Forwarded from Information Security
Windows Hacking/Red teaming resources
https://docs.google.com/document/d/1HYPX0MMn2Qc0TNYRRIaaYU2GIbuTMXHm-JBhRR2vNMU/mobilebasic
https://docs.google.com/document/d/1HYPX0MMn2Qc0TNYRRIaaYU2GIbuTMXHm-JBhRR2vNMU/mobilebasic
Forwarded from Android Security & Malware
Andromeda - Interactive Reverse Engineering Tool for Android apps
https://github.com/secrary/Andromeda
https://github.com/secrary/Andromeda
GitHub
GitHub - secrary/Andromeda: Andromeda - Interactive Reverse Engineering Tool for Android Applications
Andromeda - Interactive Reverse Engineering Tool for Android Applications - secrary/Andromeda
Forwarded from Hacking Resources
research.securitum.com
Write-up of DOMPurify 2.0.0 bypass using mutation XSS - research.securitum.com
Yesterday, a new version of DOMPurify (very popular XSS sanitization library) was released, that fixed a bypass reported by us. In this post I’ll show how exactly the bypass looked like preceded by general information about DOMPurify and how it works. If…
Forwarded from The Bug Bounty Hunter
Huge list of companies with active bug bounties
https://www.hacks.icu/Thread-Huge-list-of-companies-with-active-bug-bounties?pid=2192
https://www.hacks.icu/Thread-Huge-list-of-companies-with-active-bug-bounties?pid=2192
Forwarded from DARKNET BR via @like
Hacking VoIP: Protocols, Attacks, and Countermeasures.epub
5.4 MB
https://portswigger.net/web-security/cross-site-scripting/cheat-sheet
really HelpFull For Bounty Hunters :)
really HelpFull For Bounty Hunters :)
portswigger.net
Cross-Site Scripting (XSS) Cheat Sheet - 2025 Edition | Web Security Academy
Interactive cross-site scripting (XSS) cheat sheet for 2025, brought to you by PortSwigger. Actively maintained, and regularly updated with new vectors.
Forwarded from The Bug Bounty Hunter
Unrestricted file upload vulnerability
https://medium.com/@519udhaya/unrestricted-file-upload-vulnerability-bba4491a08da
https://medium.com/@519udhaya/unrestricted-file-upload-vulnerability-bba4491a08da
Medium
Unrestricted file upload vulnerability
Hi guys whatsup! This is Udhay an security researcher . Here im presenting my research on unrestricted file upload vulnerablities.
Long command execute with your own shortcuts by aliases in unix terminal. :)
https://linuxize.com/post/how-to-create-bash-aliases/
https://linuxize.com/post/how-to-create-bash-aliases/
Linuxize
How to Create Bash Aliases
Bash aliases are essentially shortcuts that can save you from having to remember long commands and eliminate a great deal of typing when you are working on the command line.
If you're intrested in Nmap Scanning, In EXPERT WAY! 😎 Read this
@exploithub
https://nmap.org/book/toc.html
@exploithub
https://nmap.org/book/toc.html
nmap.org
Nmap Network Scanning
Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing…