Hacker Trends
11/25
11/26
11/27
Statistic
11/14 22:48 (UTC)
11/25
11/26
11/27
6 Posts
GitHub - Idov31/Nidhogg at dev
https://
github.com
/Idov31/Nidhogg/tree/dev
4 Posts
OALabsLive - Twitch
https://
www.twitch.tv
/oalabslive
3 Posts
General Electric investigates claims of cyber attack, data theft
https://
www.bleepingcomputer.com
/news/security/general-electric-investigates-claims-of-cyberattack-data-theft/
3 Posts
Analysis of CVE-2023-46214 + PoC
https://
blog.hrncirik.net
/cve-2023-46214-analysis
3 Posts
How to protect against modern phishing attacks like Evilginx — Bleekseeks
https://
bleekseeks.com
/blog/how-to-protect-against-modern-phishing-attacks
3 Posts
Log in to X / X
https://
twitter.com
/i/broadcasts/1BRJjPdWZopKw
3 Posts
tmp.0ut
https://
tmpout.sh
/3/
3 Posts
Enumerating Logged-On Users on Remote Systems via Winreg Named Pipe · GitHub
https://
gist.github.com
/RalphDesmangles/22f580655f479f189c1de9e7720776f1
3 Posts
File System artifacts for known security software | Hexacorn
https://
www.hexacorn.com
/blog/2023/11/26/file-system-artifacts-for-known-security-software/
3 Posts
Ethical Hacking: What is "Ethical?" - YouTube
https://
www.youtube.com
/watch?v=8KgSXirtCYk
3 Posts
Digital Forensics Basics: A Practical Guide for DFIR Kubernetes – Sysdig
https://
sysdig.com
/blog/guide-kubernetes-forensics-dfir/