Advertisement ยท 728 ร— 90

Posts by PentesterLab

Preview
Remote Command Execution in Google Cloud with Single Directory Deletion Introduction Hello, Iโ€™m RyotaK (@ryotkak ), a security engineer at GMO Flatt Security Inc. A while ago, I participated in the Google Cloud VRP bugSWAT, a live hacking event organized by Google. During...

๐—ฅ๐—ฒ๐˜€๐—ฒ๐—ฎ๐—ฟ๐—ฐ๐—ต ๐—ช๐—ผ๐—ฟ๐˜๐—ต ๐—ฅ๐—ฒ๐—ฎ๐—ฑ๐—ถ๐—ป๐—ด - ๐—ช๐—ฒ๐—ฒ๐—ธ ๐Ÿญ๐Ÿฏ, ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ
Only one entry but definitely worth reading!

โ˜๏ธ ๐—ฅ๐—ฒ๐—บ๐—ผ๐˜๐—ฒ ๐—–๐—ผ๐—บ๐—บ๐—ฎ๐—ป๐—ฑ ๐—˜๐˜…๐—ฒ๐—ฐ๐˜‚๐˜๐—ถ๐—ผ๐—ป ๐—ถ๐—ป ๐—š๐—ผ๐—ผ๐—ด๐—น๐—ฒ ๐—–๐—น๐—ผ๐˜‚๐—ฑ ๐˜„๐—ถ๐˜๐—ต ๐—ฆ๐—ถ๐—ป๐—ด๐—น๐—ฒ ๐——๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜† ๐——๐—ฒ๐—น๐—ฒ๐˜๐—ถ๐—ผ๐—ป
This one is a real tour de force: flatt.tech/research/pos....

1 day ago 2 1 0 0

๐Ÿง‘โ€๐ŸŽ“ Learning of the day for me, once again thanks to @pentesterlab.com (for the presentation of the behavior and the code review lab) and Claude (for the detailed explanation).

#appsec #appsecurity

4 days ago 1 1 1 0
k3ng.xyzCTF is dead* Capture-the-flag (CTF) competitions has been the biggest part of my journey in cyber security, and probably is the case for most people beginning their journey in cyber security. But I'm struggling to...

๐Ÿ’€ ๐—–๐—ง๐—™ ๐—ถ๐˜€ ๐—ฑ๐—ฒ๐—ฎ๐—ฑ*
A good rant on the impact of AI on CTF... k3ng.xyz/blog/ctf-is-....

1 week ago 1 0 0 0
Sashiko

๐Ÿง ๐—ฆ๐—ฎ๐˜€๐—ต๐—ถ๐—ธ๐—ผ
Sashiko is an agentic Linux kernel code review system that monitors public mailing lists to thoroughly evaluate proposed Linux kernel changes. sashiko.dev.

1 week ago 1 0 1 0
Preview
Hyoketsu โ€“ Solving the Vendor Dependency Problem in RE โ€บ Searchlight Cyber The Long Decompilation Process Over the last eight or so years of performing security research at Assetnote, our research team has looked at countless enterprise applications that ship with hundreds, ...

๐Ÿ› ๏ธ ๐—›๐˜†๐—ผ๐—ธ๐—ฒ๐˜๐˜€๐˜‚ โ€“ ๐—ฆ๐—ผ๐—น๐˜ƒ๐—ถ๐—ป๐—ด ๐˜๐—ต๐—ฒ ๐—ฉ๐—ฒ๐—ป๐—ฑ๐—ผ๐—ฟ ๐——๐—ฒ๐—ฝ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ป๐—ฐ๐˜† ๐—ฃ๐—ฟ๐—ผ๐—ฏ๐—น๐—ฒ๐—บ ๐—ถ๐—ป ๐—ฅ๐—˜
Reversing Java and C# applications just became a lot easier thanks to the SearchLight Cyber team (ex: Assetnote): slcyber.io/research-cen....

