rvismit / Gyanam

This repository is about Learn | Hack | Share | Repeat.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Gyanam

This repository is about Learn | Hack | Share | Repeat.

Updates on Every Tuesday :)

#TechieTuesday

S. No Topic Link
1.OSS Process Wishlisthttps://bit.ly/34n9Ozb
2.Secure Development Serieshttps://bit.ly/3fcKCNW
3.Abusing Google Play Billing For Fun And Unlimited Creditshttps://bit.ly/33JnCUi
4.Introducing a new phishing technique for compromising Office 365 accountshttps://bit.ly/3rNt2Wx
5.Useful LDAP queries for Windows Active Directory pentestinghttps://bit.ly/3481JhR
6.Common Misconfigurations in CISCO Phone Systemshttps://bit.ly/3361raJ
7.Scraping search APIs - Depth first stylehttps://bit.ly/3JKsfgD
8.Fault Injection Reference Modelhttps://bit.ly/3pqZkGH
9.The DNS over HTTPS (DoH) Messhttps://bit.ly/3tfAQRL
10.kdigger: a Context Discovery Tool for Kuberneteshttps://bit.ly/3HPg5S7
11.Understanding Zigbee and Wireless Mesh Networkinghttps://bit.ly/3J7eYi2
12.Shadow Attackshttps://bit.ly/3tqXXtU
13.Bug hunting with static analysis toolshttps://bit.ly/3wKTLHw
14.ARM Assembly Basicshttps://bit.ly/3j2d5b0
15.Pwning a Server using Markdownhttps://bit.ly/3KwPQ5d
16.Pentesting CISCO ACI: LLDP Mishandlinghttps://bit.ly/3KVfgJT
17.JWT Security Issueshttps://bit.ly/3LhI4fO
18.QEMU Case Studyhttp://phrack.org/issues/70/5.html#article
19.Kubernetes and HostPath, a Love-Hate Relationshiphttps://bit.ly/3yOv3a2
20.XSS With Hoistinghttps://bit.ly/3LHNMHf
21.WordPress Plugin Security Testing Cheat Sheethttps://bit.ly/3PRDKXd
22.IoT Hacking - The use of radio attacks during Red Team Exercisehttps://bit.ly/3O080O6
23.You Cannot Detect Techniques in the Execution Tactic! And What To Do Insteadhttps://bit.ly/3zDza9y
24.HTTP/2: The Sequel is Always Worsehttps://bit.ly/39C2Wkp
25.Hacking an AWS hosted Kubernetes and Failinghttps://bit.ly/3nmw9mA
26.Cookie Tossinghttps://bit.ly/3AsZtj8
27.STATIC TAINT ANALYSIS USING BINARY NINJAhttps://bit.ly/3Iva130
28.Lock Pickinghttps://bit.ly/3RHRkxp
29-30.Ngrev(Tool)https://bit.ly/3zPfi2D
31.Thalos(Tool)https://bit.ly/3BOfpwZ
32.How a good idea turns into a SPF (Security Product Failure)https://bit.ly/3Cq6BxN
33.Authentication coercion of the Windows “Server” servicehttps://bit.ly/3KaL5yJ
34.-35.A proposal for a new amateur radio nethttps://bit.ly/3RVjZyr
36.DEVELOPING CTF'Shttps://bit.ly/3xdSA2A
37.Memory forensics with Kernel-level ASLRhttps://bit.ly/3eVAFHz
38.Reversing the Pokit Meter's Bluetooth Protocolhttps://bit.ly/3RhJmtc
39.GCP Penetration Testinghttps://bit.ly/3Cm6jWQ
40.Achieving DevSecOps with Open-Source Toolshttps://bit.ly/3SQddL5
41.Proof of Being Forgotten: Verified Privacy Protection in Confidential Computing Platformhttps://bit.ly/3CF5zMO
42.Building a high throughput low-latency PCIe based SDRhttps://bit.ly/3smTcAj
43.Hacking IoT & RF Devices with BürtleinaBoardhttps://bit.ly/3Np4EEU
44.Telephone Signalling Methodshttps://bit.ly/3WHGSs7
45.GraphQL Voyager as a tool for API security testinghttps://bit.ly/3hIHwFR
46.Conducting OSINT on Githubhttps://bit.ly/3gvnsX7
47.DNSMonster: passive DNS monitoringhttps://bit.ly/3Usfb4k
48.ARMX Firmware Emulation Frameworkhttps://bit.ly/3HMzHtV
49.0-Day Huntinghttps://bit.ly/3Vc0OS7
50.Car Hacking: For Poorieshttps://bit.ly/3Wt8h0s

About

This repository is about Learn | Hack | Share | Repeat.