Runion

This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Search results

  1. B

    I lost my account access

    Well, what does your topic have to do with the subject of this thread? This is a court; read the rules before anything else.
  2. B

    Tracking New CVEs on GitHub Automatically.

    Yes, I've seen this one and a few others as well. However, they all just made small changes just to have something different. I haven't seen any particularly good ideas (at least in my opinion). By the way, I also created a Flask project on the same topic, which you can see here...
  3. B

    Tracking New CVEs on GitHub Automatically.

    Yes, exactly—I wanted the script to focus on this topic, but the mention of DimmuBurgor r was interesting. I’m now working on the next update based on this scenario, and if you have any other ideas for the next update, please let me know! Anyway, thank you and everyone else 🫀
  4. B

    Прокси в одни руки

    oxylabs proxyempire scraperapi proxyrack netnut smartproxy brightdata soax proxyguys proxynet gridpanel
  5. B

    Tracking New CVEs on GitHub Automatically.

    Updates: Added Repository Search by Keywords: You can now search for repositories using specific keywords. Added README.md: Documentation has been included to help you get started. You can now find this on GitHub. Happy hacking! README.md Ghost-CVE GitHub CVE Repository Hunt Hey hackers...
  6. B

    Tracking New CVEs on GitHub Automatically.

    Yes, it is a good suggestion. I will definitely use this for the next update .
  7. B

    Tracking New CVEs on GitHub Automatically.

    I am developing it, I will add the README for brief details in the next section !
  8. B

    Tracking New CVEs on GitHub Automatically.

    Greetings to all those who are always eager to hunt for new security vulnerabilities and ensure the best possible security. Here is GhostCVE Finder, a tool designed to search and discover new CVEs via GitHub. Leveraging the powerful GitHub API and robust Python libraries, this script enables you...
  9. B

    Знаете, что случилось с Syniverse?

    The recent Syniverse outage reaked havoc on global communication, and while they blame a simple config error at a peering partner, the scent of a more elaborate attack lingers. Here's why: The Telltale Signs of a Traffic Flood: The outage smacked of a Distributed Denial-of-Service (DDoS)...
  10. B

    Статья Fileless Malware: Executing Malware Stealthily from Registry for Beginners

    I'm not trying to collect likes, this fileless malware is a term, so I didn't lie to anyone. read the whole article, it's not my fault.
  11. B

    Статья Fileless Malware: Executing Malware Stealthily from Registry for Beginners

    It's good. right from the beginning of the article, and in the poster and title of the article, I stated that it's for beginners. It shouldn't be implemented with all advanced methods right now. we should always start with less. slowly, slowly, not rushing to the top step, I've only outlined a...
  12. B

    Статья Fileless Malware: Executing Malware Stealthily from Registry for Beginners

    Thanks for your feedback! yes, you’re right that modern antivirus solutions are very fast, and the probability of detection increases when an executable file touches the disk. However, this article was only meant to show the basic principles and a simple PoC. In reality, we use more...
  13. B

    Статья Fileless Malware: Executing Malware Stealthily from Registry for Beginners

    you are right. The concept of this article is to be able to hide malware as much as possible, and one of the methods is to store them in the temp file, and this is an example implemented for very simple purposes. :smile10:
  14. B

    Статья Fileless Malware: Executing Malware Stealthily from Registry for Beginners

    Hello dear users, today I have prepared an introductory article about fileless malware for you. I hope this article is good and efficient and will help newbies, and in the next parts I will talk more about the methods of this type of malware. What is fileless malware? ak in-memory malware ,aka...
  15. B

    Статья EvoBanco - Vulnerability

    password?
  16. B

    Owa/Forti

    it is interesting! Has the same famous exploit been used?
  17. B

    Provide me with SIP and I will do all the work you get 60%

    My friend, I mean, when you can use another service and have that percentage yourself, why should you take anything from people?
  18. B

    Provide me with SIP and I will do all the work you get 60%

    So why don't you use other services and ask people to give you SIP?
  19. B

    Provide me with SIP and I will do all the work you get 60%

    I think it is very suspicious he can do it very easily use just-kill and keep a percentage for himself .
  20. B

    Provide me with SIP and I will do all the work you get 60%

    Флуд сервис — смс флуд, емейл флуд, телефонный флуд | Just-kill Флуд сервис — смс флуд, емейл флуд, телефонный флуд | Just-kill just-kill.pro also 60% for yourself
Top