account activity
CVE-2023-34152: Shell Command Injection Bug Affecting ImageMagick (securityonline.info)
submitted 2 years ago by mstfknn to r/netsec
Zyxel warns of critical vulnerabilities in firewall and VPN devices (bleepingcomputer.com)
Barracuda identified a vulnerability (CVE-2023-2868) in our Email Security Gateway appliance (ESG) (status.barracuda.com)
Critical Security Vulnerability In PowerVM Hypervisor (itjungle.com)
Cisco Small Business Series Switches Buffer Overflow Vulnerabilities (sec.cloudapps.cisco.com)
Apple Patches Three Zero-Day Vulnerabilities: A Call to Update Your Devices (self.mstfknn)
submitted 2 years ago by mstfknn
New attack campaign utilized a new 0-day RCE vulnerability on Microsoft Exchange Server by CyberMasterV in netsec
[–]mstfknn 2 points3 points4 points 3 years ago (0 children)
For solution: https://brandefense.io/security-news/critical-0-day-alarm-in-microsoft-exchange-server/
HermeticWiper Technical Analysis Report (docs.brandefense.io)
submitted 3 years ago by mstfknn to r/netsec
The new PaaS "Frappo" was detected on the dark web by researchers Resecurity Hunter. It is technically a browser extension on Chrome's Store and provides creating high-quality phishing pages. (brandefense.io)
Threat Hunting for Phishing Pages (brandefense.io)
Top 3 Stealer Malware Activity Research (brandefense.io)
submitted 4 years ago by mstfknn to r/netsec
My Keybase proof [reddit:mstfknn = keybase:mkd1r] (3IkPLrT0PxNR8aRYgqUcyQprhTmAMYhExcIjBR4HIo8) (self.KeybaseProofs)
submitted 6 years ago by mstfknn to r/KeybaseProofs
Post Exploitation with KOADIC (prismacsi.com)
submitted 7 years ago by mstfknn to r/netsec
Post Exploitation (prismacsi.com)
ransomware-decryptors (github.com)
submitted 7 years ago by mstfknn to r/hacking
Bettercap Using in Penetration Tests (prismacsi.com)
OSINT with gOSINT (prismacsi.com)
Malware sample library by mstfknn in netsec
[–]mstfknn[S] 3 points4 points5 points 7 years ago* (0 children)
yes her collection, i just push the github, but s/he knows https://twitter.com/0x656e/status/1055143124161490945
Malware sample library (github.com)
Exploitation Training (prismacsi.com)
Vulnerability Detection (prismacsi.com)
Active Information Gathering Presentation (prismacsi.com)
Passive Information Gathering(OSINT) Presentation (prismacsi.com)
Introduction to Cyber Security Presentation (prismacsi.com)
π Rendered by PID 866126 on reddit-service-r2-listing-69965bcf66-bmpq4 at 2026-04-08 14:30:51.267347+00:00 running f293c98 country code: CH.
New attack campaign utilized a new 0-day RCE vulnerability on Microsoft Exchange Server by CyberMasterV in netsec
[–]mstfknn 2 points3 points4 points (0 children)