deckbsd's profile picture. /* InfoSec *//*  Ham Radio *//* AI junior *//* UAV Enthusiast *//* Space dreamer *//* @SatNOGS *//* @LibreSpace_Fnd */

he/him/his

deckbsd🌱🌐

@deckbsd

/* InfoSec *//* Ham Radio *//* AI junior *//* UAV Enthusiast *//* Space dreamer *//* @SatNOGS *//* @LibreSpace_Fnd */ he/him/his

deckbsd🌱🌐 รีโพสต์แล้ว

EtherHiding has been used by ClearFake since October 2023 (guard.io/labs/etherhidi…) and is still actively used in new campaigns and malware families, as observed here for SharkStealer. Google Threat Intelligence Group (cloud.google.com/blog/topics/th…) reported just last week about a…

vmray's tweet image. EtherHiding has been used by ClearFake since October 2023 (guard.io/labs/etherhidi…) and is still actively used in new campaigns and malware families, as observed here for SharkStealer.

Google Threat Intelligence Group (cloud.google.com/blog/topics/th…) reported just last week about a…

deckbsd🌱🌐 รีโพสต์แล้ว

🔥 SharkStealer - a Golang infostealer - uses the BNB Smart Chain (BSC) Testnet to resolve its C2 communication channels ("EtherHiding"). vmray.com/analyses/shark… 🔍  In a nutshell: - EtherHiding is a technique where threat actors store part of their infection chain (code or…

vmray's tweet image. 🔥 SharkStealer - a Golang infostealer - uses the BNB Smart Chain (BSC) Testnet to resolve its C2 communication channels ("EtherHiding"). vmray.com/analyses/shark…

🔍  In a nutshell:

- EtherHiding is a technique where threat actors store part of their infection chain (code or…
vmray's tweet image. 🔥 SharkStealer - a Golang infostealer - uses the BNB Smart Chain (BSC) Testnet to resolve its C2 communication channels ("EtherHiding"). vmray.com/analyses/shark…

🔍  In a nutshell:

- EtherHiding is a technique where threat actors store part of their infection chain (code or…
vmray's tweet image. 🔥 SharkStealer - a Golang infostealer - uses the BNB Smart Chain (BSC) Testnet to resolve its C2 communication channels ("EtherHiding"). vmray.com/analyses/shark…

🔍  In a nutshell:

- EtherHiding is a technique where threat actors store part of their infection chain (code or…
vmray's tweet image. 🔥 SharkStealer - a Golang infostealer - uses the BNB Smart Chain (BSC) Testnet to resolve its C2 communication channels ("EtherHiding"). vmray.com/analyses/shark…

🔍  In a nutshell:

- EtherHiding is a technique where threat actors store part of their infection chain (code or…

deckbsd🌱🌐 รีโพสต์แล้ว

すごい。 #BOTAN 単体としてもだけれど、「確実に動く衛星を作れる高度技術者の育成」が結実している🪴 おめでとうございます㊗️ #gardenslab

各局の受信協力、多くのご声援、学内外関係者皆様とともにBOTANで興奮、不安、驚き、喜びを共有できたこと、並びにBOTANが初めて撮影した地球の写真を得たこと厚く御礼申し上げます。プレスリリースの通り公開いたします。 GARDENsインストラクタ perc.it-chiba.ac.jp/news/2025/10/2…

CitGardens's tweet image. 各局の受信協力、多くのご声援、学内外関係者皆様とともにBOTANで興奮、不安、驚き、喜びを共有できたこと、並びにBOTANが初めて撮影した地球の写真を得たこと厚く御礼申し上げます。プレスリリースの通り公開いたします。

GARDENsインストラクタ  
perc.it-chiba.ac.jp/news/2025/10/2…


deckbsd🌱🌐 รีโพสต์แล้ว

📌With the Open Source Cubesat Workshop only a few days away, keep in mind that: • Registration is required for in-person attendees: events.libre.space/event/9/regist… • For those attending the event online check out @LibreSpace_Fnd's YouTube channel: youtube.com/@LibreSpaceFou…

LibreSpace_Fnd's tweet image. 📌With the Open Source Cubesat Workshop only a few days away, keep in mind that:
• Registration is required for in-person attendees: events.libre.space/event/9/regist…
• For those attending the event online check out @LibreSpace_Fnd's YouTube channel: youtube.com/@LibreSpaceFou…

deckbsd🌱🌐 รีโพสต์แล้ว

✅Bug Bounty Tips 🐞403 bypass methodology🐞 #bugbounty #bugbountytips #Professor #CyberSecurity

bughuntar's tweet image. ✅Bug Bounty Tips
🐞403 bypass methodology🐞

 #bugbounty #bugbountytips #Professor #CyberSecurity

deckbsd🌱🌐 รีโพสต์แล้ว

Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras watchfulip.github.io/28-12-24/tp-li… Credits @Watchful_IP #embedded #infosec

