cybersecurity

CVE-2024-28183 OTA Anti-Rollback Bypass via TOCTOU In ESP-IDF

Discover the intricacies of CVE-2024-28183, a critical vulnerability in ESP-IDF's OTA update process that allows attackers to bypass anti-rollback protections…

10 months ago

xzbot – A Strategic Approach To Counter CVE-2024-3094 Through Honeypots And ED448 Patches

We delve into the intricacies of xzbot, a tool designed to combat the CVE-2024-3094 vulnerability. By employing a combination of…

10 months ago

Hunt For LFI (Local File Inclusion) – Automating The Discovery Of Security Vulnerabilities

In the vast expanse of cybersecurity, the Hunt for LFI (Local File Inclusion) stands out as a pivotal tool for…

10 months ago

Burpsuite-Pro : Fast Track To Web Security Testing

Burp Suite Professional is a powerful cybersecurity tool used for web application security testing and analysis. It is developed by…

10 months ago

Firefox Monitor Server – A Comprehensive Guide To Ensuring Digital Security Through Breach Alerts

Firefox Monitor notifies users when their credentials have been compromised in a data breach. This code is for the monitor.mozilla.org…

10 months ago

Leaked Credentials : Utilizing Developer Tools And Burp Suite For Enhanced Security

In an era where digital security breaches are increasingly common, safeguarding sensitive information has never been more critical. This article…

10 months ago

Awesome One-liner Bug Bounty : A Comprehensive Script Repository

This repository stores and houses various one-liner for bug bounty tips provided by me as well as contributed by the…

10 months ago

TJ-OSINT-Notebook : Your Comprehensive Resource For Advanced OSINT Operations And Techniques

This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations…

10 months ago

XZ-Vulnerable-Honeypot : A New SSH Defense Mechanism With CVE-2024-3094

An innovative SSH honeypot equipped with the XZ backdoor, identified by CVE-2024-3094. Designed to bait and study potential attackers, this…

10 months ago

Inbound SSH Connection To Vulnerable XZ Machine : CVE-2024-3094 Exploits

This KQL query can be used to detect post exploitation activities related to CVE-2024-3094. This vulnerability is related to reports…

10 months ago