Trending

#pentest

Latest posts tagged with #pentest on Bluesky

Posts tagged #pentest

🕵️ /r/netsec's Q1 2026 Information Security Hiring Thread

Overview If you have open positions at your company for information s…
#EthicalHacking #PenTest #BugBounty
Technical Information Security · www.reddit.com/r/netsec/comments/1qn22i...

0 0 0 0
Article image

Article image

💀 Hacking the Skies: How a $20 Device Can Spoof Drone IDs and Create Ghost Swarms

As drone technology continues to evolve, so do the systems designed to track and regulate them.
#EthicalHacking #PenTest #BugBounty
Null Byte · null-byte.wonderhowto.com/how-to/drone-spoofing/

0 0 0 0
Preview
GitHub - dazzyddos/ClickOnceBlobber: Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading a C# port of ProxyBlob Age... Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading a C# port of ProxyBlob Agent. - dazzyddos/ClickOnceBlobber

Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading a C# port of ProxyBlob Agent.

github.com/dazzyddos/Cl...

#infosec #cybersecurity #redteam #pentest

0 0 0 0
Article image

Article image

🔓 A Deep Dive into the GetProcessHandleFromHwnd API

In my previous blog post I mentioned the GetProcessHandleFromHwnd API.
#EthicalHacking #PenTest #BugBounty
Project Zero · https://projectzero.google/2026/02/gphfh-deep-dive.html

0 0 0 0
Article image

Article image

🔧 When Trusted Software Updates Become the Attack V…
#EthicalHacking #PenTest #BugBounty
Check Point Blog · blog.checkpoint.com/research/when-trusted-so...

0 0 0 0
Preview
GitHub - trustedsec/LnkMeMaybe: Lnk crafting and research tools Lnk crafting and research tools. Contribute to trustedsec/LnkMeMaybe development by creating an account on GitHub.

A .NET 8 toolkit for creating and analysing Windows Shell Link (.lnk) files. Includes a command-line builder (LnkMeMaybe) and a graphical editor (LnkUi).

github.com/trustedsec/L...

#infosec #cybersecurity #redteam #pentest #phishing

3 0 0 0

🔓 Cracking a Malvertising DGA From the Device Side

submitted by /u/AdTemporary2475…
#EthicalHacking #PenTest #BugBounty
Technical Information Security · www.reddit.com/r/netsec/comments/1sdv8d...

0 0 0 0
Preview
GitHub - dobin/detonator: Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface. Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface. - dobin/detonator

Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.

github.com/dobin/detona...

#infosec #cybersecurity #redteam #pentest

2 0 0 0
Article image

Article image

🔓 Winning CTFs: A Proving Ground at HackMex & Ekoparty

CTF competitions push offensive security skills to their limits. In 2025, the Bishop Fox Mexico team claime…
#EthicalHacking #PenTest #BugBounty
bishopfox.com · bishopfox.com/blog/winning-ctfs-a-prov...

0 0 0 0
Article image

Article image

🎯 OffSec and Deloitte Portugal Announces Strategic Partnership

Announcing a strategic partnership with Deloitte Portugal to help organizations strengthen the technical capabilities of thei…
#EthicalHacking #PenTest #BugBounty
OffSec · www.offsec.com/blog/offsec-and-deloitte...

0 0 0 0

🧩 r/netsec monthly discussion & tool thread

Questions regarding netsec and discussion related directly to netsec are welcome here, as…
#EthicalHacking #PenTest #BugBounty
Technical Information Security · www.reddit.com/r/netsec/comments/1s9kmf...

0 0 0 0
Article image

Article image

🎯 Tax Season 2026: How Cyber Criminals Are Preparing Their Attacks Months in Advance

Tax season remains one of the m…
#EthicalHacking #PenTest #BugBounty
Check Point Blog · blog.checkpoint.com/research/tax-season-2026...

0 0 0 0
Preview
GitHub - vanhoefm/airsnitch: Generalized Wi-Fi Client Isolation Bypasses Generalized Wi-Fi Client Isolation Bypasses. Contribute to vanhoefm/airsnitch development by creating an account on GitHub.

Generalized Wi-Fi Client Isolation Bypasses

github.com/vanhoefm/air...

#infosec #cybersecurity #redteam #pentest #wifi

2 1 0 0
Article image

Article image

🕵️ Uncovering ROI of a Hybrid Mesh Architecture – 2026 IDC Business Value Study

To move fast without losing control, ent…
#EthicalHacking #PenTest #BugBounty
Check Point Blog · blog.checkpoint.com/hybrid-mesh/uncovering-r...

0 0 0 0
Article image

Article image

🔧 Create Your Own Ethical Hacking Kit with a Raspberry Pi 5

If you started your ethical hacking journey with our recommended Raspberry Pi 3 B+ setup, it's time to con…
#EthicalHacking #PenTest #BugBounty
Null Byte · null-byte.wonderhowto.com/how-to/raspberry-pi-5-et...

0 0 0 0

🧩 Bypassing Administrator Protection by Abusing UI Access

In my last blog post I introduced the new Windows feature, Administrator Protection and how it aimed to creat…
#EthicalHacking #PenTest #BugBounty
Project Zero · projectzero.google/2026/02/windows-administ...

