GitHub - vanhoefm/airsnitch: Generalized Wi-Fi Client Isolation Bypasses

Generalized Wi-Fi Client Isolation Bypasses. Contribute to vanhoefm/airsnitch development by creating an account on GitHub.

GitHub

Tried my new VPN gateway on a Raspberry Pi and booted BlackArch live to explore some tools. Sadly, the distro feels abandoned: outdated packages, broken apps, no copy/paste in terminals, and a prehistoric Firefox. A shame, because it still boots under 500MB RAM πŸ˜•

#linux #infosec #pentest #raspberrypi #vpn #blackarch

This ASPX web shell enables execution of Beacon Object Files (BOFs) on a target server using a semi-interactive Python client.

https://github.com/epotseluevskaya/ASPX_WebShell_COFFLoader

#infosec #cybersecurity #redteam #pentest #web

GitHub - epotseluevskaya/ASPX_WebShell_COFFLoader: ASPX Web Shell with COFF Loader

ASPX Web Shell with COFF Loader. Contribute to epotseluevskaya/ASPX_WebShell_COFFLoader development by creating an account on GitHub.

GitHub

πŸ“£ New @7ASecurity public #Pentest report
πŸ” @dComms improves resilience with verified fixes, thanks to @OpenTechFund
4 issues identified (2 high) and remediated
Feedback is welcome enjoy πŸ™‚
πŸ”— https://7asecurity.com/blog/2026/03/dcomms-audit-by-7asecurity/

#7ASecurity #CyberSecurity #OpenSource #dComms #infosec

dComms audit by 7ASecurity - 7ASecurity Blog

dComms security audit by 7ASecurity covering whitebox testing, vulnerabilities, and remediations for secure decentralized communication

7ASecurity Blog

Another session announcement for BSides Luxembourg!

πŸ’» π—§π—›π—’π—¦π—˜ π—ͺ𝗛𝗒 𝗗𝗒𝗑’𝗧 π—Ÿπ—˜π—”π—₯𝗑 𝗙π—₯𝗒𝗠 π—–π—©π—˜π—¦ 𝗔π—₯π—˜ π——π—’π—’π— π—˜π—— 𝗧𝗒 π—₯π—˜π——π—œπ—¦π—–π—’π—©π—˜π—₯ π—§π—›π—˜π—  - Louis Nyffenegger (@snyff ) πŸ’₯

Real vulnerabilities don’t appear in isolation, they’re rooted in code, context, and human error. This session walks through actual CVEs, analyzing the code where they were introduced. You will see the patterns, assumptions, and language quirks that led to the flaw - not just the exploit, but the moment it could’ve been caught.

Louis Nyffenegger https://bsky.app/profile/snyff.pentesterlab.com is the founder of PentesterLab and AppSecSchool, application security expert, and hands-on trainer with experience at the National Bank of Australia, Australia Post, and Fitbit.

πŸ“… Conference Dates: 6–8 May 2026 | 09:00–18:00
πŸ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: https://2026.bsides.lu/tickets/
πŸ“… Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg #CVE #CodeReview #SecureCoding #PenTest #SecurityEducation #DevSecOps

Opening a file in GNU Emacs can trigger arbitrary code execution through version control (git), most requiring zero user interaction beyond the file open itself.

https://github.com/califio/publications/blob/main/MADBugs/vim-vs-emacs-vs-claude/Emacs.md

#infosec #cybersecurity #redteam #pentest #ai #emacs #claude

publications/MADBugs/vim-vs-emacs-vs-claude/Emacs.md at main Β· califio/publications

Publications from Calif. Contribute to califio/publications development by creating an account on GitHub.

GitHub
Vim tabpanel modeline escape affects Vim < 9.2.0272

Vim tabpanel modeline escape affects Vim < 9.2.0272 =================================================== Date: 30.03.2026 Severity: High CVE: *not-yet-assigned* CWE: Improper Neutralization of ...

GitHub

Extract Windows credentials directly from VM memory snapshots and virtual disks

https://github.com/nikaiw/VMkatz

#infosec #cybersecurity #redteam #pentest #windows #opensource

GitHub - nikaiw/VMkatz: Extract Windows credentials directly from VM memory snapshots and virtual disks

Extract Windows credentials directly from VM memory snapshots and virtual disks - nikaiw/VMkatz

GitHub
Zero Trust dla LLM-Γ³w.
PodrΔ™cznik programisty NVIDIA NemoClaw : https://lnkd.in/db5pZH68
#nemoclaw #pentest #ai #intership #securityAI #ZeroTrust #LM