1 week ago 1 0 1 0
Testing AI for Vulnerability Research: 4 Approaches & Where I Failed | xclow3n Tested 4 AI-assisted approaches for finding vulnerabilities over one week. Found real bugs โ€” 14 confirmed vulns in one target in 20 minutes. Also burned time on an approach that found nothing useful. ...

๐—ฅ๐—ฒ๐˜€๐—ฒ๐—ฎ๐—ฟ๐—ฐ๐—ต ๐—ช๐—ผ๐—ฟ๐˜๐—ต ๐—ฅ๐—ฒ๐—ฎ๐—ฑ๐—ถ๐—ป๐—ด - ๐—ช๐—ฒ๐—ฒ๐—ธ ๐Ÿญ๐Ÿฎ, ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ
AI doing research, AI killing CTF

๐Ÿค– ๐—ง๐—ฒ๐˜€๐˜๐—ถ๐—ป๐—ด ๐—”๐—œ ๐—ณ๐—ผ๐—ฟ ๐—ฉ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐˜† ๐—ฅ๐—ฒ๐˜€๐—ฒ๐—ฎ๐—ฟ๐—ฐ๐—ต: ๐Ÿฐ ๐—”๐—ฝ๐—ฝ๐—ฟ๐—ผ๐—ฎ๐—ฐ๐—ต๐—ฒ๐˜€ & ๐—ช๐—ต๐—ฒ๐—ฟ๐—ฒ ๐—œ ๐—™๐—ฎ๐—ถ๐—น๐—ฒ๐—ฑ
If you can only read one thing this week, make it this article: xclow3n.github.io/post/7.

1 week ago 4 2 1 0
Example of execution.

Example of execution.

๐Ÿง‘โ€๐ŸŽ“ Learning of the day for me thanks to @pentesterlab.com (for the presentation of the behavior and the code review lab) and Claude (for the detailed explanation):

#appsec #appsecurity

2 weeks ago 1 1 1 0
Advertisement
Preview
How "Strengthening Crypto" Broke Authentication: FreshRSS and bcrypt's 72-Byte Limit As part of our CVE monitoring, we came across GHSA-pcq9-mq6m-mvmp (CVE-2025-68402), an authentication bypass in FreshRSS, a self-hosted RSS aggregator. It ...

A commit meant to "strengthen the crypto" in FreshRSS ended up removing the need for a correct password.

Why?
Longer SHA-256 nonce + bcrypt truncation at 72 bytes.

A nice example of why secure systems are about composition, not just stronger primitives.

pentesterlab.com/blog/freshrs...

2 weeks ago 9 5 0 1
Preview
CVE-2026-29000: Critical Auth Bypass in pac4j-jwt: Full PoC Using Only a Public Key CodeAnt AI found a critical authentication bypass in pac4j-jwt where an attacker can impersonate any user using only the RSA public key. Full PoC and disclosure.

โ›“๏ธโ€๐Ÿ’ฅ ๐—”๐˜‚๐˜๐—ต๐—ฒ๐—ป๐˜๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—•๐˜†๐—ฝ๐—ฎ๐˜€๐˜€ ๐—ถ๐—ป ๐—ฝ๐—ฎ๐—ฐ๐Ÿฐ๐—ท
Another issue with a library leveragining JWT: www.codeant.ai/security-res....

3 weeks ago 2 1 0 0
Vibe Security Radar Tracking the security cost of vibe coding

๐Ÿ˜Ž ๐—ฉ๐—ถ๐—ฏ๐—ฒ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฅ๐—ฎ๐—ฑ๐—ฎ๐—ฟ
A cool little project to track the security issues created by vibe coding: vibe-radar-ten.vercel.app.

3 weeks ago 1 0 1 0
The MCP AuthN/Z Nightmare ยท Doyensec's Blog The MCP AuthN/Z Nightmare

โœจ ๐—ง๐—ต๐—ฒ ๐— ๐—–๐—ฃ ๐—”๐˜‚๐˜๐—ต๐—ก/๐—ญ ๐—ก๐—ถ๐—ด๐—ต๐˜๐—บ๐—ฎ๐—ฟ๐—ฒ
A reminder of the mess AuthN/Z with MCP is: blog.doyensec.com/2026/03/05/m....

