Explore tweets tagged as #CodeInjection
@Hakin9
Hakin9
4 years
Tweet media one
2
25
28
@ptracesecurity
Ptrace Security GmbH
5 years
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
33
76
@overflow_meme
Meme Overflow
4 years
Email tracing script appearing in all pages opened in Google Chrome #googlechrome #codeinjection #javascript
Tweet media one
0
3
1
@freeprogrammers
Mr.programmer
1 year
#موقت .#آموزشی.#udemy . بچه ها این دوره خوبیه تا برداشته نشده به اکانت یودمی تون اضافه کنید. موضوع :.XSS Survival Guide. Coupon : 6BB8720306F8274B42EC. Link :. #XSS #Security #WebDevelopment #Cybersecurity #CodeInjection #OWASP #WebSecurity
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
4
25
@jssodhi
Prof (Dr) JSSodhi
5 years
Tweet media one
0
1
3
@ptracesecurity
Ptrace Security GmbH
5 years
Userland API Monitoring and Code Injection Detection #Pentesting #API #CodeInjection #CyberSecurity #Infosec
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
32
79
@ptracesecurity
Ptrace Security GmbH
4 years
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection. #Malware #CodeInjection #Debugging #CyberSecurity #Infosec
Tweet media one
0
10
29
@ptracesecurity
Ptrace Security GmbH
7 years
Userland API Monitoring and Code Injection Detection #CodeInjection #ExploitDev #Infosec
Tweet media one
0
7
14
@move2thecloud
Stephen Webster
4 years
Heavily used @nodejs package has a #codeinjection #vulnerability
Tweet media one
0
1
0
@spotheplanet
spotheplanet
6 years
New notes on code injection via process hollowing and image Windows PE image relocations #processhollowing #codeinjection #evasion
Tweet media one
0
45
56
@DeepInstinctSec
Deep Instinct
6 years
Script-based attacks, dual-use tools and #codeinjection techniques are often hard to predict and prevent. Watch this demonstration, to see how we are able to prevent a #ransomware based on a #fileless attack vector >>.
0
0
0
@DeepInstinctSec
Deep Instinct
2 years
Dirty Vanity is a new #codeinjection technique that abuses forking, a lesser-known mechanism that exists in Win OS. In this post, Deep Instinct's security researcher, Eliran Nissan, explores forking and its legitimate use:. #EDR #DeepLearning
Tweet media one
0
2
4
@ccfis
CCFIS
5 years
Tweet media one
0
1
4
@parrot_ctfs
Parrot CTFs
2 years
Tweet media one
2
2
1
@bl4ckh0l3z
💥 𝕭𝖑4𝖈𝖐𝖍0𝖑3𝖟 👾
6 years
Tweet media one
1
6
7
@johnk3r
Padawan
4 years
I admire several security companies, @TrendMicro one of them. Happy to help with the safety of your products. #bugbounty #codeinjection
Tweet media one
0
2
2
@sucurisecurity
Sucuri Security
5 years
Turns out, hackers love a good meme as much as the rest of us. Find out the meme reference we've found in nearly 10,000 WordPress attacks in this week's Sucuri Sync-Up!.📖 Read the blog: ---.#codecomments #codeinjection #malware #cybersecurity
0
6
27
@nav1n0x
N$
1 year
Found another PHP Code Injection/RCE bug in the same program, but on a different domain. Luckily, the program didn't say "shared code". Payload: . GET /?some_parameter='.print(`id`).'&_language=english&**another_parameter=1 HTTP/1.1. #BugBounty #PHP #RCE #CodeInjection
Tweet media one
Tweet media two
@nav1n0x
N$
1 year
This is the quickest RCE I've ever gotten. The app has a popup for multi-selection fields. I intercepted the request, expecting XSS or SQLi, but found that the parameter **_session_name= can be exploited to get an #RCE as a surprise. Payload: `&**='.print((`id`)).'` #BugBounty
Tweet media one
5
72
436