▄▄▄██████████████▄▄▄ ▄▄▄▄▄██▀▀ ▀█▄ ▄▄█▀▀▀▀ █ █ ▄▄██▀▀▀ ██ ▄▀ ▄██▀▀ █▀ ▀██▄▄ ██ █ ▀▀▀█▄▄▄▄ ██ ██ ▀▀▀█▄▄ █ █ ╒════════════════════▀█▄ ══██ ═════██ ════════════════════════════════════╕│ │▀█▄██ █ ││ │ │██ ██ ││ │ │██▄ █▀ ││ │ │▄███▄ ▄█ ▄███ ││ │ │2 0 2 0 0 2 0 4 ███ █ █ ▄█▀ ▀█ ▄█▄ ▄█ ▄█▀▀▀▄ ▄█ ││ │ │██ ▄█ █ ▄█▀ ▀█▄▀██ █▀█▄ ▄▄█▀▄▄█ ▄█▀ ││ │ │S E A S O N 3 ██ █▀ ██▀ █▄█▀ ▀█▀ █▄█▀ ││ │ │▄██ █ ▀ ▄██▀ ││ │ │P R E M I E R E █████ ▄█▀ █ ││ │ │████ ▄█▀ █ ││ │ │██ ▄█▀ █ ││ │ │▀ █▀ █ ││ │ │█ █ ││ │ │█▀ ▄█▀ ││ │ │▄▄▄▄█▀▀▀▀▀█▄ █ ▄█ ││ │ │▄██▀▀ █▄ ▀█▄ ▄▄█▀ ││ │ │▄█▀ █ ▀▀▀▀ ││ │ │▄█▀ ││ ▄ │ │▄█▀ ││ █ │ │██ │██ │ │██ ▄█ │ │██ █ │ │ ██ ██ │ ██▀ ▄ ▄▄▄ ██ ││ ██ █▀ ▄█▀ ▀██▀ ││ ▄█▀ █▀ █ ▄█▀▄ ▄▀██▄▄ ▄█ ▄█▄ ▄█▀█▄█ █▀█ ││ ██ │▄█▀ █▄█▀ ▀█▄▀▄█ ▀ █▄▄▀ █ █▀ █ ▄█▀ █ ││ ██ │▄█▀ ▀█▀ ▀▄▄█▀ ▀ ▀█▄█▀ ▀▄█▀ ▀█▄ ▄ ██ │▄█▀ │▀ ██ │▄█▀ ││ ▀██ ▄▄█▀ ││ │ ██ ▄▄██▀ ││ │ │▀██▄▄▄▄▄▄▄█▀▀ ││ │ │▀▀▀▀▀ ││ │ │ ││ │ │▄ ▄ ▄▄▄ ▄ ▄ ▄ ▄▄▄ ││ │ │█▀▄█ █▀ █ █ █ ▀▀▄ ││ │ │▀ ▀ ▀▀▀ ▀ ▀ ▀▀▀ ││ │ │ ││ │ │[ │Highlighted Stories ]│ │ │ ││ │ │ mindflayer ││ │ │> New Research Finds Half of SOCs are Ineffective ││ │ │ ││ │ │ zuphzuph ││ │ │> Hackers hijacking smart building access systems to launch DDoS ││ │ │ attacks ││ │ │ ││ │ │ busescanfly ││ │ │> How to Fake a Traffic Jam on Google Maps ││ │ │ ││ │ │ readme ││ │ │> Unpatched Teamviewer Privilege Escalation ││ │ │ ││ │ │ plazmaz ││ │ │> CVE-2019-18634: buffer overflow in sudo when pwfeedback is enabled ││ │ │ ││ │ │ yuu ││ │ │> Here's the Shadow Inc. App That Failed in Iowa Last Night ││ │ │> fs0c131y's thread on Shadow Inc. ││ │ │ ││ │ │[ │Other News Stories ]│ │ │ ││ │ │> Wawa's massive card breach: 30m customer details for sale online ││ │ │> Trend Micro antivirus zero-day used in Mitsubishi Electric hack ││ │ │> DOD contractor suffers ransomware infection ││ │ │> Nintendo hacker pleads guilty ││ │ │> Backdoor mechanism still active in devices using HiSilicon chips ││ │ │ ││ │ │▄▄▄ ▄▄▄ ▄▄▄ ▄▄ ▄▄▄ ▄▄▄ ▄▄▄ ▄▄ ▄▄▄ ││ │ │█ ▄ █ █ █ █ █ █ ██▀ █▀ █▄█ █ █ ▀▀▄ ││ │ │▀▀▀ ▀▀▀ ▀▀▀ ▀▀▀ ▀ ▀ ▀▀▀ ▀ ▀ ▀▀▀ ▀▀▀ ││ │ │ ││ │ │> PoC || GTFO 20 ││ │ │> CacheOut: Leaking Data on Intel CPUs via Cache Evictions ││ │ │> Paper Review - CacheOut (Video) ││ │ │> Grindr and OKCupid Sell Your Data, but Twitter's MoPub Is the Real ││ │ │ Problem ││ │ │> Mimidrv In Depth: Exploring Mimikatz’s Kernel Driver ││ │ │> Profiling BGP Serial Hijackers: Capturing Persistent Misbehavior ││ │ │ in the Global Routing Table ││ │ │> Hardware Debugging for Reverse Engineers Part 1: SWD, OpenOCD and ││ │ │ Xbox One Controllers ││ │ │> Shellcode: Data Compression ││ │ │> Analyzing Modern Malware Techniques - Part 1 ││ │ │> Analyzing Modern Malware Techniques - Part 2 ││ │ │> Pointer Compression in V8 ││ │ │> Hacking Robots Before Skynet: Technical Appendix ││ │ │ ││ │ │▄▄▄ ▄▄▄ ▄▄▄ ▄▄▄ ▄ ▄ ▄▄▄ ▄▄▄ ▄▄▄ ▄▄▄ ││ │ │██▀ █▀ ▀▀▄ █ █ █ █ ██▀ █ █▀ ▀▀▄ ││ │ │▀ ▀ ▀▀▀ ▀▀▀ ▀▀▀ ▀▀▀ ▀ ▀ ▀▀▀ ▀▀▀ ▀▀▀ ││ │ │ ││ │ │> Anti-RE Book ││ │ │> icyphox/shlide: slide deck presentation tool written in pure bash ││ │ │> ttmo-O/x86-manpages: x86/amd64 instruction reference manual pages ││ │ │> ddz/whatsapp-media-decrypt: Decrypt WhatsApp encrypted media files ││ │ │> cybereason-labs/gsoc-tools/emotet-locker: Reduce Emotet impact ││ │ │> Kernels 101 – Let’s write a Kernel (Writeup) ││ │ │> 0xb0bb/karkinos: A thorough library database to assist with binary ││ │ │ exploitation tasks. ││ │ │> bishopfox/dufflebag: Search exposed EBS volumes for secrets ││ │ │ ││ │ │▄▄▄ ▄ ▄ ▄▄▄ ▄▄▄ ▄▄▄ ▄▄▄ ▄▄▄ ▄▄ ▄▄▄ ▄▄▄ ││ │ │█ █▀█ █▀ █▄█ █ █ █ █ █ █ █▀ ▀▀▄ ││ │ │▀▀▀ ▀ ▀ ▀▀▀ ▀ ▀ ▀ ▀▀▀ ▀▀▀ ▀▀▀ ▀▀▀ ▀▀▀ ││ │ │ ││ │ │> From Hyper-V Admin to SYSTEM ││ │ │> decoder-it/Hyper-V-admin-EOP: Small POC in powershell exploiting ││ │ │ hardlinks during the VM deletion process ││ │ │> (Ab)using Kerberos from Linux ││ │ │> 0day vulnerability (backdoor) in firmware for HiSilicon-based ││ │ │ DVRs, NVRs and IP cameras ││ │ │ ││ │ │▄▄▄ ▄▄▄ ▄▄▄ ▄▄▄ ▄▄▄ ▄▄▄ ▄▄▄ ▄▄▄ ▄ ▄ ▄▄▄ ││ │ │▀▀▄ █▄█ █▀ █▄█ ██▀ █ ▄▀▀ █ █ █▀▄█ █▀ ││ │ │▀▀▀ ▀ ▀ ▀ ▀ ▀ ▀ ▀ ▀▀▀ ▀▀▀ ▀▀▀ ▀ ▀ ▀▀▀ ││ │ │ ││ │ │Please note that all links in the Safari section may contain ││ │ │malicious, offensive, or unwanted content. │Click at your own │ │ ││ risk! View the source to see links, use a VPN/Tor/Proxy, and│ │ │be respectful. ││ │ │ ││ │ │ aneilan ││ │ │> Crap I Found 2020-01-24 ││ │ │ ││ │ │ dustyfresh ││ │ │> "electronic filing" ││ │ │> A webstresser's error log ││ │ │ ││ │ │ hermit ││ │ │> peoplebyphone.com dork ││ │ │> a gift ││ │ │> radiancewhitening.com ││ │ │> A bare instance of a spam ad 1 ││ │ │> A bare instance of a spam ad 2 ││ │ │> Unknown roblox script ││ │ │ ││ │ │ nux ││ │ │> Hey look, a cool redirect! ││ │ │ ││ │ │ plazmaz ││ │ │> github dork for IFTT webhooks ││ │ │> A spammer's open bucket ││ │ │> Another spammer's open bucket ││ │ │> Over 4000 antimatter dimensions ││ │ │> tfw you leak your pastebin api key...on pastebin ││ │ │> The #1 Wholesaler of Genuine USD Notes ││ │ │> BEGIN PRIVACY ENHANCED MESSAGE dork ││ │ │ ││ │ │ sshell ││ │ │> map of every homedepot ││ │ │> homedepot tools ││ │ │> Really old insurance company backend 1 ││ │ │> Really old insurance company backend 2 ││ │ │> Scary Dork - "END OF TRANSUNION REPORT" ││ │ │> ancient dork - intitle:"CGILua message" ││ │ │ ││ │ │ x0 ││ │ │> "Hello Michael" ││ │ │ ││ │ │ yuu ││ │ │> Fandago CDN dork ││ │ │ ││ │ │ ││ ╘══════════════════════════════════════════════════════════════════════╛