Release v3.5.0 · projectdiscovery/nuclei
https://github.com/projectdiscovery/nuclei/releases/tag/v3.5.0
https://github.com/projectdiscovery/nuclei/releases/tag/v3.5.0
GitHub
Release v3.5.0 · projectdiscovery/nuclei
What's Changed
🎉 New Features
Adding json + xpath headless extractors by @Mzack9999 in #6559
Adding VNC auth by @Mzack9999 in #6413
Feat(templating): add vars templating into yaml inputs (ytt)...
🎉 New Features
Adding json + xpath headless extractors by @Mzack9999 in #6559
Adding VNC auth by @Mzack9999 in #6413
Feat(templating): add vars templating into yaml inputs (ytt)...
❤6👎2
When The Impersonation Function Gets Used To Impersonate Users (Fortinet FortiWeb Auth. Bypass CVE-2025-64446)
https://labs.watchtowr.com/when-the-impersonation-function-gets-used-to-impersonate-users-fortinet-fortiweb-auth-bypass/
https://labs.watchtowr.com/when-the-impersonation-function-gets-used-to-impersonate-users-fortinet-fortiweb-auth-bypass/
watchTowr Labs
When The Impersonation Function Gets Used To Impersonate Users (Fortinet FortiWeb Auth. Bypass CVE-2025-64446)
The Internet is ablaze, and once again we all have a front-row seat - a bad person, if you can believe it, is doing a bad thing!
The first warning of such behaviour came from the great team at Defused:
As many are now aware, an unnamed (and potentially…
The first warning of such behaviour came from the great team at Defused:
As many are now aware, an unnamed (and potentially…
❤4
Level up your Solidity LLM tooling with Slither-MCP
https://blog.trailofbits.com/2025/11/15/level-up-your-solidity-llm-tooling-with-slither-mcp/
https://blog.trailofbits.com/2025/11/15/level-up-your-solidity-llm-tooling-with-slither-mcp/
The Trail of Bits Blog
Level up your Solidity LLM tooling with Slither-MCP
We’re releasing Slither-MCP, a new tool that augments LLMs with Slither’s unmatched static analysis engine.
❤3
Forwarded from Android Security & Malware
Flutter SSL Bypass: How to Intercept HTTPS Traffic When all other Frida Scripts Fail
https://m4kr0x.medium.com/flutter-tls-bypass-how-to-intercept-https-traffic-when-all-other-frida-scripts-fail-bd3d04489088
https://m4kr0x.medium.com/flutter-tls-bypass-how-to-intercept-https-traffic-when-all-other-frida-scripts-fail-bd3d04489088
Medium
Flutter SSL Bypass: How to Intercept HTTPS Traffic When all other Frida Scripts Fail
In this article, I’ll walk you through my journey in intercepting HTTPS traffic from a APK based on Flutter during a pentesting engagement…
❤21👎3🤔1
Securing GitHub Actions With SonarQube: Real-World Examples
https://www.sonarsource.com/blog/securing-github-actions-with-sonarqube-real-world-examples/
https://www.sonarsource.com/blog/securing-github-actions-with-sonarqube-real-world-examples/
Sonarsource
Securing GitHub Actions With SonarQube: Real-World Examples
This blog introduces SonarQube's enhanced analysis capabilities for GitHub Actions, designed to proactively identify and remediate security vulnerabilities like Command Injection and Code Execution that pose a significant supply chain risk.
❤2🔥1
Intigriti wins ‘Security Innovation of the Year’ at the 2025 UK IT Industry Awards
https://www.intigriti.com/blog/awards/intigriti-wins-security-innovation-of-the-year-at-the-2025-uk-it-industry-awards
https://www.intigriti.com/blog/awards/intigriti-wins-security-innovation-of-the-year-at-the-2025-uk-it-industry-awards
Intigriti
Intigriti wins ‘Security Innovation of the Year’ at the 2025 UK IT Industry Awards
Intigriti has won Security Innovation of the Year at the UK IT Industry Awards 2025.
