@anon
sign up
@anon
sign up
pull down to refresh
Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilities
www.helpnetsecurity.com/2025/07/28/vulnhuntr-open-source-tool-identify-remotely-exploitable-vulnerabilities/
110 sats
\
0 comments
\
@ch0k1
28 Jul
security
related
Announcing LNsploit - A LN exploit tool
38.8k sats
\
24 comments
\
@TonyGiorgio
11 Oct 2022
bitcoin
Multiple Linux Backdoors Discovered Targeting Bitcoin Core Developer -LukeDashJr
lordx64.medium.com/multiple-linux-backdoors-discovered-targeting-bitcoin-core-developer-technical-analysis-793f8491f561
2258 sats
\
62 comments
\
@nym
19 Jan 2023
bitcoin
Patch Tuesday brings 90 new Microsoft CVEs, six already under exploit
www.theregister.com/2024/08/14/august_patch_tuesday/
295 sats
\
0 comments
\
@dontforgetthekeys
14 Aug 2024
security
Mastodon Critical vulnerability: Remote user impersonation and takeover
github.com/mastodon/mastodon/security/advisories/GHSA-3fjr-858r-92rw
899 sats
\
0 comments
\
@kristapsk
2 Feb 2024
security
‼️ ATTENTION! Open Source Software is attacked!
805 sats
\
43 comments
\
@DarthCoin
31 May 2023
bitcoin
Over 4,000 backdoors hijacked by registering expired domains
www.bleepingcomputer.com/news/security/over-4-000-backdoors-hijacked-by-registering-expired-domains/
311 sats
\
4 comments
\
@ch0k1
11 Jan
security
How to Threat Model: A Guide to Effectively Mapping your Attack Surface
infosecwriteups.com/how-to-threat-model-a-guide-to-effectively-mapping-your-attack-surface-f46db729581a
271 sats
\
0 comments
\
@pleb_one
3 Dec 2024
security
35 Top Cybersecurity Tools
278 sats
\
0 comments
\
@Rsync25
16 Jun 2024
security
Critical Unauthenticated RCE Flaw Impacts all GNU/Linux systems
cybersecuritynews.com/critical-unauthenticated-rce-flaw/
349 sats
\
1 comment
\
@ch0k1
24 Sep 2024
news
The 5 Most Common Cybersecurity Mistakes
127 sats
\
3 comments
\
@0xbitcoiner
21 May 2024
security
Cybersecurity Tools by category
104 sats
\
0 comments
\
@Rsync25
21 Sep 2024
security
PoC Exploit Released For OpenSSH Arbitrary Code Execution Vulnerability
cybersecuritynews.com/regresshion-code-execution-vulnerability/
95 sats
\
0 comments
\
@ch0k1
7 Jan
security
20-Year-Old macOS Vulnerability Allows Attackers To Gain Root Access Remotely
cybersecuritynews.com/20-years-old-macos-vulnerability/
80 sats
\
6 comments
\
@ch0k1
28 Nov 2024
security
grsecurity - CVE-2021-4440: A Linux CNA Case Study
grsecurity.net/cve-2021-4440_linux_cna_case_study
110 sats
\
0 comments
\
@Rsync25
30 Jun 2024
security
35 Top Cybersecurity Tools
110 sats
\
1 comment
\
@Azik
4 Apr 2024
Linux
Vulnerabilities Identified in LG WebOS
www.bitdefender.com/blog/labs/vulnerabilities-identified-in-lg-webos/
110 sats
\
1 comment
\
@Gian
10 Apr 2024
security
Codebreaking Clouds
534 sats
\
0 comments
\
@r3drun3
14 Dec 2023
tech
Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution
thehackernews.com/2025/01/critical-cacti-security-flaw-cve-2025.html
13 sats
\
0 comments
\
@ch0k1
29 Jan
security
Metasploit Module Released 4 Actively Exploited SharePoint 0-Day Vulnerabilities
cybersecuritynews.com/metasploit-module-for-sharepoint-0-day/
136 sats
\
0 comments
\
@ch0k1
28 Jul
security
DoubleAgents: Fine-Tuning LLMs for Covert Malicious Tool Calls
pub.aimind.so/doubleagents-fine-tuning-llms-for-covert-malicious-tool-calls-b8ff00bf513e
121 sats
\
0 comments
\
@carter
13 Aug
AI
Bjorn: powerful network scanning security tool for the Raspberry Pi
github.com/infinition/Bjorn
112 sats
\
0 comments
\
@Rsync25
11 Nov 2024
tech
more