aspasht's profile picture. Before I wanted to know how it works but now I want to change the way it works.🇳🇵

Aspasht

@aspasht

Before I wanted to know how it works but now I want to change the way it works.🇳🇵

Aspasht reposted

Excellent blog post on bypassing Ubuntu’s Unprivileged Namespace Restriction by @u1f383 u1f383.github.io/linux/2025/06/… #infosec

0xor0ne's tweet image. Excellent blog post on bypassing Ubuntu’s Unprivileged Namespace Restriction by @u1f383

u1f383.github.io/linux/2025/06/…

#infosec

Aspasht reposted

"LLMs Solving a DEF CON CTF Finals Challenge" wilgibbs.com/blog/defcon-fi… Credits @cl4sm #infosec

0xor0ne's tweet image. "LLMs Solving a DEF CON CTF Finals Challenge"

wilgibbs.com/blog/defcon-fi…

Credits @cl4sm

#infosec

Aspasht reposted

Microsoft doesn't want you to know this


Aspasht reposted

New XSS Bypass Cloudflare WAF 🧱 Payload : %3CSVG/oNlY=1%20ONlOAD=confirm(document.domain)%3E #BugBounty #XSS #Cybersecurity

NullSecurityX's tweet image. New XSS Bypass Cloudflare WAF 🧱

Payload : %3CSVG/oNlY=1%20ONlOAD=confirm(document.domain)%3E 

#BugBounty #XSS #Cybersecurity

Aspasht reposted

Check out this awesome project on GitHub: Frida Gadget. A powerful tool that automates APK patching to integrate Frida Gadget by downloading the library and injecting code into the main activity🛠️ #Frida #ReverseEngineering github.com/ksg97031/frida…

hahwul's tweet image. Check out this awesome project on GitHub: Frida Gadget.

A powerful tool that automates APK patching to integrate Frida Gadget by downloading the library and injecting code into the main activity🛠️ #Frida #ReverseEngineering

github.com/ksg97031/frida…

Aspasht reposted

IDA Free Step-by-Step Reverse Engineering Part 1 of our 12 part Patreon series unlocked❤️


Aspasht reposted

नाति पुस्तालाई गोली हान्न आदेश दिने … सबैप्रति धिक्कार छ 😢 🙏🏼


Aspasht reposted

This should be our demand!

smadixit's tweet image. This should be our demand!

Aspasht reposted
ShahBalen's tweet image.

Aspasht reposted

When a SSRF is enough: Full Docker Escape on Windows Docker Desktop (CVE-2025-9074) blog.qwertysecurity.com/Articles/blog3… "How was it found It was by mistake actually, I did not know much about container separations and its implication"


Aspasht reposted

An Introduction into Stack Spoofing dtsec.us/2023-09-15-Sta…

5mukx's tweet image. An Introduction into Stack Spoofing

dtsec.us/2023-09-15-Sta…
5mukx's tweet image. An Introduction into Stack Spoofing

dtsec.us/2023-09-15-Sta…

Aspasht reposted

🎉 Big news! 🚨 Next Nepal Cloud Meetup is happening on Aug 30! 🕓 2:00 PM – 4:00 PM NPT (UTC+5:45) | 🖥️ Online via Microsoft Teams.🔗 RSVP: meetup.com/nepalcloudpro/… #NepalCloudPro #MakuraCreations #Azure #GenAI #Networking #CloudSecurity 🚀 Don’t miss out!

NepalCloudP's tweet image. 🎉 Big news! 🚨 Next Nepal Cloud Meetup is happening on Aug 30!
🕓 2:00 PM – 4:00 PM NPT (UTC+5:45) | 🖥️ Online via Microsoft Teams.🔗 RSVP: meetup.com/nepalcloudpro/…
#NepalCloudPro #MakuraCreations #Azure #GenAI #Networking #CloudSecurity 🚀 Don’t miss out!