❤4
We found cryptography bugs in the elliptic library using Wycheproof
https://blog.trailofbits.com/2025/11/18/we-found-cryptography-bugs-in-the-elliptic-library-using-wycheproof/
https://blog.trailofbits.com/2025/11/18/we-found-cryptography-bugs-in-the-elliptic-library-using-wycheproof/
The Trail of Bits Blog
We found cryptography bugs in the elliptic library using Wycheproof
Trail of Bits discovered and disclosed two vulnerabilities in the widely used elliptic JavaScript library that could allow signature forgery or prevent valid signature verification, with one vulnerability still unfixed after the 90-day disclosure window.
❤3
Securing GitHub Actions With SonarQube: Real-World Examples
https://www.sonarsource.com/blog/securing-github-actions-with-sonarqube-real-world-examples/
https://www.sonarsource.com/blog/securing-github-actions-with-sonarqube-real-world-examples/
Sonarsource
Securing GitHub Actions With SonarQube: Real-World Examples
This blog introduces SonarQube's enhanced analysis capabilities for GitHub Actions, designed to proactively identify and remediate security vulnerabilities like Command Injection and Code Execution that pose a significant supply chain risk.
❤3
Black Friday and Cyber Monday price distortion identification
https://www.intigriti.com/blog/business-insights/black-friday-and-cyber-monday-price-distortion-identification
https://www.intigriti.com/blog/business-insights/black-friday-and-cyber-monday-price-distortion-identification
Intigriti
Black Friday and Cyber Monday price distortion identification
Three types of price manipulation techniques threat actors are using this Black Friday and Cyber Monday
❤6
Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
http://security.googleblog.com/2025/11/android-quick-share-support-for-airdrop-security.html
http://security.googleblog.com/2025/11/android-quick-share-support-for-airdrop-security.html
Google Online Security Blog
Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
Posted by Dave Kleidermacher, VP, Platforms Security & Privacy, Google Technology should bring people closer together, not create walls. ...
❤7
Securing GitHub Actions With SonarQube: Real-World Examples
https://www.sonarsource.com/blog/securing-github-actions-with-sonarqube-real-world-examples/
https://www.sonarsource.com/blog/securing-github-actions-with-sonarqube-real-world-examples/
Sonarsource
Securing GitHub Actions With SonarQube: Real-World Examples
This blog introduces SonarQube's enhanced analysis capabilities for GitHub Actions, designed to proactively identify and remediate security vulnerabilities like Command Injection and Code Execution that pose a significant supply chain risk.
❤1
From Token to Takeover: Exploiting Weak HS256 Secrets (POC)
https://medium.com/@1998satheesh/from-token-to-takeover-exploiting-weak-hs256-secrets-poc-c53afb9a75a0
https://medium.com/@1998satheesh/from-token-to-takeover-exploiting-weak-hs256-secrets-poc-c53afb9a75a0
Medium
From Token to Takeover: Exploiting Weak HS256 Secrets (POC)
🔓 Cracking a Weak HS256 JWT: How I Forged a Token and Retrieved the Masterkey
❤7👎1
Intigriti Bug Bytes #230 - November 2025 🚀
https://www.intigriti.com/researchers/blog/bug-bytes/intigriti-bug-bytes-230-november-2025
https://www.intigriti.com/researchers/blog/bug-bytes/intigriti-bug-bytes-230-november-2025
Intigriti
Intigriti Bug Bytes #230 - November 2025 🚀
Hi hackers, Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring: Finding an RCE using AI in GitHub CORS exploitation cheat sheet Scanning codebases with AI Bypass...
