@anon
sign up
@anon
sign up
pull down to refresh
Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilities
www.helpnetsecurity.com/2025/07/28/vulnhuntr-open-source-tool-identify-remotely-exploitable-vulnerabilities/
10 sats
\
0 comments
\
@ch0k1
28 Jul
security
related
Announcing LNsploit - A LN exploit tool
38.8k sats
\
24 comments
\
@TonyGiorgio
11 Oct 2022
bitcoin
Multiple Linux Backdoors Discovered Targeting Bitcoin Core Developer -LukeDashJr
lordx64.medium.com/multiple-linux-backdoors-discovered-targeting-bitcoin-core-developer-technical-analysis-793f8491f561
2258 sats
\
31 comments
\
@nym
19 Jan 2023
bitcoin
Patch Tuesday brings 90 new Microsoft CVEs, six already under exploit
www.theregister.com/2024/08/14/august_patch_tuesday/
295 sats
\
0 comments
\
@dontforgetthekeys
14 Aug 2024
security
The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind
www.wired.com/story/jia-tan-xz-backdoor/
523 sats
\
2 comments
\
@ch0k1
3 Apr 2024
security
Show HN: A web debugger an ex-Cloudflare team has been working on for 4 years
news.ycombinator.com/item?id=40318542
278 sats
\
1 comment
\
@hn
10 May 2024
tech
Over 4,000 backdoors hijacked by registering expired domains
www.bleepingcomputer.com/news/security/over-4-000-backdoors-hijacked-by-registering-expired-domains/
311 sats
\
4 comments
\
@ch0k1
11 Jan
security
QuantumRekt - Bitcoin Quantum Vulnerability Checker
quantumrekt.com/
239 sats
\
3 comments
\
@south_korea_ln
28 Jul
bitcoin
The Malware Museum
archive.org/details/malwaremuseum
253 sats
\
1 comment
\
@StillStackinAfterAllTheseYears
4 Sep 2024
tech
Critical Unauthenticated RCE Flaw Impacts all GNU/Linux systems
cybersecuritynews.com/critical-unauthenticated-rce-flaw/
349 sats
\
1 comment
\
@ch0k1
24 Sep 2024
news
PoC Exploit Released For OpenSSH Arbitrary Code Execution Vulnerability
cybersecuritynews.com/regresshion-code-execution-vulnerability/
95 sats
\
0 comments
\
@ch0k1
7 Jan
security
The 5 Most Common Cybersecurity Mistakes
127 sats
\
3 comments
\
@0xbitcoiner
21 May 2024
security
Memory Safe Languages: Reducing Vulnerabilities in Modern Software Development
media.defense.gov/2025/Jun/23/2003742198/-1/-1/0/CSI_MEMORY_SAFE_LANGUAGES_REDUCING_VULNERABILITIES_IN_MODERN_SOFTWARE_DEVELOPMENT.PDF
156 sats
\
1 comment
\
@carter
7 Jul
security
Exposing Web Cache Poisoning and Deception vulnerabilities
anasbetis023.medium.com/dont-trust-the-cache-exposing-web-cache-poisoning-and-deception-vulnerabilities-3a829f221f52
85 sats
\
0 comments
\
@beorange
9 Apr 2024
security
Vulnerabilities Identified in LG WebOS
www.bitdefender.com/blog/labs/vulnerabilities-identified-in-lg-webos/
110 sats
\
1 comment
\
@Gian
10 Apr 2024
security
Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution
thehackernews.com/2025/01/critical-cacti-security-flaw-cve-2025.html
13 sats
\
0 comments
\
@ch0k1
29 Jan
security
Metasploit Module Released 4 Actively Exploited SharePoint 0-Day Vulnerabilities
cybersecuritynews.com/metasploit-module-for-sharepoint-0-day/
136 sats
\
0 comments
\
@ch0k1
28 Jul
security
Ryan Montgomery | Capabilities of Hackers, Tools Hackers use
m.youtube.com/watch?v=9x7LKoutoVE
81 sats
\
0 comments
\
@jakoyoh629
2 Mar
security
Critical Patch Addressing Multiple Vulnerabilities Across Fortinet Products
cybersecuritynews.com/fortinet-security-update/
36 sats
\
0 comments
\
@ch0k1
15 Jun
security
Exposed DeepSeek data base leaking sensitive information, including chat history
www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak
207 sats
\
1 comment
\
@NovaRift
30 Jan
AI
NSA/ghidra: a software reverse engineering (SRE) framework
github.com/NationalSecurityAgency/ghidra
73 sats
\
0 comments
\
@nym
2 Apr 2024
security
Attackers are mapping your attack surface—are you?
www.bleepingcomputer.com/news/security/attackers-are-mapping-your-attack-surface-are-you/
115 sats
\
0 comments
\
@ch0k1
31 May
security
more