3 weeks ago 0 1 1 0
Preview
mitmproxy for fun and profit: Interception and Analysis of Application mitmproxy for fun and profit: Interception and Analysis of Application

๐Ÿšฅ ๐—บ๐—ถ๐˜๐—บ๐—ฝ๐—ฟ๐—ผ๐˜…๐˜† ๐—ณ๐—ผ๐—ฟ ๐—ณ๐˜‚๐—ป ๐—ฎ๐—ป๐—ฑ ๐—ฝ๐—ฟ๐—ผ๐—ณ๐—ถ๐˜: ๐—œ๐—ป๐˜๐—ฒ๐—ฟ๐—ฐ๐—ฒ๐—ฝ๐˜๐—ถ๐—ผ๐—ป ๐—ฎ๐—ป๐—ฑ ๐—”๐—ป๐—ฎ๐—น๐˜†๐˜€๐—ถ๐˜€ ๐—ผ๐—ณ ๐—”๐—ฝ๐—ฝ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ง๐—ฟ๐—ฎ๐—ณ๐—ณ๐—ถ๐—ฐ
A write-up on how to use mitmproxy: www.synacktiv.com/en/publicati....

3 weeks ago 0 0 1 0

๐—ฅ๐—ฒ๐˜€๐—ฒ๐—ฎ๐—ฟ๐—ฐ๐—ต ๐—ช๐—ผ๐—ฟ๐˜๐—ต ๐—ฅ๐—ฒ๐—ฎ๐—ฑ๐—ถ๐—ป๐—ด - ๐—ช๐—ฒ๐—ฒ๐—ธ ๐Ÿญ๐Ÿฌ, ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ
A great mix of content this week!

๐Ÿ”’ ๐—œ๐—ฟ๐—ผ๐—ป๐—–๐˜‚๐—ฟ๐˜๐—ฎ๐—ถ๐—ป: ๐—” ๐—ฃ๐—ฒ๐—ฟ๐˜€๐—ผ๐—ป๐—ฎ๐—น ๐—”๐—œ ๐—”๐˜€๐˜€๐—ถ๐˜€๐˜๐—ฎ๐—ป๐˜ ๐—•๐˜‚๐—ถ๐—น๐˜ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—ณ๐—ฟ๐—ผ๐—บ ๐˜๐—ต๐—ฒ ๐—š๐—ฟ๐—ผ๐˜‚๐—ป๐—ฑ ๐—จ๐—ฝ
Niels Provos (from OpenBSD's systrace) is sharing a new tool to sandbox your AI assistant: www.provos.org/p/ironcurtai....

3 weeks ago 4 1 1 0
Preview
vinext: Vibe-Hacking Cloudflare's Vibe-Coded Next.js Replacement Cloudflare built a Next.js replacement in a week with AI for $1100. We pointed Hacktron at it to find what the tests missed.

โ›ˆ๏ธ ๐˜ƒ๐—ถ๐—ป๐—ฒ๐˜…๐˜: ๐—ฉ๐—ถ๐—ฏ๐—ฒ-๐—›๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด ๐—–๐—น๐—ผ๐˜‚๐—ฑ๐—ณ๐—น๐—ฎ๐—ฟ๐—ฒ'๐˜€ ๐—ฉ๐—ถ๐—ฏ๐—ฒ-๐—–๐—ผ๐—ฑ๐—ฒ๐—ฑ ๐—ก๐—ฒ๐˜…๐˜.๐—ท๐˜€ ๐—ฅ๐—ฒ๐—ฝ๐—น๐—ฎ๐—ฐ๐—ฒ๐—บ๐—ฒ๐—ป๐˜
It's raining bugs in the cloud. A great example of agent capabilities on a never-seen-before target: www.hacktron.ai/blog/hacking....

