|
You are here |
mdanilor.github.io | ||
| | | | |
adepts.of0x.cc
|
|
| | | | | Development of a PoC for one of the vulnerabilities published by Qualys in Exim | |
| | | | |
b.fl7.de
|
|
| | | | | Technical solutions for the SANS Holiday Hack 2015, covering packet capture analysis, Local File Inclusion, NoSQL Injection, Remote Code Execution, binary exploitation & exploit development on Linux with gdb, bypassing canary and ASLR protection. | |
| | | | |
taeluralexis.com
|
|
| | | | | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies. | |
| | | | |
blog.talosintelligence.com
|
|
| | | Cisco Talos is aware of the ongoing exploitation of CVE-2025-53770 and CVE-2025-53771 in the wild. These are path traversal vulnerabilities affecting SharePoint Server Subscription Edition, SharePoint Server 2016, and SharePoint Server 2019. | ||