Amit Sidesamitsides.hashnode.dev·Nov 13, 2024AI & Cyber Security: Exploiting Insights from High-Dimensional Vectors SpacesIntroduction ( Quick note on Article focus: not on the HOW vector embeddings are generated but the WHAT capabilities of these representations per se in cybersecurity) Many modern machine learning and deep learning algorithms, such as neural networks,...#cybersecurity
Riya Sanderriyasander.hashnode.dev·Oct 18, 2024Is Remote Code Execution the Same as Code Injection?Everyone knows that cybersecurity threats are growing and becoming more sophisticated each day. So the organization and developers now know about the different kinds of attackers. When it comes to vulnerabilities in applications, two key threats are ...Remote Code Execution
Chimere Anyiamcybermere.hashnode.dev·Aug 10, 2024Dropbear SSH CVE-2016-7406: A Guide to the Remote Code Execution VulnerabilityIntroduction The Dropbear SSH Remote Code Execution vulnerability (CVE-2016-7406) has significant implications for systems that rely on this lightweight SSH server and client software. Commonly used in embedded systems and IoT devices, Dropbear SSH's...CVE-2016-7406
Mahboob Alammahboobalam.hashnode.dev·Jun 18, 2024My Experience Building a Leetcode-Like Online Judge and How You Can Build OneIntroduction We all love bikes, don’t we? Imagine the satisfaction of building your own custom bike! I know, I know, It might not be the best in town, but the pride of turning your passion into a product is unmatched. As software engineers, we love c...Microservices
kblog.run-rx.com·Jan 3, 2024Introducing rx: remote execution made easyrx is a command line tool that makes it easy to run code remotely. You can use any tools you're comfortable with locally and, at a moment's notice, run anything you're working on on a remote machine without any hassle. This lets you focus on coding a...Remote Code Execution
0xrzforVoorivex's Teamblog.voorivex.team·Oct 14, 2023Uncovering a Command Injection, $2400 BountyHello, in this write-up I will explain how I found four P1 and two P2 bugs and showed multiple attack scenarios. Recon Usually, the first thing I do to get started on wide-scope programs is to find the ASNs and CIDRs of the company, through which I c...23 likes·5.3K readsRemote Code Execution
Haneunhanlee.hashnode.dev·Aug 29, 2023Operating System Commands by Http RequestDefinition Operating system command execution vulnerabilities are weaknesses that allow malicious users to execute malicious code or induce abnormal behavior within a system using the commands of the operating system. List of Vulnerability Trigger Po...Cyber Security#cybersecurity
Snyksnyksec.hashnode.dev·Sep 7, 2022How to find and fix XML entity vulnerabilitiesXML is a human-readable text format used to transport and store structured data. Tags and data structures are defined by users in self-describing documents that are universally parsable by any XML tool, giving developers a highly configurable mechani...xml
Greg MagolanforAspect Blogblog.aspect.build·Sep 6, 2022Bazel + TypeScript: faster with Remote ExecutionThis post will show how much faster TypeScript builds can be when using remote execution, Bazel's unique ability to parallelize transpile and type-check work across a farm of machines. We hope that Bazel 6.0 will include fixes for symlinks support, m...1 like·2.4K readsbazel
Allan Diegoallandiego-xgodgodx.hashnode.dev·Jun 25, 2022Toxic - Hack the boxE ai tudo Ok? Hoje será a resolução do challenge Toxic - Hack the Box. Obs: Para começar o reconhecimento deste desafio é necessário fazer o download dos arquivos do web site dentro da plataforma do hack the box. Reconhecimento Depois de fazer o d...hack-the-box