4 weeks ago 0 0 0 0
Preview
100+ Kernel Bugs in 30 Days High-Scale Driver Vulnerability Research with Agent Swarms

๐ŸชŸ ๐Ÿญ๐Ÿฌ๐Ÿฌ+ ๐—ž๐—ฒ๐—ฟ๐—ป๐—ฒ๐—น ๐—•๐˜‚๐—ด๐˜€ ๐—ถ๐—ป ๐Ÿฏ๐Ÿฌ ๐——๐—ฎ๐˜†๐˜€
Behind the (impressive) result, the methodology is probably the most important. Make sure you read between the lines: substack.com/home/post/p-....

4 weeks ago 0 0 1 0
Browser-Based Port Scanning in the Age of LNA

๐—ฅ๐—ฒ๐˜€๐—ฒ๐—ฎ๐—ฟ๐—ฐ๐—ต ๐—ช๐—ผ๐—ฟ๐˜๐—ต ๐—ฅ๐—ฒ๐—ฎ๐—ฑ๐—ถ๐—ป๐—ด - ๐—ช๐—ฒ๐—ฒ๐—ธ ๐Ÿต, ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ
Mostly AI...

๐Ÿ’ป ๐—•๐—ฟ๐—ผ๐˜„๐˜€๐—ฒ๐—ฟ-๐—•๐—ฎ๐˜€๐—ฒ๐—ฑ ๐—ฃ๐—ผ๐—ฟ๐˜ ๐—ฆ๐—ฐ๐—ฎ๐—ป๐—ป๐—ถ๐—ป๐—ด ๐—ถ๐—ป ๐˜๐—ต๐—ฒ ๐—”๐—ด๐—ฒ ๐—ผ๐—ณ ๐—Ÿ๐—ก๐—”
Leveraging Local Network Access to create a port scanner! wiki.notveg.ninja/tools/lna-po....

4 weeks ago 2 3 1 0
Advertisement
Preview
PentesterLab: Learn with our JavaScript Code Review The JavaScript Code Review Badge is our badge dedicated to security code review in JavaScript. It covers the discovery of weaknesses and vulnerabilities using source code review.

6 new code review labs just dropped ๐Ÿš€
+3 for JavaScript Code Review
+3 for Python Code Review

JS: pentesterlab.com/badges/javas...

Python: pentesterlab.com/badges/pytho...

1 month ago 5 2 0 0
CVE Archeologist's field guide
Methodology and Lessons from 10 Vulnerability Analyses 
Written by Louis Nyffenegger

CVE Archeologist's field guide Methodology and Lessons from 10 Vulnerability Analyses Written by Louis Nyffenegger

As I mentioned last week I ordered some books (which got delivered this week)
CVE ARCHEOLOGIST'S FIELD GUIDE by Louis Nyffenegger @pentesterlab.com

1 month ago 1 1 1 0
Preview
Using threat modeling and prompt injection to audit Comet Trail of Bits used ML-centered threat modeling and adversarial testing to identify four prompt injection techniques that could exploit Perplexityโ€™s Comet browser AI assistant to exfiltrate private Gma...

๐Ÿค– ๐—จ๐˜€๐—ถ๐—ป๐—ด ๐˜๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—บ๐—ผ๐—ฑ๐—ฒ๐—น๐—ถ๐—ป๐—ด ๐—ฎ๐—ป๐—ฑ ๐—ฝ๐—ฟ๐—ผ๐—บ๐—ฝ๐˜ ๐—ถ๐—ป๐—ท๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐˜๐—ผ ๐—ฎ๐˜‚๐—ฑ๐—ถ๐˜ ๐—–๐—ผ๐—บ๐—ฒ๐˜
The team at Trail of Bits is sharing some key learnings from their audit of Comet (AI browser) blog.trailofbits.com/2026/02/20/u....

1 month ago 2 0 0 0
Preview
HeroDevs Blog | CVE-2026-0603: Second-Order SQL Injection in Hibernate UPDATE/DELETE (InlineIdsOrClauseBuilder) CVE-2026-0603 is a high-severity second-order SQL injection vulnerability in Hibernate ORM caused by unsafe ID inlining during UPDATE and DELETE operations. Learn impact, root cause, and remediation.

