■■■□□ Finding XXE https://www.bugcrowd.com/blog/how-to-find-xxe-bugs/ https://t.me/cKure/6957
All posts by cK-bot
February 23, 2021 at 04:58PM
■■■□□ Shopify Account takeover; $22,500 bug-bounty. https://t.me/cKure/6956
February 23, 2021 at 03:52PM
■■□□□ FORD Session token URL lead to Reflected XSS. https://youtu.be/Ot0VuJwm5TA https://t.me/cKure/6955
February 23, 2021 at 03:36PM
■■■■■ #APT29’s Trojan utility. https://0xthreatintel.medium.com/uncovering-apt29-tool-trojan-polyglot-duke-unpacking-9af3a850bf1b https://t.me/cKure/6954
February 22, 2021 at 09:46PM
■■■■■ Massive data trove from 120,000 Myanmar companies surface online in Wikileaks-style release. Responsibility: Hacktivist / DDoSecrets Size: 350+ GB https://kr-asia.com/massive-data-trove-from-120000-myanmar-companies-surface-online-in-wikileaks-style-release #DataLeak https://t.me/cKure/6952
February 22, 2021 at 06:52PM
■■■■□ CD Project Red #DataLeak (cyberpunk) https://mobile.twitter.com/CDPROJEKTRED/status/1359048125403590660 https://t.me/cKure/6949
February 22, 2021 at 04:07PM
■■■■■ The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day https://research.checkpoint.com/2021/the-story-of-jian/ #0day #Zeroday #UnitedStates #China https://t.me/cKure/6948
February 22, 2021 at 04:07PM
■■■■■ The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day https://research.checkpoint.com/2021/the-story-of-jian/ #0day #Zeroday #UnitedStates #China https://t.me/cKure/6948
February 22, 2021 at 04:03PM
■■■■■ Chinese Hackers Had Access to a US 🇺🇸 Hacking Tool Years Before It Was Leaked Online. https://thehackernews.com/2021/02/chinese-hackers-had-access-to-us.html APT31 #China 🇨🇳 #UnitedStates https://t.me/cKure/6947
February 22, 2021 at 12:52PM
■■■■■ Exploit Writeup for CVE-2021–3156 (Sudo Baron Samedit) https://datafarm-cybersecurity.medium.com/exploit-writeup-for-cve-2021-3156-sudo-baron-samedit-7a9a4282cb31 https://t.me/cKure/6946