0xor0ne's tweet image. Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras

watchfulip.github.io/28-12-24/tp-li…

Credits @Watchful_IP

#embedded #infosec
0xor0ne's tweet image. Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras

watchfulip.github.io/28-12-24/tp-li…

Credits @Watchful_IP

#embedded #infosec

deckbsd🌱🌐 รีโพสต์แล้ว

🛰️Satelit SATurnin-1 úspěšně plní své poslání – pořizuje a odesílá snímky. 🌍 Tady je jeden z nich (není zveřejěný v plném rozlišení) Uhodnete, o které město se jedná? 👀 Napište své tipy do komentářů! 👇 @ObranaTweetuje @VZpravodajstvi


deckbsd🌱🌐 รีโพสต์แล้ว

Hacking a Banned Chinese Security Camera hackaday.com/2025/10/18/hac…


deckbsd🌱🌐 รีโพสต์แล้ว

Valve Anti-Cheat (VAC) reverse engineering codeneverdies.github.io/posts/gh-2/ Credits @codeneverdies #cybersecurity

0xor0ne's tweet image. Valve Anti-Cheat (VAC) reverse engineering

codeneverdies.github.io/posts/gh-2/

Credits @codeneverdies

#cybersecurity

deckbsd🌱🌐 รีโพสต์แล้ว

FPV camera decoding on LiteX M2 SDR with GNU Radio and gr-ntsc-rc :)


deckbsd🌱🌐 รีโพสต์แล้ว

The Dwingeloo @radiotelescoop just tracked the satellite GHS-01 as a @SatNOGS ground station.View the results at network.satnogs.org/observations/1….

PI9CAM's tweet image. The Dwingeloo @radiotelescoop just tracked the satellite GHS-01 as a @SatNOGS ground station.View the results at network.satnogs.org/observations/1….

deckbsd🌱🌐 รีโพสต์แล้ว

🔍 Bug Bounty Tip: WAF Bypass Evade WAF’s URL normalization with double encoding (%252f) or unusual paths. Example: /api/v1/%2e%2e/%2e%2e/config?id=1%252bUNION%252bSELECT%252bsecrets-- Test only on authorized systems! 🛡️

HackingTeam777's tweet image. 🔍 Bug Bounty Tip: WAF Bypass
Evade WAF’s URL normalization with double encoding (%252f) or unusual paths.

Example: /api/v1/%2e%2e/%2e%2e/config?id=1%252bUNION%252bSELECT%252bsecrets--

Test only on authorized systems! 🛡️

deckbsd🌱🌐 รีโพสต์แล้ว

See how @JohnHammond explores the latest features in Burp Suite Professional version 2025.2.3. Get his expert take on what's new and how it impacts your testing workflow. Check out the full video here 👇 youtu.be/v-McepNOrTQ?si…


deckbsd🌱🌐 รีโพสต์แล้ว

Using Artificial Intelligence (AI) in Cybersecurity: Using AI for Port Scanning hackers-arise.com/artificial-int…


deckbsd🌱🌐 รีโพสต์แล้ว

tell me any better XSS methodology than this 😎 Explanation: This oneliner command starts by collecting all URLs from passive sources using gau tool, then filters them for potential XSS parameters using gf patterns. Next, httpx and grep are used to keep only URLs that return…

coffinxp7's tweet image. tell me any better XSS methodology than this 😎
Explanation:
This oneliner command starts by collecting all URLs from passive sources using gau tool, then filters them for potential XSS parameters using gf patterns. Next, httpx and grep are used to keep only URLs that return…

deckbsd🌱🌐 รีโพสต์แล้ว

The Dwingeloo @radiotelescoop just tracked the satellite Dragonfly as a @SatNOGS ground station.View the results at network.satnogs.org/observations/1….

PI9CAM's tweet image. The Dwingeloo @radiotelescoop just tracked the satellite Dragonfly as a @SatNOGS ground station.View the results at network.satnogs.org/observations/1….

deckbsd🌱🌐 รีโพสต์แล้ว

New blog post: 10 years of blogging. Today it's 10 years since I wrote the first post in my blog. To celebrate I have made a summary of what I have been posting during these years. This can serve as a good index for people who are not too familiar with the blog's contents.


deckbsd🌱🌐 รีโพสต์แล้ว

Bypass the uploader and upload any file the attacker wants just by using the null byte %0d%0a Bypass technique used : shell.php%0d%0a.jpg Tip: Always test all null bytes #bugbountytips #bugbounty #CyberSecurity #Developers #RedTeaming #bug #Security


deckbsd🌱🌐 รีโพสต์แล้ว

The first day of the ESTEC Open Days is done and we had so much fun speaking to all of our visitors today! 🚀 If you're visiting us tomorrow, don't forget to pass by, have a chat and grab some goodies! We're the ones with the rockets 😉


United States เทรนด์

Loading...

Something went wrong.


Something went wrong.