โ˜•๏ธ ๐—–๐—ฉ๐—˜-๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ-๐Ÿฌ๐Ÿฒ๐Ÿฌ๐Ÿฏ: ๐—ฆ๐—ฒ๐—ฐ๐—ผ๐—ป๐—ฑ-๐—ข๐—ฟ๐—ฑ๐—ฒ๐—ฟ ๐—ฆ๐—ค๐—Ÿ ๐—œ๐—ป๐—ท๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—ถ๐—ป ๐—›๐—ถ๐—ฏ๐—ฒ๐—ฟ๐—ป๐—ฎ๐˜๐—ฒ ๐—จ๐—ฃ๐——๐—”๐—ง๐—˜/๐——๐—˜๐—Ÿ๐—˜๐—ง๐—˜ (๐—œ๐—ป๐—น๐—ถ๐—ป๐—ฒ๐—œ๐—ฑ๐˜€๐—ข๐—ฟ๐—–๐—น๐—ฎ๐˜‚๐˜€๐—ฒ๐—•๐˜‚๐—ถ๐—น๐—ฑ๐—ฒ๐—ฟ)
A bit of a stretch but an interesting insight into Hibernate: www.herodevs.com/blog-posts/c....

1 month ago 0 0 1 0
Vulnerability Disclosure: JWT Authentication Bypass in OpenID Connect Authenticator for Tomcat โ€“ Insinuator.net

๐Ÿ˜ฑ ๐—ฉ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐˜† ๐——๐—ถ๐˜€๐—ฐ๐—น๐—ผ๐˜€๐˜‚๐—ฟ๐—ฒ: ๐—๐—ช๐—ง ๐—”๐˜‚๐˜๐—ต๐—ฒ๐—ป๐˜๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—•๐˜†๐—ฝ๐—ฎ๐˜€๐˜€ ๐—ถ๐—ป ๐—ข๐—ฝ๐—ฒ๐—ป๐—œ๐—— ๐—–๐—ผ๐—ป๐—ป๐—ฒ๐—ฐ๐˜ ๐—”๐˜‚๐˜๐—ต๐—ฒ๐—ป๐˜๐—ถ๐—ฐ๐—ฎ๐˜๐—ผ๐—ฟ ๐—ณ๐—ผ๐—ฟ ๐—ง๐—ผ๐—บ๐—ฐ๐—ฎ๐˜
The exact same vulnerability I found in HarbourJWT but in a much cooler target, still not fixed... insinuator.net/2026/02/jwt-....

1 month ago 0 0 1 0
Preview
Almost Impossible: Java Deserialization Through Broken Crypto in OpenText Directory Services โ€บ Searchlight Cyber Introduction We recently found ourselves looking into OpenText Directory Services (OTDS). We had seen it present on our customer's attack surface, and it seemed to be an interesting target. OTDS is a ...

โ˜•๏ธ ๐—”๐—น๐—บ๐—ผ๐˜€๐˜ ๐—œ๐—บ๐—ฝ๐—ผ๐˜€๐˜€๐—ถ๐—ฏ๐—น๐—ฒ: ๐—๐—ฎ๐˜ƒ๐—ฎ ๐——๐—ฒ๐˜€๐—ฒ๐—ฟ๐—ถ๐—ฎ๐—น๐—ถ๐˜‡๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ง๐—ต๐—ฟ๐—ผ๐˜‚๐—ด๐—ต ๐—•๐—ฟ๐—ผ๐—ธ๐—ฒ๐—ป ๐—–๐—ฟ๐˜†๐—ฝ๐˜๐—ผ ๐—ถ๐—ป ๐—ข๐—ฝ๐—ฒ๐—ป๐—ง๐—ฒ๐˜…๐˜ ๐——๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜† ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ๐˜€
What an adventure in Java Deserialisation... slcyber.io/research-cen....

