Profile avatar
r-netsec.bsky.social
Mirrors r/netsec, "a community-curated link aggregator of technical information security content." Unofficial. Operated by @tweedge.net, open source @ https://github.com/tweedge/xpost-reddit-to-fediverse
1,810 posts 393 followers 4 following
Prolific Poster

Hybrid Analysis Deep Dive Into Allegedly AI-Generated FunkSec Ransomware

We Deliberately Exposed AWS Keys on Developer Forums: Attackers Exploited One in 10 Hours

Obfuscating API Patches to Bypass New Windows Defender Behavior Signatures

Why a push for encryption backdoors is a global security risk

Evading Detection with Payload Pipelines

Client-Side Path Traversal - Penetesting guide | @VeryLazyTech

Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit

Burp Variables: a Burp extension that lets you store and reuse variables in outgoing requests, similar to functionality in Postman/Insomnia/other API testing clients

Massive security gaps discovered in building access systems

The Full Costs of a DIY Security Canary Program

MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client

Substack Domain Takeover

Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China

Former Disney employee files wrongful termination complaint after compromise

Bybit $1.5b hack was a Safe Wallet web app JS payload injection

Research: Using Stylometry & Topic Modeling to Attribute State-Sponsored Hacktivist Groups

Bypass AMSI in 2025

Github scam investigation: Thousands of "mods" and "cracks" stealing your data

How to Find More IDORs - @verylazytech

Join us in 2 weeks on March 12th at 13:00 GMT-5 for a meetup teamup: Liz Steininger from Least Authority and Pacu from Zcash Community Grants! The two will be presenting "Enhancing Zcash Security: a long-term engagement with Least Authority, the Zcash Ecosystem Security Lead".

An inside look at Equation/APT-C-40 TTPs from China’s lense

16 Malicious Chrome extensions infected over 3.2 mln users worldwide.

The Best Security Is When We All Agree To Keep Everything Secret (Except The Secrets) - NAKIVO Backup & Replication (CVE-2024-48248) - watchTowr Labs

Mixing up Public and Private Keys in OpenID Connect deployments

Abusing VBS Enclaves to Create Evasive Malware

Caller ID Spoofing: The Invisible Threat to Phone Security and How to Combat It

Streamlining vulnerability research with IDA Pro and Rust

DNS Zone Transfer Penetration Testing: Uncovering Hidden Risks

Methods of defeating potting compound on electronics

Exposing Shadow AI Agents: How We Extracted Financial Data from Billion-Dollar Companies

Over 35,000 Websites Targeted in Full-Page Hijack Linking to a Chinese-Language Gambling Scam

Three questions about Apple, encryption, and the U.K.

Removing Jeff Bezos from my bed

60-pages guide on how to use Bettercap on Android

Introducing keycred: A cross-platform tool for handling Active Directory Shadow Credentials/msDS-KeyCredentialLink

New Java Runtime Reverse Engineering Tool (Injected DLL, Runtime Bytecode & Heap Analysis)

RANsacked: Over 100 Security Flaws Found in LTE/5G Network Implementations

How to prove false statements? (Part 3)

Achieving RCE in famous Japanese chat tool with an obsolete Electron feature

Ivanti Endpoint Manager Credential Coercion Vulnerabilities Deep-Dive

Reinventing PowerShell in C/C++

Microsoft Edge Developer VM Remote Code Execution

Passkey Raider: Burp Suite Extension for Pentesting Passkey (Pentest & Bug Bounty)

Everyday Ghidra: How Platform Choice Influences Ghidra’s Binary Analysis

Basic Red Team Certification Pathway

Arechclient2 (sectopRAT) Analysis – A Highly Obfuscated .NET RAT with Malicious Chrome Extension

Interactive demo of an SSH honeypot using AI (open-source)

Announcing the Incident response program pack 1.5

How to approach network protocol fuzzing

PyCript WebSocket - Burp Suite extension for bypassing client-side encryption in Web Socket Messages