Explore >> Select a destination


You are here

forensicitguy.github.io
| | blog.deesee.xyz
3.5 parsecs away

Travel
| | When reverse engineering an application that is shipped as compiled bytecode (jar file, war file, class files, etc.), we normally use a decompiler and then audit the resulting Java code. The catch is that the language the application was written in might not have been Java! Indeed, there are multiple languages that target the Java Virtual Machine (JVM) and produce bytecode just like Java does. On top of generating generally strange decompiled code, this has for effect that the common potentially dangerou...
| | www.datadoghq.com
4.2 parsecs away

Travel
| | Learn how the Log4Shell vulnerability works, how to detect it, and how Datadog can help you secure your systems.
| | 0xcybery.github.io
4.2 parsecs away

Travel
| | You will understand following things. How to create lab setup to experience log4j vulnerability?, Learn how an attacker can exploit the log4shell using Kali ...
| | www.nodejs-security.com
21.0 parsecs away

Travel
| The MCP Database Server by ExecuteAutomation had a critical vulnerability that allowed SQL injection attacks, bypassing its "read-only" mode. This article explores the flaw, its exploitation, and mitigation strategies.