■□□□□ Playing with KAT Walk C2. (Part 1: playing actually). https://medium.com/@datacompboy/playing-with-kat-walk-c2-part-1-playing-actually-3364c324e710 https://t.me/cKure/13826
All posts tagged cyber
April 11, 2024 at 01:44PM
■■■■□ Reverse Tunnels in Go over HTTP/3 and QUIC. https://github.com/flipt-io/reverst/ https://t.me/cKure/13825
April 10, 2024 at 11:14PM
■■■□□ AI-as-a-Service Providers Vulnerable to PrivEsc and Cross-Tenant Attacks. https://thehackernews.com/2024/04/ai-as-service-providers-vulnerable-to.html https://t.me/cKure/13824
April 10, 2024 at 09:16PM
■■■□□ RUBYCARP: A Detailed Analysis of a Sophisticated Decade-Old Botnet Group. https://sysdig.com/blog/rubycarp-romanian-botnet-group/ https://t.me/cKure/13821
April 9, 2024 at 11:43PM
Bypassing anti-reversing defences in iOS applications. https://twelvesec.com/2023/10/10/bypassing-anti-reversing-defences-in-ios-applications/ https://t.me/cKure/13819
April 9, 2024 at 11:42PM
■■■■□ KDMapper: A simple tool that exploits iqvw64e.sys Intel driver to manually map non-signed drivers in memory. https://github.com/TheCruZ/kdmapper https://t.me/cKure/13818
April 9, 2024 at 11:09PM
■■■□□ Data-Leak: SAR (Saudi Arabia Railways) Allegedly Compromised: 400K Records on a Hacking Forum. According to the post, the database contains data such as first names, middle names, last names, phone numbers, email addresses, ID numbers, and dates of birth. The systems are likely vulnerable to the attack. https://t.me/cKure/13817
April 9, 2024 at 06:03PM
■■■■□ Attackers Using Obfuscation Tools to Deliver Multi-Stage Malware via Invoice Phishing. https://thehackernews.com/2024/04/attackers-using-obfuscation-tools-to.html https://t.me/cKure/13816
April 9, 2024 at 03:43PM
■□□□□ Jia Tan’s malicious SSH Agent. https://github.com/blasty/JiaTansSSHAgent https://t.me/cKure/13815
April 8, 2024 at 11:54PM
■■■■■ Critical takeover vulnerabilities in 92,000 D-Link devices under active exploitation Initially mentioned here: https://t.me/ckuRED/381 https://arstechnica.com/security/2024/04/hackers-actively-exploit-critical-remote-takeover-vulnerabilities-in-d-link-devices/ https://t.me/cKure/13813