0 0 0 0

🏴‍☠️ Using undocumented AWS CodeBuild endpoints to extract privileged tokens from AWS CodeConnections allowing lateral movement a…
#EthicalHacking #PenTest #BugBounty
Technical Information Security · www.reddit.com/r/netsec/comments/1sbe9t...

1 0 0 0
Article image

Article image

🏴‍☠️ How Hackers Can Control Anything Remotely Using LoRa Modules

LoRa (long-range) technology is widely used in IoT applications because it can transmit data over long distances withou…
#EthicalHacking #PenTest #BugBounty
Null Byte · null-byte.wonderhowto.com/how-to/lora-range-test/

0 0 0 0
GitHub - kozmer/dcsync-bof: dcsync bof dcsync bof. Contribute to kozmer/dcsync-bof development by creating an account on GitHub.

DCSync Beacon Object File (BOF)

github.com/kozmer/dcsyn...

#infosec #cybersecurity #redteam #pentest #opensource

1 0 0 0
Preview
GitHub - epotseluevskaya/ASPX_WebShell_COFFLoader: ASPX Web Shell with COFF Loader ASPX Web Shell with COFF Loader. Contribute to epotseluevskaya/ASPX_WebShell_COFFLoader development by creating an account on GitHub.

This ASPX web shell enables execution of Beacon Object Files (BOFs) on a target server using a semi-interactive Python client.

github.com/epotseluevsk...

#infosec #cybersecurity #redteam #pentest #web

1 0 0 0

We are going live tonight at 7 PM.

Episode 35 - Lateral movement and execution techniques from an OPSEC perspective that are safe to run.

truecyber.world

#pentest #redteam

0 0 0 0
Article image

Article image

🔧 Bypassing Windows Administrator Protection

A headline feature introduced in the latest release of Windows 11, 25H2 is Administrator Protection.
#EthicalHacking #PenTest #BugBounty
Project Zero · projectzero.google/2026/26/windows-administ...

0 0 0 0
Post image

Protégez vos données avec notre Pack Pentest chez Calimeg. Simulation d’attaques et solutions pour 190€ ! https://calimeg.com 🛡️ #Cybersécurité #Pentest #IA

0 0 0 0
Post image Post image

The effectiveness of vectoring targets is getting easier by having better #LLM do the testing. It's not automated scripting, it's getting LLMs to act as a 'security penetration tester', think 'social engineering' an LLM.
[Red] Maybe list files, types or known CVE / functions.
#PenTest #Exploits

0 0 0 0
Post image

The O.MG Cable looks like an ordinary USB cable—but hides a covert secret ⚡ An embedded USB exploit framework enables remote HID-attacks via local or remote payload triggering 🔌 l.lab401.com/oZsdS
#OMGCable #USB #Pentest #Lab401

0 0 0 0
Preview
dComms audit by 7ASecurity - 7ASecurity Blog dComms security audit by 7ASecurity covering whitebox testing, vulnerabilities, and remediations for secure decentralized communication

📣 New @7ASecurity public #Pentest report
🔐 @dComms improves resilience with verified fixes, thanks to @OpenTechFund
4 issues identified (2 high) and remediated
Feedback is welcome enjoy 🙂
🔗 7asecurity.com/blog/2026/03...

#7ASecurity #CyberSecurity #OpenSource #dComms #infosec

1 0 0 0
Video

Another session announcement for BSides Luxembourg!

💻 𝗧𝗛𝗢𝗦𝗘 𝗪𝗛𝗢 𝗗𝗢𝗡’𝗧 𝗟𝗘𝗔𝗥𝗡 𝗙𝗥𝗢𝗠 𝗖𝗩𝗘𝗦 𝗔𝗥𝗘 𝗗𝗢𝗢𝗠𝗘𝗗 𝗧𝗢 𝗥𝗘𝗗𝗜𝗦𝗖𝗢𝗩𝗘𝗥 𝗧𝗛𝗘𝗠 - Louis Nyffenegger (@snyff ) 💥

Real vulnerabilities don’t appear in isolation, they’re rooted in code, context, and human error. This […]

[Original post on infosec.exchange]

0 1 0 0

Opening a file in GNU Emacs can trigger arbitrary code execution through version control (git), most requiring zero user interaction beyond the file open itself.

github.com/califio/publ...

#infosec #cybersecurity #redteam #pentest #ai #emacs #claude

2 0 0 0
Preview
Vim tabpanel modeline escape affects Vim < 9.2.0272 Vim tabpanel modeline escape affects Vim < 9.2.0272 =================================================== Date: 30.03.2026 Severity: High CVE: *not-yet-assigned* CWE: Improper Neutralization of ...

A bug chain in Vim allows arbitrary OS command execution when a user opens a crafted file

github.com/vim/vim/secu...

github.com/califio/publ...

#infosec #cybersecurity #redteam #pentest #ai #vim #claude

1 0 0 0
Post image

The Hak5 Plunder Bug is a compact, advanced LAN/Ethernet Tap ⚡ Works as a mini-switch for passive monitoring and active engagement via USB-C, bundled with an Android Root app for packet capture 📡 l.lab401.com/Ecq6l
#Hak5 #Ethernet #Pentest #PlunderBug #Lab401

0 0 0 0