2016 | past
|
|
|
More |