views are my own, not my employers
Post exploitation tool to identify UserAgents that bypasses proxy restrictions.
github.com/Add3r/Proxy_By…#Pentestingn#Securityt#Hackingn#CyberSecurityt#infosece#redteama#pentests#hackersr#codingn#opensourcec#purpleteama#bugbountyt#hackc#proxyxy
youtu.be/FI7C37lz4Rg?...
Thanks @fede-k.bsky.social for this amazing event!
Thread of books and reference materials
* The Art of Software Security Assessment
* REVERSING: Secrets of Reverse Engineering
www.mindmeister.com/849149540/vu...
#cybersecurity #vulnerability #securityresearch #0day #bugbounty #fuzzing
Thread of books and reference materials
* The Art of Software Security Assessment
* REVERSING: Secrets of Reverse Engineering
www.mindmeister.com/849149540/vu...
#cybersecurity #vulnerability #securityresearch #0day #bugbounty #fuzzing
www.bleepingcomputer.com/news/securit...
www.bleepingcomputer.com/news/securit...
👉Watch more: s1.ai/WWC-ccp
Malware can unload network extensions and cause chaos
Great work by @patrickwardle on reversing crash dumps. Excellent preso on walking through the reversing process
Link - objective-see.org/blog/blog_0x...
#defcon32 #blackhat #apple #CyberSecurity #zeroday #malware
Malware can unload network extensions and cause chaos
Great work by @patrickwardle on reversing crash dumps. Excellent preso on walking through the reversing process
Link - objective-see.org/blog/blog_0x...
#defcon32 #blackhat #apple #CyberSecurity #zeroday #malware
Post exploitation tool to identify UserAgents that bypasses proxy restrictions.
github.com/Add3r/Proxy_By…#Pentestingn#Securityt#Hackingn#CyberSecurityt#infosece#redteama#pentests#hackersr#codingn#opensourcec#purpleteama#bugbountyt#hackc#proxyxy
Post exploitation tool to identify UserAgents that bypasses proxy restrictions.
github.com/Add3r/Proxy_By…#Pentestingn#Securityt#Hackingn#CyberSecurityt#infosece#redteama#pentests#hackersr#codingn#opensourcec#purpleteama#bugbountyt#hackc#proxyxy