❤8
Sonar honored in Fast Company
https://www.sonarsource.com/blog/sonar-honored-in-fast-company-next-big-things-in-tech/
https://www.sonarsource.com/blog/sonar-honored-in-fast-company-next-big-things-in-tech/
Sonarsource
Sonar honored in Fast Company's Next Big Things in Tech — Bringing trust to AI-driven development
We’re excited to announce that Sonar has been named a Fast Company Next Big Things in Tech honoree for Applied AI! This prestigious award honors technology breakthroughs poised to define the future of their industries.
❤3
Announcing SonarSweep: Improving training data quality for coding LLMs
https://www.sonarsource.com/blog/announcing-sonarsweep-improving-training-data-quality-for-coding-llms/
https://www.sonarsource.com/blog/announcing-sonarsweep-improving-training-data-quality-for-coding-llms/
Sonarsource
Announcing SonarSweep: Improving training data quality for coding LLMs
The promise of AI-assisted coding is immense, but it rests on a simple, fundamental reality: the quality and security of the code generated by a Large Language Model (LLM) depends on the quality of the data that it was trained on.
❤4👍1
Understanding signal-to-noise for vulnerability management success
https://www.intigriti.com/blog/business-insights/understanding-signal-to-noise-for-vulnerability-management-success
https://www.intigriti.com/blog/business-insights/understanding-signal-to-noise-for-vulnerability-management-success
Intigriti
Understanding signal-to-noise for vulnerability management success
Turn your signal-to-noise ratio into a key metric, learn how to score it, and identify challenges regarding scope, policy, staff, rewards, researchers, and processes.
❤1👎1
Stop Putting Your Passwords Into Random Websites (Yes, Seriously, You Are The Problem)
https://labs.watchtowr.com/stop-putting-your-passwords-into-random-websites-yes-seriously-you-are-the-problem/
https://labs.watchtowr.com/stop-putting-your-passwords-into-random-websites-yes-seriously-you-are-the-problem/
watchTowr Labs
Stop Putting Your Passwords Into Random Websites (Yes, Seriously, You Are The Problem)
Welcome to watchTowr vs the Internet, part 68.
That feeling you’re experiencing? Dread. You should be used to it by now.
As is fast becoming an unofficial and, apparently, frowned upon tradition - we identified incredible amounts of publicly exposed passwords…
That feeling you’re experiencing? Dread. You should be used to it by now.
As is fast becoming an unofficial and, apparently, frowned upon tradition - we identified incredible amounts of publicly exposed passwords…
❤1👍1
Constant-time support lands in LLVM: Protecting cryptographic code at the compiler level
https://blog.trailofbits.com/2025/11/25/constant-time-support-lands-in-llvm-protecting-cryptographic-code-at-the-compiler-level/
https://blog.trailofbits.com/2025/11/25/constant-time-support-lands-in-llvm-protecting-cryptographic-code-at-the-compiler-level/
❤1
🔥 Intigriti Challenge 1125 — JWT Confusion to SSTI → RCE (My Fastest CTF Solve Ever)
https://savi0r.medium.com/intigriti-challenge-1125-jwt-confusion-to-ssti-rce-my-fastest-ctf-solve-ever-43d43df4182c
https://savi0r.medium.com/intigriti-challenge-1125-jwt-confusion-to-ssti-rce-my-fastest-ctf-solve-ever-43d43df4182c
Medium
🔥 Intigriti Challenge 1125 — JWT Confusion to SSTI → RCE (My Fastest CTF Solve Ever)
By: savi0r Date: November 2025 Duration: ~3 hours Result: Full Solve (JWT Admin Takeover → SSTI → RCE → Flag) Status: ✅ Completed
🔥5❤1
An Evening with Claude (Code) - SpecterOps
https://specterops.io/blog/2025/11/21/an-evening-with-claude-code/
https://specterops.io/blog/2025/11/21/an-evening-with-claude-code/
SpecterOps
An Evening with Claude (Code) - SpecterOps
This blog post explores a bug, (CVE-2025-64755), I found while trying to find a command execution primitive within Claude Code to demonstrate the risks of web-hosted MCP to a client.
👍3❤2