Tag: IFTTT
-
PyShell – Shellify Your HTTP Command Injection [GitHub] via /r/netsec
PyShell – Shellify Your HTTP Command Injection [GitHub] http://ift.tt/2dC95xD
-
Reversing the Smarter Coffee IoT Machine Protocol to Make Coffee Using the Terminal. via /r/netsec
Reversing the Smarter Coffee IoT Machine Protocol to Make Coffee Using the Terminal. http://ift.tt/2d4wi7K
-
WordPress RCE via specially crafted .mo language file via /r/netsec
WordPress RCE via specially crafted .mo language file http://ift.tt/2dCcvCK
-
Javascript Leads to Browser Hijacking via /r/netsec
Javascript Leads to Browser Hijacking http://ift.tt/2dVH1HH Submitted October 08, 2016 at 11:00PM by campuscodi via reddit http://ift.tt/2e0hVn1
-
Gitem – A Github organization reconnaissance tool via /r/netsec
Gitem – A Github organization reconnaissance tool http://ift.tt/2dIUI90 Submitted October 08, 2016 at 05:46PM by Schwag via reddit http://ift.tt/2dEe4g6
-
Scripts that automate OWASP ZAP as part of a continuous delivery pipeline via /r/netsec
Scripts that automate OWASP ZAP as part of a continuous delivery pipeline http://ift.tt/2dIpgaN Submitted October 08, 2016 at 03:10PM by kerberosmansour via reddit http://ift.tt/2cYXf16
-
Making Jetty Bleed via /r/netsec
Making Jetty Bleed http://ift.tt/2ec3zmm
-
Exploiting the OpenNMS/Jenkins RMI Java Deserialization Vulnerability via /r/netsec
Exploiting the OpenNMS/Jenkins RMI Java Deserialization Vulnerability http://ift.tt/2dBLqw3 Submitted October 08, 2016 at 11:55AM by smittix via reddit http://ift.tt/2dDApdW
-
Adventure Time – Warsaw Windows (Signed Network Driver ready to use) via /r/netsec
Adventure Time – Warsaw Windows (Signed Network Driver ready to use) http://ift.tt/2dBo35u Submitted October 08, 2016 at 06:11AM by j_jjjj via reddit http://ift.tt/2ebQJEM
-
Air-Hammer: New tool that leverages OSINT to break into WPA Enterprise networks via /r/netsec
Air-Hammer: New tool that leverages OSINT to break into WPA Enterprise networks http://ift.tt/2dz00be