cybersecurity

CVE-2024-28183 OTA Anti-Rollback Bypass via TOCTOU In ESP-IDF

Discover the intricacies of CVE-2024-28183, a critical vulnerability in ESP-IDF's OTA update process that allows attackers to bypass anti-rollback protections…

8 months ago

xzbot – A Strategic Approach To Counter CVE-2024-3094 Through Honeypots And ED448 Patches

We delve into the intricacies of xzbot, a tool designed to combat the CVE-2024-3094 vulnerability. By employing a combination of…

8 months ago

Hunt For LFI (Local File Inclusion) – Automating The Discovery Of Security Vulnerabilities

In the vast expanse of cybersecurity, the Hunt for LFI (Local File Inclusion) stands out as a pivotal tool for…

8 months ago

Burpsuite-Pro : Fast Track To Web Security Testing

Burp Suite Professional is a powerful cybersecurity tool used for web application security testing and analysis. It is developed by…

8 months ago

Firefox Monitor Server – A Comprehensive Guide To Ensuring Digital Security Through Breach Alerts

Firefox Monitor notifies users when their credentials have been compromised in a data breach. This code is for the monitor.mozilla.org…

8 months ago

Leaked Credentials : Utilizing Developer Tools And Burp Suite For Enhanced Security

In an era where digital security breaches are increasingly common, safeguarding sensitive information has never been more critical. This article…

8 months ago

Awesome One-liner Bug Bounty : A Comprehensive Script Repository

This repository stores and houses various one-liner for bug bounty tips provided by me as well as contributed by the…

8 months ago

TJ-OSINT-Notebook : Your Comprehensive Resource For Advanced OSINT Operations And Techniques

This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations…

8 months ago

XZ-Vulnerable-Honeypot : A New SSH Defense Mechanism With CVE-2024-3094

An innovative SSH honeypot equipped with the XZ backdoor, identified by CVE-2024-3094. Designed to bait and study potential attackers, this…

8 months ago

Inbound SSH Connection To Vulnerable XZ Machine : CVE-2024-3094 Exploits

This KQL query can be used to detect post exploitation activities related to CVE-2024-3094. This vulnerability is related to reports…

8 months ago