Hacker Trends
06/08
06/09
06/10
Statistic
10/23 08:26 (UTC)
06/08
06/09
06/10
8 Posts
Malicious VSCode extensions with millions of installs discovered
https://
www.bleepingcomputer.com
/news/security/malicious-visual-studio-code-extensions-with-millions-of-installs-discovered/
7 Posts
Fuzzing Redux, leveraging AFL++ Frida-Mode on Android native libraries - KnifeCoat
https://
knifecoat.com
/Posts/Fuzzing+Redux%2C+leveraging+AFL%2B%2B+Frida-Mode+on+Android+native+libraries
6 Posts
The CTI Analyst Challenge
https://
blog.bushidotoken.net
/2024/06/the-cti-analyst-challenge.html
3 Posts
New York Times source code stolen using exposed GitHub token
https://
www.bleepingcomputer.com
/news/security/new-york-times-source-code-stolen-using-exposed-github-token/
3 Posts
GitHub - dazzyddos/HSC24RedTeamInfra: Slides and Codes used for the workshop Red Team Infrastructure Automation
https://
github.com
/dazzyddos/HSC24RedTeamInfra
3 Posts
Abusing auto mail responders to access internal workplaces | by Rikesh Baniya | Jun, 2024 | Medium
https://
link.medium.com
/O0D1BuLugKb
3 Posts
PE Section names – re-visited, again | Hexacorn
https://
www.hexacorn.com
/blog/2024/06/08/pe-section-names-re-visited-again-2/
3 Posts
Develop your own C# Obfuscator – Ribbit-ing Cybersecurity
https://
www.ribbiting-sec.info
/posts/2024-06-05_csharp_obfuscator/
3 Posts
Workshops - DEATHCon 2024 - Detection Engineering and Threat Hunting
https://
deathcon.io
/workshops.html
3 Posts
Malware and cryptography 28: RC4 payload encryption. Simple Nim example. - cocomelonc
https://
cocomelonc.github.io
/malware/2024/06/01/malware-cryptography-28.html
3 Posts
CyberDefenseReport_%20From%20Vegas%20to%20Chengdu.pdf
https://
css.ethz.ch
/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/CyberDefenseReport_%20From%20Vegas%20to%20Chengdu.pdf
3 Posts
GhostRace - vusec
https://
www.vusec.net
/projects/ghostrace/
3 Posts
Week 23 – 2024 – This Week In 4n6
https://
thisweekin4n6.com
/2024/06/09/week-23-2024/