🕵️ /r/netsec's Q1 2026 Information Security Hiring Thread
Overview If you have open positions at your company for information s…
#EthicalHacking #PenTest #BugBounty
Technical Information Security · www.reddit.com/r/netsec/comments/1qn22i...
Latest posts tagged with #pentest on Bluesky
🕵️ /r/netsec's Q1 2026 Information Security Hiring Thread
Overview If you have open positions at your company for information s…
#EthicalHacking #PenTest #BugBounty
Technical Information Security · www.reddit.com/r/netsec/comments/1qn22i...
Article image
💀 Hacking the Skies: How a $20 Device Can Spoof Drone IDs and Create Ghost Swarms
As drone technology continues to evolve, so do the systems designed to track and regulate them.
#EthicalHacking #PenTest #BugBounty
Null Byte · null-byte.wonderhowto.com/how-to/drone-spoofing/
Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading a C# port of ProxyBlob Agent.
github.com/dazzyddos/Cl...
#infosec #cybersecurity #redteam #pentest
Article image
🔓 A Deep Dive into the GetProcessHandleFromHwnd API
In my previous blog post I mentioned the GetProcessHandleFromHwnd API.
#EthicalHacking #PenTest #BugBounty
Project Zero · https://projectzero.google/2026/02/gphfh-deep-dive.html
Article image
🔧 When Trusted Software Updates Become the Attack V…
#EthicalHacking #PenTest #BugBounty
Check Point Blog · blog.checkpoint.com/research/when-trusted-so...
A .NET 8 toolkit for creating and analysing Windows Shell Link (.lnk) files. Includes a command-line builder (LnkMeMaybe) and a graphical editor (LnkUi).
github.com/trustedsec/L...
#infosec #cybersecurity #redteam #pentest #phishing
🔓 Cracking a Malvertising DGA From the Device Side
submitted by /u/AdTemporary2475…
#EthicalHacking #PenTest #BugBounty
Technical Information Security · www.reddit.com/r/netsec/comments/1sdv8d...
Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.
github.com/dobin/detona...
#infosec #cybersecurity #redteam #pentest
Article image
🔓 Winning CTFs: A Proving Ground at HackMex & Ekoparty
CTF competitions push offensive security skills to their limits. In 2025, the Bishop Fox Mexico team claime…
#EthicalHacking #PenTest #BugBounty
bishopfox.com · bishopfox.com/blog/winning-ctfs-a-prov...
Article image
🎯 OffSec and Deloitte Portugal Announces Strategic Partnership
Announcing a strategic partnership with Deloitte Portugal to help organizations strengthen the technical capabilities of thei…
#EthicalHacking #PenTest #BugBounty
OffSec · www.offsec.com/blog/offsec-and-deloitte...
🧩 r/netsec monthly discussion & tool thread
Questions regarding netsec and discussion related directly to netsec are welcome here, as…
#EthicalHacking #PenTest #BugBounty
Technical Information Security · www.reddit.com/r/netsec/comments/1s9kmf...
Article image
🎯 Tax Season 2026: How Cyber Criminals Are Preparing Their Attacks Months in Advance
Tax season remains one of the m…
#EthicalHacking #PenTest #BugBounty
Check Point Blog · blog.checkpoint.com/research/tax-season-2026...
Generalized Wi-Fi Client Isolation Bypasses
github.com/vanhoefm/air...
#infosec #cybersecurity #redteam #pentest #wifi
Article image
🕵️ Uncovering ROI of a Hybrid Mesh Architecture – 2026 IDC Business Value Study
To move fast without losing control, ent…
#EthicalHacking #PenTest #BugBounty
Check Point Blog · blog.checkpoint.com/hybrid-mesh/uncovering-r...
Article image
🔧 Create Your Own Ethical Hacking Kit with a Raspberry Pi 5
If you started your ethical hacking journey with our recommended Raspberry Pi 3 B+ setup, it's time to con…
#EthicalHacking #PenTest #BugBounty
Null Byte · null-byte.wonderhowto.com/how-to/raspberry-pi-5-et...
