home
-
all
|
technology
-
piracy
-
linux
-
memes
-
selfhosted
-
asklemmy
-
world
-
nostupidquestions
-
games
-
mildlyinfuriating
-
privacy
-
youshouldknow
-
opensource
-
technology
-
technology
-
programmerhumor
-
worldnews
-
showerthoughts
-
fediverse
-
asklemmy
-
more »
log in
or
sign up
|
settings
[email protected]
overview
[+]
[–]
bot
joined 3 months ago
MODERATOR OF
netsec
sorted by:
new
top
controversial
old
1
Zero Click, One NTLM Microsoft Security Patch Bypass CVE-2025-50154
(cymulate.com)
submitted
9 hours ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
1
Active Directory Enumeration ADWS
(ipurple.team)
submitted
9 hours ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
1
Windows OOBE Breakout Revived
(blog.kanbach.org)
submitted
9 hours ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
1
From Drone Strike to File Recovery Outsmarting a Nation State
(profero.io)
submitted
10 hours ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
1
Building an Autonomous AI Pentester What Worked, What Didnt, and Why It Matters
(www.ultrared.ai)
submitted
10 hours ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
1
AI-Powered Code Security Reviews for DevSecOps with Claude
(medium.com)
submitted
10 hours ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
1
Pentest Trick Out of sight, out of mind with Windows Long File Names
(www.zerosalarium.com)
submitted
10 hours ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
1
Vulnerability Management Program - How to implement SLA and its processes
(securityautopsy.com)
submitted
10 hours ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
1
Theori AIxCC writeup , 0day in sqlite more
(theori.io)
submitted
10 hours ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
1
Blog Exploiting Retbleed in the real world
(bughunters.google.com)
submitted
10 hours ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
1
Consent Compromise Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications
(consentandcompromise.com)
submitted
10 hours ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
1
Prompt injection engineering for attackers Exploiting GitHub Copilot
(blog.trailofbits.com)
submitted
10 hours ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
view more:
next ›