
HackingDept
@hacking_dept
Followers
87
Following
74
Media
5
Statuses
38
RT @stm_cyber: We are releasing the first wave of vulnerabilities targeting @paxtechnology PAX Android POS terminals. The list includes pre….
blog.stmcyber.com
In this article, we present details of 6 vulnerabilities on the Android POS devices made by the worldwide known company PAX Technology.
0
31
0
RT @stm_cyber: Our pentesters Stanisław Koza and Jakub Sajniak (@kubolos231) found another high vuln in the Cisco product. It was marked CV….
blog.stmcyber.com
A vulnerability in the web mgmnt interface of Cisco Unified CM and CM SME could allow an authenticated, remote attacker to conduct SQL injection attack.
0
4
0
RT @p4_team: Get ready, set, hack! just hit the ground! ⏰ Less than 24hrs to uncover flags, conquer snacks & tackle….
0
7
0
RT @p4_team: Third time's a charm! Once again @p4_team and @DragonSectorCTF have joined forces as the Poland Can Into Space team to conquer….
0
34
0
RT @stm_cyber: The best feature of the decompiler is one that spawns random processes and gives you a heart attack. Check out our story on….
blog.stmcyber.com
Finding RCE during deobfuscation in JEB decompiler running on Java 18.
0
14
0
RT @p4_team: Winner winner chicken dinner 🦆Poland stronk 🇵🇱 💪 Once again we won @hack_a_sat quals 🚀 together with @DragonSectorCTF and frie….
0
11
0
Poniżej zamieszczamy częściowe wyniki konkursu CYBERSEC CTF by HackingDept #CS22_EXPO.Zwycięzcom i wszystkim uczestnikom gratulujemy 💪 Mamy nadzieję, że zobaczymy się na kolejnej edycji.
Na koniec pierwszego dnia konferencji rozstrzygnęliśmy konkurs #cybersecurity CYBERSEC CTF by @hacking_dept. Gratulujemy wszystkim, którzy podjęli wyzwanie, a szczególnie zwycięzcom #cyber zmagań 💪🏻👏🏻🎊
0
3
8
Nasz CTF startuje za niecałe 30 min, jeżeli chcesz zgarnąć nasze gadżety spróbuj swoich sił na:. A jeżeli jesteś na @CYBERSECEU #CS22_EXPO wpadnij i się przywitaj :)
0
2
5
Jeżeli jesteś studentem spróbuj swoich sił!.Mija ostatnia szansa aby się zarejestrować i wziąć udział w konkursie i konferencji. Jeżeli nie możesz przyjechać, a chcesz zmierzyć się z zadaniami, nic straconego, zarejestruj się na wydarzenie online.
Ostatnia szansa, by się zapisać i wziąć udział w konkursie #cybersecurity❗️. 15 zadań, .nagrody pieniężne,.okazja do sprawdzenia swoich zdolności z zakresu cyberbezpieczeństwa. Wydarzenie ma miejsce podczas CYBERSEC Forum/EXPO #CS22_EXPO. Dołącz do nas❗️.
0
3
5
RT @p4_team: Second year in a row @p4_team and @dragonsectorctf have joined forces as the Poland Can Into Space team to conquer space 🇵🇱 🚀….
0
23
0
Last weekend, p4 representation flew to Saudi Arabia for our first onsite CTF since the COVID-19 breakout. The visit was fruitful - 3rd place and 100k SR (almost 27k USD) reward. Thanks to @athackcon for the invitation, awesome CTF, and your outstanding hospitality.
1
0
4
RT @stm_cyber: Our research on @IBM Password Sync Plugin for Windows AD was recognized in their Security Bulletin P….
0
7
0
RT @p4_team: Once again, we have teamed up with @DragonSectorCTF to participate in the @hack_a_sat, a space security CTF contest. This year….
0
17
0
RT @stm_cyber: Helpful collection of #Excel4.0 functions for #RedTeam and #BlueTeam. Check out our #github: #pentest.
github.com
List of Awesome Excel4.0/XLM tricks and functions useful for Red Team and Blue Team. This list is for anyone wishing to learn about Excel4.0/XLM for Red Team but do not have a starting point. - STM...
0
6
0
RT @p4_team: As every year, we organise a #CTF for you to play. This time, @OMHconf is our host and @PolskaHuawei is our sponsor. Everyone….
0
14
0
Our friend from STM Solutions @_mzer0 has released a cool open source tool for searching and pwning Java RMI. It seems to work really nice :).
github.com
RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets from ysoserial. - STMCyber/RmiTaste
0
0
2
RT @p4_team: We still don't know how the final scoreboard looks like, but our on-orbit challenge payload/plan was the best and it's going t….
0
23
0
RT @Adam_pi3: Satellite arrived. @p4_team @DragonSectorCTF @hack_a_sat #HackASat #PolandCanIntoSpace
0
30
0