ExploitToday's profile picture. It's the safe haven for security researchers, penetration testers, hackers and infosec freaks. 

All abroad?

Exploit Today

@ExploitToday

It's the safe haven for security researchers, penetration testers, hackers and infosec freaks. All abroad?

Exploit Today reposted

At long last - Phrack 72 has been released online for your reading pleasure! Check it out: phrack.org

phrack's tweet image. At long last - Phrack 72 has been released online for your reading pleasure! 

Check it out: phrack.org

Exploit Today reposted

Need to capture, manipulate, and replay HTTP/HTTPS traffic from the CLI? Then you need to check out Proxify! Features include: 🌀 Intercept / Manipulate HTTP/HTTPS & NON-HTTP traffic 🌀 Invisible & Thick clients traffic proxy support 🌀 TLS MITM support with client/server…


Exploit Today reposted

🚨EDR Telemetry website is live! 🥳 I hope this makes it even easier for folks to compare the telemetry of EDR vendors and visualize their visibility gaps 🙂 ‣ Website🔗edr-telemetry.com ‣ GitHub 🔗github.com/tsale/edr-tele… **Telemetry results reflect the most recent…

Kostastsale's tweet image. 🚨EDR Telemetry website is live! 🥳

I hope this makes it even easier for folks to compare the telemetry of EDR vendors and visualize their visibility gaps 🙂

‣ Website🔗edr-telemetry.com 
‣ GitHub 🔗github.com/tsale/edr-tele…

**Telemetry results reflect the most recent…

I created the first draft of a website for the EDR telemetry project to help people quickly compare vendor telemetry visibility. What do you think about it? Are there any specific features you want to see for the website? Built with ChatGPT 4o with canvas (wanted to test it…



Exploit Today reposted

This was a very uncomfortable breach to process for reasons that should be obvious from @josephfcox's article. Let me add some more "colour" based on what I found:

New sensitive breach: "AI girlfriend" site Muah[.]ai had 1.9M email addresses breached last month. Data included AI prompts describing desired images, many sexual in nature and many describing child exploitation. 24% were already in @haveibeenpwned. More: 404media.co/hacked-ai-girl…



Exploit Today reposted

Ok but seriously nobody steal this idea from me, I will make a MITRE ATT&CK matrix for money laundering "TTPs" I have learned from reading every FinCEN advisory in the past 10 years (fincen.gov/resources/advi…)

Why does everyone think im trolling? Heres a sneekpeak of the course jeez. They're mapping money laundering TTPs to a MITRE-like ATT&CK MATRIX

thoughtfault's tweet image. Why does everyone think im trolling? Heres a sneekpeak of the course jeez.  They're mapping money laundering TTPs to a MITRE-like ATT&CK MATRIX


Exploit Today reposted

GitLab Authentication Bypass (CVE-2024-45409) : blog.projectdiscovery.io/ruby-saml-gitl… credits @rootxharsh @iamnoooob


И ДГПТ ќе имаат ненајдени проблеми со блокчеин, исто како Конти. Ама за пар месеци, скоро ги ротираа сметките за исплата. (период 9ти Август - 8ми Септември) #DGPT #Conti #Scam


Exploit Today reposted

#exploit 1. CVE-2024-38816: Spring Framework 6.0.3 path traversal github.com/masa42/CVE-202… 2. CVE-2024-7481: TeamViewer User to Kernel EoP github.com/PeterGabaldon/… 3. CVE-2024-7479/26304: Critical RCE in HPE Aruba Devices github.com/Roud-Roud-Agen…


Exploit Today reposted

CVE-2024-7479 & CVE-2024-7481: exploit proof of concept of a vulnerability in TeamViewer that enables an unprivileged user to load an arbitrary Kernel Driver into the system. PoC github.com/PeterGabaldon/…

cyber_advising's tweet image. CVE-2024-7479 & CVE-2024-7481: exploit proof of concept of a vulnerability in TeamViewer that enables an unprivileged user to load an arbitrary Kernel Driver into the system.

PoC
github.com/PeterGabaldon/…

Exploit Today reposted

Кога ќе излезе пак нешто ново од Велес ќе пишам по со време. За сега парите доаѓаат и си одат, да сме живи и здрави како би рекле некои.

Ми се испушти Конти, народот уште не знае што е.



Немојте да се лажете! Парите нема да ви бидат вратени а дополнително ќе ве измамат за некој $

This post is unavailable.

Exploit Today reposted

Само што ми го пратија скриншотов од нивната група на Телеграм. #CONTI го продал кучата. Милиони евра на наши лековерни граѓани отишле во неповрат. Ако сретнете некого во наредниот период по улица сам да си прави муабет, гушнете го. Сигурно вложил во CONTI.🤡

UcitelkataMila's tweet image. Само што ми го пратија скриншотов од нивната група на Телеграм. #CONTI го продал кучата. Милиони евра на наши лековерни граѓани отишле во неповрат. Ако сретнете некого во наредниот период по улица сам да си прави муабет, гушнете го. Сигурно вложил во CONTI.🤡

Exploit Today reposted

Global Threat Report 2024 github.com/blackorbird/AP…

blackorbird's tweet image. Global Threat Report 2024
github.com/blackorbird/AP…

Exploit Today reposted

🚨 New #rootkit alert! We've discovered #Snapekit, a sophisticated rootkit targeting Arch Linux (6.10.2-arch1-1 x86_64). It hooks 21 syscalls, hides its payload, and evades detection by dropping in user space while dodging analysis tools & debuggers. Stay vigilant! #ThreatIntel

GenThreatLabs's tweet image. 🚨 New #rootkit alert! We've discovered #Snapekit, a sophisticated rootkit targeting Arch Linux (6.10.2-arch1-1 x86_64). It hooks 21 syscalls, hides its payload, and evades detection by dropping in user space while dodging analysis tools & debuggers. Stay vigilant! #ThreatIntel…

Exploit Today reposted

it's actually gnu/linux

vxunderground's tweet image. it's actually gnu/linux

Exploit Today reposted

Today, my PC was nearly compromised. With just one click, I installed a malicious @code extension. Luckily, I was saved as my PC doesn't run on Windows. Hackers are getting smarter and aren't just targeting beginners. Here's how they do it and how you can protect your coins!

LehmannLorenz's tweet image. Today, my PC was nearly compromised.

With just one click, I installed a malicious @code extension. Luckily, I was saved as my PC doesn't run on Windows.

Hackers are getting smarter and aren't just targeting beginners. Here's how they do it and how you can protect your coins!
LehmannLorenz's tweet image. Today, my PC was nearly compromised.

With just one click, I installed a malicious @code extension. Luckily, I was saved as my PC doesn't run on Windows.

Hackers are getting smarter and aren't just targeting beginners. Here's how they do it and how you can protect your coins!
LehmannLorenz's tweet image. Today, my PC was nearly compromised.

With just one click, I installed a malicious @code extension. Luckily, I was saved as my PC doesn't run on Windows.

Hackers are getting smarter and aren't just targeting beginners. Here's how they do it and how you can protect your coins!

Exploit Today reposted

Joker is a malicious code hidden in various mobile apps from Play Store. It looks innocent but it can clean out the user’s bank account without them realizing anything. 💰 The details of how it works can be found in our analysis – cert.pl/en/posts/2024/…


United States Trends

Loading...

Something went wrong.


Something went wrong.