1 month ago 0 0 1 0
CTFtime.org / justCTF [*] 2020 / Go-fs / Writeup CTF writeups, Go-fs

๐—ฅ๐—ฒ๐˜€๐—ฒ๐—ฎ๐—ฟ๐—ฐ๐—ต ๐—ช๐—ผ๐—ฟ๐˜๐—ต ๐—ฅ๐—ฒ๐—ฎ๐—ฑ๐—ถ๐—ป๐—ด - ๐—ช๐—ฒ๐—ฒ๐—ธ ๐Ÿด, ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ
Java x2, Go, JWT and a sprinkling of AI

๐Ÿฆซ ๐—–๐—ง๐—™๐˜๐—ถ๐—บ๐—ฒ.๐—ผ๐—ฟ๐—ด / ๐—ท๐˜‚๐˜€๐˜๐—–๐—ง๐—™ [*] ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฌ / ๐—š๐—ผ-๐—ณ๐˜€ / ๐—ช๐—ฟ๐—ถ๐˜๐—ฒ๐˜‚๐—ฝ
A cool Golang quirk via an unintended CTF solution ctftime.org/writeup/25852.

1 month ago 1 0 1 0
Advertisement

New lab: CVE-2026-24895 โ€” FrankenPHP Path Confusion RCE (Unicode)

People think "lowercase it" is harmless. In Unicode itโ€™s not.

Case folding can do weird mappings (Turkish i, Kelvin signโ€ฆ), and sometimes worse: UTF-8 byte length changes.

Hands-on lab: pentesterlab.com/exercises/cv...

1 month ago 3 0 0 0
Trailing Danger: exploring HTTP Trailer parsing discrepancies Trailing Danger: exploring HTTP Trailer parsing discrepancies

๐Ÿš› ๐—ง๐—ฟ๐—ฎ๐—ถ๐—น๐—ถ๐—ป๐—ด ๐——๐—ฎ๐—ป๐—ด๐—ฒ๐—ฟ: ๐—ฒ๐˜…๐—ฝ๐—น๐—ผ๐—ฟ๐—ถ๐—ป๐—ด ๐—›๐—ง๐—ง๐—ฃ ๐—ง๐—ฟ๐—ฎ๐—ถ๐—น๐—ฒ๐—ฟ ๐—ฝ๐—ฎ๐—ฟ๐˜€๐—ถ๐—ป๐—ด ๐—ฑ๐—ถ๐˜€๐—ฐ๐—ฟ๐—ฒ๐—ฝ๐—ฎ๐—ป๐—ฐ๐—ถ๐—ฒ๐˜€
Probably one of the lesser-known features of HTTP... Trailers. This post provides details on the feature and explains how they can be leveraged to find security issues. www.sebsrt.xyz/blog/trailin....

1 month ago 1 0 0 0
Preview
RCE in Google's AI code editor Antigravity - $10000 Bounty Hacktron AI Research Team discovered a critical RCE in Googleโ€™s Antigravity IDE that lets attackers take over your system just by opening a malicious website.

๐Ÿค– ๐—ฅ๐—–๐—˜ ๐—ถ๐—ป ๐—š๐—ผ๐—ผ๐—ด๐—น๐—ฒ'๐˜€ ๐—”๐—œ ๐—ฐ๐—ผ๐—ฑ๐—ฒ ๐—ฒ๐—ฑ๐—ถ๐˜๐—ผ๐—ฟ ๐—”๐—ป๐˜๐—ถ๐—ด๐—ฟ๐—ฎ๐˜ƒ๐—ถ๐˜๐˜† - $๐Ÿญ๐Ÿฌ๐Ÿฌ๐Ÿฌ๐Ÿฌ ๐—•๐—ผ๐˜‚๐—ป๐˜๐˜†
A detailed blog post on hacking Antigravity with a lot of interesting details on its inner workings. www.hacktron.ai/blog/hacking....

