eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

225
active users

#offsec

0 posts0 participants0 posts today
CyberDevHq<p>Want to master Linux Kernel Exploitation?</p><p>Check out <a href="https://github.com/Gr3ytrac3/linux-kernel-exploitation" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/Gr3ytrac3/linux-ker</span><span class="invisible">nel-exploitation</span></a> — a curated arsenal of exploits, labs, write-ups &amp; fuzzing tools.</p><p>From Dirty Pipe to modern bypasses<br>Credits: @andreyknvl </p><p><a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://infosec.exchange/tags/Exploitation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploitation</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/OffSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OffSec</span></a> <a href="https://infosec.exchange/tags/KernelHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KernelHacking</span></a></p>
Pen Test Partners<p>Microsoft Copilot for SharePoint just made recon a whole lot easier. 🚨<br>&nbsp;<br>One of our Red Teamers came across a massive SharePoint, too much to explore manually. So, with some careful prompting, they asked Copilot to do the heavy lifting...<br>&nbsp;<br>It opened the door to credentials, internal docs, and more.<br>&nbsp;<br>All without triggering access logs or alerts.<br>&nbsp;<br>Copilot is being rolled out across Microsoft 365 environments, often without teams realising Default Agents are already active.<br>&nbsp;<br>That’s a problem.<br>&nbsp;<br>Jack, our Head of Red Team, breaks it down in our latest blog post, including what you can do to prevent it from happening in your environment.<br>&nbsp;<br>📌Read it here: <a href="https://www.pentestpartners.com/security-blog/exploiting-copilot-ai-for-sharepoint/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/exploiting-copilot-ai-for-sharepoint/</span></a></p><p> <a href="https://infosec.exchange/tags/RedTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTeam</span></a> <a href="https://infosec.exchange/tags/OffSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OffSec</span></a> <a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/Microsoft365" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft365</span></a> <a href="https://infosec.exchange/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://infosec.exchange/tags/MicrosoftCopilot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftCopilot</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudSecurity</span></a></p>
Marek Alexa :verified:<p>⚠️ Are you learning about <a href="https://techhub.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> and <a href="https://techhub.social/tags/offsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>offsec</span></a> ?<br>Join me on my <a href="https://techhub.social/tags/vlog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vlog</span></a> where I document 📹 everything on this channel <a href="https://youtu.be/WsLn4_0C0a0?si=woPcXjJe3y6WANS_" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">youtu.be/WsLn4_0C0a0?si=woPcXj</span><span class="invisible">Je3y6WANS_</span></a></p><p>You'll probably also learn something useful. Pentesting can be a lot of fun and a great career. 💼 </p><p>Feedback is welcome.</p><p><a href="https://techhub.social/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a> <a href="https://techhub.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
Shawn Webb<p>Cool research by my coworkers at IOActive: <a href="https://www.wired.com/story/digital-license-plate-jailbreak-hack/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/digital-licens</span><span class="invisible">e-plate-jailbreak-hack/</span></a></p><p><a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>offsec</span></a></p>
Red bearded Hacker - he/his<p><a href="https://www.tiktok.com/t/ZP8NeQa6B/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">tiktok.com/t/ZP8NeQa6B/</span><span class="invisible"></span></a></p><p>This TikTok video is a demonstration of capabilities posted to a telegram channel selling an Android RAT. </p><p>The video demonstrates total control over a remote mobile device, which makes this similarly capable to Pegasus malware created by NSO Group, but for much more affordable rates. </p><p>Now, it could be a scam of course, I haven't paid for the product to validate it, but on the surface here it looks like a solid product. </p><p>Making Pegasus level malware available to people for under a grand. This is awesome. Everything is fine. </p><p><a href="https://infosec.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/apt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apt</span></a> <a href="https://infosec.exchange/tags/rat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rat</span></a> <a href="https://infosec.exchange/tags/trojan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>trojan</span></a> <a href="https://infosec.exchange/tags/apt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apt</span></a> <a href="https://infosec.exchange/tags/nsogroup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nsogroup</span></a> <a href="https://infosec.exchange/tags/pegasus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pegasus</span></a> <a href="https://infosec.exchange/tags/russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>russia</span></a> <a href="https://infosec.exchange/tags/israel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>israel</span></a> <a href="https://infosec.exchange/tags/skiddy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>skiddy</span></a> <a href="https://infosec.exchange/tags/offsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>offsec</span></a> <a href="https://infosec.exchange/tags/spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spyware</span></a> <a href="https://infosec.exchange/tags/surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>surveillance</span></a> <a href="https://infosec.exchange/tags/nothingissafe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nothingissafe</span></a> <a href="https://infosec.exchange/tags/nooneissafe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nooneissafe</span></a> <a href="https://infosec.exchange/tags/analog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>analog</span></a> <a href="https://infosec.exchange/tags/digital" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digital</span></a> <a href="https://infosec.exchange/tags/worldonfire" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>worldonfire</span></a></p>
sk3w<p><a href="https://infosec.exchange/tags/introduction" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>introduction</span></a></p><p>Hey I'm John, and I love learning and becoming better. Most days I'm trying to be a better dad, husband, friend, community member, and guarding my own <a href="https://infosec.exchange/tags/mentalhealth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mentalhealth</span></a>.</p><p>For work I do <a href="https://infosec.exchange/tags/offsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>offsec</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> stuff, and enjoy research deep-dives when I get the opportunity. Lately I've been writing lots of tools in <a href="https://infosec.exchange/tags/rustlang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rustlang</span></a>. Sometimes I stream on <a href="https://infosec.exchange/tags/twitch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>twitch</span></a>, where I try to code and talk at the same time, poorly. Sometimes I give talks at <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> cons about my mediocre code (and throw in a few <a href="https://infosec.exchange/tags/dadjokes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dadjokes</span></a>).</p><p>Away from screens, my main hobby seems to be trying out new hobbies, but the ones that have stuck are books (mostly <a href="https://infosec.exchange/tags/scifi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scifi</span></a> <a href="https://infosec.exchange/tags/fantasy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fantasy</span></a> spec-fic), playing <a href="https://infosec.exchange/tags/guitar" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>guitar</span></a>, running/exercise, and backyard <a href="https://infosec.exchange/tags/hydroponics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hydroponics</span></a>.</p>