Abu HurayraI Found 7 Log4j (RCE) in a Single Program!Hey folks! Okay, okay, calm down — I’m not an alien, btw. I’m Abu Hurayra, aka rootplinix — daytime hunter, nighttime writer (or sometimes…3d ago
InDev GeniusbySushant KumarThe Log4Shell Shockwave: How One Vulnerability Reshaped Our View on Dependency SecurityDecember 2021 was a watershed moment for the software industry, especially for those of us working with Java. The infamous Log4j…Nov 17
"CyberGuard: Malware and Vulnerabilities Analysis"ElasticCase Blue Team LabCategory: Threat HuntingAug 5Aug 5
InInfoSec Write-upsbyNol White HatTEXT4Shell PoC (CVE-2022–42889)Summary This article shows how an attacker could exploit the TEXT4Shell Vulnerability (CVE-2022–42889). For this purpose we will use U J…Oct 20, 2022Oct 20, 2022
Mark MaguireTuesday Morning Threat Report: May 21, 2024Proton Mail gives client data to police, the FBI seizes BreachForums (again), and a security flaw is found in Wi-FiMay 21May 21
Abu HurayraI Found 7 Log4j (RCE) in a Single Program!Hey folks! Okay, okay, calm down — I’m not an alien, btw. I’m Abu Hurayra, aka rootplinix — daytime hunter, nighttime writer (or sometimes…3d ago
InDev GeniusbySushant KumarThe Log4Shell Shockwave: How One Vulnerability Reshaped Our View on Dependency SecurityDecember 2021 was a watershed moment for the software industry, especially for those of us working with Java. The infamous Log4j…Nov 17
"CyberGuard: Malware and Vulnerabilities Analysis"ElasticCase Blue Team LabCategory: Threat HuntingAug 5
InInfoSec Write-upsbyNol White HatTEXT4Shell PoC (CVE-2022–42889)Summary This article shows how an attacker could exploit the TEXT4Shell Vulnerability (CVE-2022–42889). For this purpose we will use U J…Oct 20, 2022
Mark MaguireTuesday Morning Threat Report: May 21, 2024Proton Mail gives client data to police, the FBI seizes BreachForums (again), and a security flaw is found in Wi-FiMay 21
0x4C3DDLog4j Vulnerability (CVE-2021–44228) — Log4Shell: A Zero-Day Remote Code Execution ExploitIn the realm of Java application development, effective logging and monitoring play an indispensable role in maintaining the reliability…Aug 9, 2023
Marta ParisThe Hateful 8: Log4Shell (1/8)When I first started with this blog project, as a good ex-UX designer, first thing I did was learning about my target audience, that’s to…Aug 13, 2023
InInfoSec Write-upsbyTuhin BoseLog4shell Zero-Day Exploit— Full GuideHello guys! My name is Tuhin Bose (@tuhin1729). I am a cyber security researcher and bug bounty hunter. In this write-up, I am going to…Dec 14, 20215