ashwin retweetlediOWASP Mumbai Chapter - Old@OWASPMumbai·28 OcaHardware CTF first winner Team:Drona By @_jaiverma #rajasekar @ayh26 @OWASPMumbai @nullmumbai @rootkill3r @SneharajguruÇevir English0530
ashwin retweetlediNicky Bloor@nickstadb·21 AğuRCE: Race to Code Execution - Finally wrote up details of the Drupal Coder RCE I found! blog.nickbloor.co.uk/2016/08/drupal… CC @mdisecÇevir English16610201
ashwin retweetlediFlorian Roth ⚡️@cyb3rops·17 TemtomcatWarDeployer Apache Tomcat auto WAR deployment & pwning tool via @KitPloit github.com/mgeeky/tomcatW…Çevir English31071220
ashwin retweetlediGreg Linares (Laughing Mantis)@Laughing_Mantis·18 Ara#infosec #DLLHijacking #Meme #exploits #0day #staytunedÇevir QME08110
ashwin retweetledipacket storm@packet_storm·13 Eki.NET Partial-Trust Bypass packetstormsecurity.com/files/133935 #exploitÇevir English0200
ashwin retweetlediblasty@bl4sty·13 EkiHere it is; my remote kernel exploit for CVE-2015-3036: haxx.in/blasty-vs-netu… (targeted against my WNDR3700v5) Enjoy! #NoMoreDosPOCs ;-)Çevir English81601520
ashwin retweetlediNicolas Krassas@Dinosn·5 EkiHow to Hack and Decrypt WhatsApp Database on rooted devices securityaffairs.co/wordpress/4072…Çevir English034360
ashwin retweetlediNicolas Krassas@Dinosn·7 EylProxying Bluetooth devices for security analysis using btproxy conorpp.com/blog/proxying-…Çevir English017230
ashwin retweetlediPanos Gkatziroulis 🦄@ipurple·18 AğuPentesting an Active Directory infrastructure ldap389.info/en/2012/12/10/…Çevir English121450
ashwin retweetlediNicolas Krassas@Dinosn·16 AğuHTML5: Persistent AppCache Injections heipei.github.io/2015/08/20/Per…Çevir Català015230
ashwin retweetlediGarage4Hackers@garage4hackers·14 Ağu@danyalzafar143 @SandeepL337 Its on 11th sept. You can find details here garage4hackers.com/showthread.php…Çevir English1210
ashwin retweetlediPanos Gkatziroulis 🦄@ipurple·14 AğuLobotomy | The Android Assessment Toolkit guidepointsecurity.com/1360/mobile-se…Çevir English07110
ashwin retweetlediHaifei Li@HaifeiLi·6 AğuSlides for our talk "Attacking Interoperability: An OLE Edition" are available here sites.google.com/site/zerodayre…. #BHUSA #ole #0dayÇevir English335340
ashwin retweetlediOpenSecurity@OpenSecurity_IN·24 TemBar Mitzvah : Attack that exploits the Invariance Weakness in RC4 keys which leaks plain text data from the encrypted SSL/TLS traffic. #SSLÇevir English0340
ashwin retweetlediOpenSecurity@OpenSecurity_IN·24 TemLogjam: This vulnerability allows the attacker to downgrade a vulnerable connection to a lower grade cipher due to the flaws in TLS protocolÇevir English0240
ashwin retweetlediOpenSecurity@OpenSecurity_IN·24 TemLucky 13: Allows attacker to modify the cipher block and clocks the response time from server to determine the key to decrypt the data. #SSLÇevir English0230
ashwin retweetlediOpenSecurity@OpenSecurity_IN·24 TemFREAK: MITM attack that downgrades connections from 'strong' RSA encryption to 'export-grade' ciphers which are less than 512 bytes. #SSLÇevir English0240
ashwin retweetlediOpenSecurity@OpenSecurity_IN·24 TemCRIME: A compression side-channel attack against HTTPS allows attacker to Inject partial chosen plaintext into a victim's request.Çevir English0330
ashwin retweetlediBinni Shah@binitamshah·20 TemThe New Metasploit Browser Autopwn : Strikes Faster and Smarter - Part 1 : goo.gl/vufMTY , Part 2 : goo.gl/esZ79tÇevir English039640