1 month ago 1 0 1 0

๐Ÿคบ ๐—ช๐—ต๐—ฒ๐—ป ๐—ง๐˜„๐—ผ ๐—ฃ๐—ฎ๐—ฟ๐˜€๐—ฒ๐—ฟ๐˜€ ๐——๐—ถ๐˜€๐—ฎ๐—ด๐—ฟ๐—ฒ๐—ฒ: ๐—˜๐˜…๐—ฝ๐—น๐—ผ๐—ถ๐˜๐—ถ๐—ป๐—ด ๐—ค๐˜‚๐—ฒ๐—ฟ๐˜† ๐—ฆ๐˜๐—ฟ๐—ถ๐—ป๐—ด ๐——๐—ถ๐—ณ๐—ณ๐—ฒ๐—ฟ๐—ฒ๐—ป๐˜๐—ถ๐—ฎ๐—น๐˜€ ๐—ณ๐—ผ๐—ฟ ๐—ซ๐—ฆ๐—ฆ
If you enjoy parser differential issues, you are going to love this exploit. Don't think "It's a CTF challenge" or "It's just an XSS", read between the lines to find the real gold. blog.voorivex.team/when-two-par....

1 month ago 0 0 1 0
Preview
Introducing Augustus: Open Source LLM Prompt Injection Tool Explore LLM fingerprinting and its role in exposing vulnerable Ollama servers online to unauthorized access risks.

โš’๏ธ ๐—œ๐—ป๐˜๐—ฟ๐—ผ๐—ฑ๐˜‚๐—ฐ๐—ถ๐—ป๐—ด ๐—”๐˜‚๐—ด๐˜‚๐˜€๐˜๐˜‚๐˜€: ๐—ข๐—ฝ๐—ฒ๐—ป ๐—ฆ๐—ผ๐˜‚๐—ฟ๐—ฐ๐—ฒ ๐—Ÿ๐—Ÿ๐—  ๐—ฃ๐—ฟ๐—ผ๐—บ๐—ฝ๐˜ ๐—œ๐—ป๐—ท๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—ง๐—ผ๐—ผ๐—น
Praetorian is back with another tool (one of their 12 Caesars): Augustus... Make sure you check it out! www.praetorian.com/blog/introdu....

1 month ago 0 0 1 0
Preview
Breaking Down CVE-2026-25049: How TypeScript Types Failed n8n's Security | hetmehta.com Deep technical analysis of CVE-2026-25049: How type confusion bypassed n8n's security patch and why TypeScript types aren't runtime security boundaries

โจ ๐—•๐—ฟ๐—ฒ๐—ฎ๐—ธ๐—ถ๐—ป๐—ด ๐——๐—ผ๐˜„๐—ป ๐—–๐—ฉ๐—˜-๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ-๐Ÿฎ๐Ÿฑ๐Ÿฌ๐Ÿฐ๐Ÿต: ๐—›๐—ผ๐˜„ ๐—ง๐˜†๐—ฝ๐—ฒ๐—ฆ๐—ฐ๐—ฟ๐—ถ๐—ฝ๐˜ ๐—ง๐˜†๐—ฝ๐—ฒ๐˜€ ๐—™๐—ฎ๐—ถ๐—น๐—ฒ๐—ฑ ๐—ป๐Ÿด๐—ป'๐˜€ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜†
A great explanation of the recent vulnerabilities impacting n8n. If you are working in security on TypeScript projects, it's a must read. hetmehta.com/posts/n8n-ty....

1 month ago 1 0 1 0

๐—ฅ๐—ฒ๐˜€๐—ฒ๐—ฎ๐—ฟ๐—ฐ๐—ต ๐—ช๐—ผ๐—ฟ๐˜๐—ต ๐—ฅ๐—ฒ๐—ฎ๐—ฑ๐—ถ๐—ป๐—ด - ๐—ช๐—ฒ๐—ฒ๐—ธ ๐Ÿณ, ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ
Parser Differential, TypeScript and AI

๐Ÿ‘‡

1 month ago 3 1 1 0