This repository is about Learn | Hack | Share | Repeat.
Updates on Every Tuesday :)
#TechieTuesday
S. No | Topic | Link |
---|---|---|
1. | OSS Process Wishlist | https://bit.ly/34n9Ozb |
2. | Secure Development Series | https://bit.ly/3fcKCNW |
3. | Abusing Google Play Billing For Fun And Unlimited Credits | https://bit.ly/33JnCUi |
4. | Introducing a new phishing technique for compromising Office 365 accounts | https://bit.ly/3rNt2Wx |
5. | Useful LDAP queries for Windows Active Directory pentesting | https://bit.ly/3481JhR |
6. | Common Misconfigurations in CISCO Phone Systems | https://bit.ly/3361raJ |
7. | Scraping search APIs - Depth first style | https://bit.ly/3JKsfgD |
8. | Fault Injection Reference Model | https://bit.ly/3pqZkGH |
9. | The DNS over HTTPS (DoH) Mess | https://bit.ly/3tfAQRL |
10. | kdigger: a Context Discovery Tool for Kubernetes | https://bit.ly/3HPg5S7 |
11. | Understanding Zigbee and Wireless Mesh Networking | https://bit.ly/3J7eYi2 |
12. | Shadow Attacks | https://bit.ly/3tqXXtU |
13. | Bug hunting with static analysis tools | https://bit.ly/3wKTLHw |
14. | ARM Assembly Basics | https://bit.ly/3j2d5b0 |
15. | Pwning a Server using Markdown | https://bit.ly/3KwPQ5d |
16. | Pentesting CISCO ACI: LLDP Mishandling | https://bit.ly/3KVfgJT |
17. | JWT Security Issues | https://bit.ly/3LhI4fO |
18. | QEMU Case Study | http://phrack.org/issues/70/5.html#article |
19. | Kubernetes and HostPath, a Love-Hate Relationship | https://bit.ly/3yOv3a2 |
20. | XSS With Hoisting | https://bit.ly/3LHNMHf |
21. | WordPress Plugin Security Testing Cheat Sheet | https://bit.ly/3PRDKXd |
22. | IoT Hacking - The use of radio attacks during Red Team Exercise | https://bit.ly/3O080O6 |
23. | You Cannot Detect Techniques in the Execution Tactic! And What To Do Instead | https://bit.ly/3zDza9y |
24. | HTTP/2: The Sequel is Always Worse | https://bit.ly/39C2Wkp |
25. | Hacking an AWS hosted Kubernetes and Failing | https://bit.ly/3nmw9mA |
26. | Cookie Tossing | https://bit.ly/3AsZtj8 |
27. | STATIC TAINT ANALYSIS USING BINARY NINJA | https://bit.ly/3Iva130 |
28. | Lock Picking | https://bit.ly/3RHRkxp |
29-30. | Ngrev(Tool) | https://bit.ly/3zPfi2D |
31. | Thalos(Tool) | https://bit.ly/3BOfpwZ |
32. | How a good idea turns into a SPF (Security Product Failure) | https://bit.ly/3Cq6BxN |
33. | Authentication coercion of the Windows “Server” service | https://bit.ly/3KaL5yJ |
34.-35. | A proposal for a new amateur radio net | https://bit.ly/3RVjZyr |
36. | DEVELOPING CTF'S | https://bit.ly/3xdSA2A |
37. | Memory forensics with Kernel-level ASLR | https://bit.ly/3eVAFHz |
38. | Reversing the Pokit Meter's Bluetooth Protocol | https://bit.ly/3RhJmtc |
39. | GCP Penetration Testing | https://bit.ly/3Cm6jWQ |
40. | Achieving DevSecOps with Open-Source Tools | https://bit.ly/3SQddL5 |
41. | Proof of Being Forgotten: Verified Privacy Protection in Confidential Computing Platform | https://bit.ly/3CF5zMO |
42. | Building a high throughput low-latency PCIe based SDR | https://bit.ly/3smTcAj |
43. | Hacking IoT & RF Devices with BürtleinaBoard | https://bit.ly/3Np4EEU |
44. | Telephone Signalling Methods | https://bit.ly/3WHGSs7 |
45. | GraphQL Voyager as a tool for API security testing | https://bit.ly/3hIHwFR |
46. | Conducting OSINT on Github | https://bit.ly/3gvnsX7 |
47. | DNSMonster: passive DNS monitoring | https://bit.ly/3Usfb4k |
48. | ARMX Firmware Emulation Framework | https://bit.ly/3HMzHtV |
49. | 0-Day Hunting | https://bit.ly/3Vc0OS7 |
50. | Car Hacking: For Poories | https://bit.ly/3Wt8h0s |