GitHub Dataset Research Reveals Millions Potentially Vulnerable to RepoJacking https://blog.aquasec.com/github-dataset-research-reveals-millions-potentially-vulnerable-to-repojacking
Redrawing Infosec Boundaries: The Impact of Large AI Models https://rob.science/2023/04/22/redrawing-infosec-boundaries-the-impact-of-large-ai-models/
canTot: exploit framework focused on known CAN Bus vulnerabilities or fun CAN Bus hacks https://securityonline.info/cantot-exploit-framework-focused-on-known-can-bus-vulnerabilities-or-fun-can-bus-hacks/
Super Store Finder PHP Script 3.6 SQL Injection Vulnerability https://0day.today/exploit/description/38848
RogueSliver: A suite of tools to disrupt campaigns using the Sliver C2 framework. https://github.com/ACE-Responder/RogueSliver
WSPCoerce: PoC to coerce authentication from Windows hosts using MS-WSP https://github.com/slemire/WSPCoerce
Wolfram|Alpha as the Way to Bring Computational Knowledge Superpowers to ChatGPT https://writings.stephenwolfram.com/2023/01/wolframalpha-as-the-way-to-bring-computational-knowledge-superpowers-to-chatgpt/
Types of Cryptography - Non-Quantum vs Quantum https://pbs.twimg.com/media/FzPftzBXwBMurfH?format=jpg&name=900x900
OSCP Enumeration Cheat Sheet https://pbs.twimg.com/media/F2HWy_LWgAI5hT1?format=jpg&name=4096x4096
Bitcoin and Elliptic Curves https://twitter.com/ln_capital/status/1685653991013638144
Why I have become a Bitcoin Maximalist https://youtu.be/bgMfqIneR5I
Volt Typhoon targets US critical infrastructure with living-off-the-land techniques https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/
Chimera - Automated DLL Sideloading Tool With EDR Evasion Capabilities https://www.kitploit.com/2023/08/chimera-automated-dll-sideloading-tool.html?m=1
NoFilter - Abusing Windows Filtering Platform for Privilege Escalation https://www.deepinstinct.com/blog/nofilter-abusing-windows-filtering-platform-for-privilege-escalation
Tracking Down a Suspect through Cell Phone Records https://www.schneier.com/blog/archives/2023/07/tracking-down-a-suspect-through-cell-phone-records.html
Attacking JS engines: Fundamentals for understanding memory corruption crashes https://www.sidechannel.blog/en/attacking-js-engines/
Gandalf - Practice Your Security Prompting Skills https://www.schneier.com/blog/archives/2023/07/practice-your-security-prompting-skills.html?utm_source=dlvr.it&utm_medium=twitter
Apple iOS Cyber Software Engineer - Top Secret SCI https://www.crowdcyber.com/contactus
Breaking the Code - Exploiting and Examining CVE-2023-1829 in cls_tcindex Classifier Vulnerability https://starlabs.sg/blog/2023/06-breaking-the-code-exploiting-and-examining-cve-2023-1829-in-cls_tcindex-classifier-vulnerability/
Freemius WordPress SDK used by 7M sites is vulnerable to XSS attack (CVE-2023-33999) https://securityonline.info/freemius-wordpress-sdk-used-by-7m-sites-is-vulnerable-to-xss-attack-cve-2023-33999/