Aspasht reposted
5mukx's tweet image. Hyper-V Research

r0keb.github.io/posts/Hyper-V-…

Aspasht reposted

🚀 Call for Speakers – Nepal Cloud Professionals Passionate about #AI, #DevOps, #Cloud, or #Cybersecurity? Speak at our upcoming meetups & inspire the community! 🗣️ ~30 min talk via MS Teams 📝 Apply: forms.office.com/r/cywefzeBAV #NepalCloudPro #Azure

NepalCloudP's tweet image. 🚀 Call for Speakers – Nepal Cloud Professionals
Passionate about #AI, #DevOps, #Cloud, or #Cybersecurity? Speak at our upcoming meetups & inspire the community!
🗣️ ~30 min talk via MS Teams
📝 Apply: forms.office.com/r/cywefzeBAV
#NepalCloudPro #Azure

Aspasht reposted

Day 144 - Bug Bounty - Went today deep in authentication flows - Learned a lot about different edge cases using different encoding/null bytes - Found this repo, which constantly updates the best ATO H1 reports: github.com/reddelexc/hack… Total earned so far: $5425


Aspasht reposted

HAPPENING TODAY! 📣 Nepal Cloud Meetup- July 2025! 🚀Are you excited?😍 🕓 Time: 2:00 PM – 4:00 PM NPT 📍 Venue: Microsoft Teams Let’s connect, learn, and grow together in the cloud community! 🌥️ #NepalCloudPro #MicrosoftCloud #Azure #PowerPlatform meetup.com/nepalcloudpro/…

NepalCloudP's tweet image. HAPPENING TODAY! 📣 Nepal Cloud Meetup- July 2025! 🚀Are you excited?😍
🕓 Time: 2:00 PM – 4:00 PM NPT
📍 Venue: Microsoft Teams 
Let’s connect, learn, and grow together in the cloud community! 🌥️
#NepalCloudPro #MicrosoftCloud #Azure #PowerPlatform meetup.com/nepalcloudpro/…

Aspasht reposted

Blog for ToolShell Disclaimer: The content of this blog is provided for educational and informational purposes only. blog.viettelcybersecurity.com/sharepoint-too… #SharePoint #ToolShell

_l0gg's tweet image. Blog for ToolShell
Disclaimer: The content of this blog is provided for educational and informational purposes only.
blog.viettelcybersecurity.com/sharepoint-too…
#SharePoint #ToolShell

Aspasht reposted

I hope everyone got some rest after @DownUnderCTF this weekend. My colleague @hash_kitten wrote up a blog post on a novel technique for SQL Injection in PDO's prepared statements, required to exploit the “legendary” challenge, which only got one solve: slcyber.io/assetnote-secu…

slcyber.io

Novel SQL Injection Technique in PDO Prepared Statements

Searchlight Cyber's Security Research team details a Novel Technique for SQL Injection in PDO's Prepared Statements.


Aspasht reposted

We found a new container escape affecting all container runtimes using @NVIDIA GPUs. The crazy part? The exploit is just three lines long 🤯 This is the story of #NVIDIAScape 🧵👇

nirohfeld's tweet image. We found a new container escape affecting all container runtimes using @NVIDIA GPUs.

The crazy part?
The exploit is just three lines long 🤯

This is the story of #NVIDIAScape 🧵👇

Aspasht reposted

XSS Tip: If you find <textarea> maybe for description or any other feature. Try the below payload. </textarea><img src=x onerror=alert()> This may trigger the XSS simple payload like this <img src=x onerror=alert()> will not work in this context. #bugbountytips

_xploiterr's tweet image. XSS Tip: If you find &amp;lt;textarea&amp;gt; maybe for description or any other feature. Try the below payload.

&amp;lt;/textarea&amp;gt;&amp;lt;img src=x onerror=alert()&amp;gt;

This may trigger the XSS simple payload like this &amp;lt;img src=x onerror=alert()&amp;gt; will not work in this context.

#bugbountytips

Loading...

Something went wrong.


Something went wrong.