🧩 Bypassing Administrator Protection by Abusing UI Access
In my last blog post I introduced the new Windows feature, Administrator Protection and how it aimed to creat…
#EthicalHacking #PenTest #BugBounty
Project Zero · projectzero.google/2026/02/windows-administ...
🏴☠️ Using undocumented AWS CodeBuild endpoints to extract privileged tokens from AWS CodeConnections allowing lateral movement a…
#EthicalHacking #PenTest #BugBounty
Technical Information Security · www.reddit.com/r/netsec/comments/1sbe9t...
Article image
🏴☠️ How Hackers Can Control Anything Remotely Using LoRa Modules
LoRa (long-range) technology is widely used in IoT applications because it can transmit data over long distances withou…
#EthicalHacking #PenTest #BugBounty
Null Byte · null-byte.wonderhowto.com/how-to/lora-range-test/
DCSync Beacon Object File (BOF)
github.com/kozmer/dcsyn...
#infosec #cybersecurity #redteam #pentest #opensource
This ASPX web shell enables execution of Beacon Object Files (BOFs) on a target server using a semi-interactive Python client.
github.com/epotseluevsk...
#infosec #cybersecurity #redteam #pentest #web
We are going live tonight at 7 PM.
Episode 35 - Lateral movement and execution techniques from an OPSEC perspective that are safe to run.
truecyber.world
#pentest #redteam
Article image
🔧 Bypassing Windows Administrator Protection
A headline feature introduced in the latest release of Windows 11, 25H2 is Administrator Protection.
#EthicalHacking #PenTest #BugBounty
Project Zero · projectzero.google/2026/26/windows-administ...
Protégez vos données avec notre Pack Pentest chez Calimeg. Simulation d’attaques et solutions pour 190€ ! https://calimeg.com 🛡️ #Cybersécurité #Pentest #IA
The effectiveness of vectoring targets is getting easier by having better #LLM do the testing. It's not automated scripting, it's getting LLMs to act as a 'security penetration tester', think 'social engineering' an LLM.
[Red] Maybe list files, types or known CVE / functions.
#PenTest #Exploits
The O.MG Cable looks like an ordinary USB cable—but hides a covert secret ⚡ An embedded USB exploit framework enables remote HID-attacks via local or remote payload triggering 🔌 l.lab401.com/oZsdS
#OMGCable #USB #Pentest #Lab401
📣 New @7ASecurity public #Pentest report
🔐 @dComms improves resilience with verified fixes, thanks to @OpenTechFund
4 issues identified (2 high) and remediated
Feedback is welcome enjoy 🙂
🔗 7asecurity.com/blog/2026/03...
#7ASecurity #CyberSecurity #OpenSource #dComms #infosec
Another session announcement for BSides Luxembourg!
💻 𝗧𝗛𝗢𝗦𝗘 𝗪𝗛𝗢 𝗗𝗢𝗡’𝗧 𝗟𝗘𝗔𝗥𝗡 𝗙𝗥𝗢𝗠 𝗖𝗩𝗘𝗦 𝗔𝗥𝗘 𝗗𝗢𝗢𝗠𝗘𝗗 𝗧𝗢 𝗥𝗘𝗗𝗜𝗦𝗖𝗢𝗩𝗘𝗥 𝗧𝗛𝗘𝗠 - Louis Nyffenegger (@snyff ) 💥
Real vulnerabilities don’t appear in isolation, they’re rooted in code, context, and human error. This […]
[Original post on infosec.exchange]
Opening a file in GNU Emacs can trigger arbitrary code execution through version control (git), most requiring zero user interaction beyond the file open itself.
github.com/califio/publ...
#infosec #cybersecurity #redteam #pentest #ai #emacs #claude
A bug chain in Vim allows arbitrary OS command execution when a user opens a crafted file
github.com/vim/vim/secu...
github.com/califio/publ...
#infosec #cybersecurity #redteam #pentest #ai #vim #claude
The Hak5 Plunder Bug is a compact, advanced LAN/Ethernet Tap ⚡ Works as a mini-switch for passive monitoring and active engagement via USB-C, bundled with an Android Root app for packet capture 📡 l.lab401.com/Ecq6l
#Hak5 #Ethernet #Pentest #PlunderBug #Lab401