Hacker Newsnew | past | comments | ask | show | jobs | submit | alg2000's submissionslogin
1.Zamzar API – High-Risk SSRF Vulnerability (bishopfox.com)
1 point by alg2000 on Aug 27, 2020 | past
2.TinyMCE – Version 5.2.1 (XSS) (bishopfox.com)
1 point by alg2000 on Aug 12, 2020 | past
3.LibreHealth Version 2.0.0 – High-Risk Vulnerabilities (bishopfox.com)
2 points by alg2000 on July 14, 2020 | past
4.Delivering Peace of Mind About New Citrix Emerging Threat (bishopfox.com)
1 point by alg2000 on July 8, 2020 | past
5.Breaking HTTPS in the IoT: Practical Attacks for Reverse Engineers (bishopfox.com)
1 point by alg2000 on June 30, 2020 | past
6.A New Mindset for Application Security (bishopfox.com)
1 point by alg2000 on June 25, 2020 | past
7.How to Set Up Your Hardware Lab (bishopfox.com)
3 points by alg2000 on June 23, 2020 | past
8.A Guide to Digital Reconnaissance (bishopfox.com)
2 points by alg2000 on June 16, 2020 | past
9.DigDash Enterprise: Versions 2018R2-2020R1 (bishopfox.com)
1 point by alg2000 on June 15, 2020 | past
10.OOB to RCE: Exploitation of the Hobbes Functional Interpreter (CVE-2020-13656) (bishopfox.com)
2 points by alg2000 on June 12, 2020 | past
11.Lessons Learned from Years of Red Teaming (bishopfox.com)
1 point by alg2000 on June 9, 2020 | past
12.Invest in Trusted Partners, Not Crowdsourcing, for Continuous Security (bishopfox.com)
2 points by alg2000 on June 9, 2020 | past
13.Applying Elite Military Training to Civilian Assessments (bishopfox.com)
1 point by alg2000 on May 27, 2020 | past
14.RMIScout: Safely and Quickly Brute-Force Java RMI Interfaces for Code Execution (bishopfox.com)
1 point by alg2000 on May 26, 2020 | past
15.A Closer Look at the US-Cert Top Vulnerabilities List (bishopfox.com)
1 point by alg2000 on May 21, 2020 | past
16.How to Set Up Zniffer for Z-Wave (bishopfox.com)
1 point by alg2000 on April 28, 2020 | past
17.An Introduction to the OWASP IoT Top (bishopfox.com)
2 points by alg2000 on April 23, 2020 | past
18.The TL;DR on TF-IDF: Applied Machine Learning (bishopfox.com)
1 point by alg2000 on April 9, 2020 | past
19.What Is XSS?: An Overview (bishopfox.com)
1 point by alg2000 on March 16, 2020 | past
20.Twisted Version 19.10.0 – HTTP Request Splitting (bishopfox.com)
1 point by alg2000 on March 11, 2020 | past
21.GadgetProbe: Exploiting Deserialization to Brute-Force the Remote Classpath (bishopfox.com)
1 point by alg2000 on Feb 18, 2020 | past
22.How to Prevent the OWASP Top (bishopfox.com)
2 points by alg2000 on Feb 10, 2020 | past
23.Dufflebag: Uncovering Secrets in Exposed EBS Volumes (bishopfox.com)
3 points by alg2000 on Feb 3, 2020 | past
24.Identifying the Modern Attack Surface (bishopfox.com)
1 point by alg2000 on Jan 28, 2020 | past
25.ConnectWise Control – CVEs and Attack Chains (bishopfox.com)
3 points by alg2000 on Jan 22, 2020 | past
26.Patterns for Internet Exposures from AWS (bishopfox.com)
2 points by alg2000 on Jan 21, 2020 | past
27.Escalation Pitfalls to Avoid When Setting Up Aw (bishopfox.com)
1 point by alg2000 on Jan 15, 2020 | past
28.SFDC Secure Development Cheat Sheet (bishopfox.com)
1 point by alg2000 on Jan 8, 2020 | past
29.Investigating Privilege Escalation Methods in AWS (bishopfox.com)
58 points by alg2000 on Dec 20, 2019 | past | 5 comments
30.CVE-2019-18935: Remote Code Execution via Insecure Deserialization in Telerik UI (bishopfox.com)
1 point by alg2000 on Dec 13, 2019 | past

Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: