| | Rust for Malware Development (bishopfox.com) |
| 2 points by kurhan 11 days ago | past | discuss |
|
| | Raink: Use LLMs for Document Ranking (bishopfox.com) |
| 4 points by rahimnathwani 9 months ago | past |
|
| | Raink: Use LLMs for Document Ranking (bishopfox.com) |
| 1 point by noperator 10 months ago | past |
|
| | Show HN: Broken Hill: A Productionized GCG Attack Tool for Use Against LLMs (bishopfox.com) |
| 4 points by blincoln on Sept 24, 2024 | past | 1 comment |
|
| | An exploration of JSON interoperability vulnerabilities (bishopfox.com) |
| 2 points by fanf2 on Sept 4, 2024 | past |
|
| | Don't use pixelation for redacting text (2022) (bishopfox.com) |
| 62 points by bookofjoe on May 20, 2024 | past | 51 comments |
|
| | GWT: Unpatched, Unauthenticated Java Deserialization (bishopfox.com) |
| 1 point by blincoln on Dec 18, 2023 | past |
|
| | Bad Pods: Kubernetes Pod Privilege Escalation (2021) (bishopfox.com) |
| 1 point by sneakerblack on Dec 1, 2023 | past |
|
| | h2c Smuggling: Request Smuggling via HTTP/2 Cleartext (h2c) (bishopfox.com) |
| 3 points by pabs3 on March 4, 2022 | past |
|
| | Don't use text pixelation to redact sensitive information (bishopfox.com) |
| 485 points by feross on Feb 15, 2022 | past | 163 comments |
|
| | An Exploration of JSON Interoperability Vulnerabilities (bishopfox.com) |
| 2 points by spacebanana7 on Feb 11, 2022 | past |
|
| | XMPP: An Under-Appreciated Attack Surface (bishopfox.com) |
| 25 points by zaik on Jan 8, 2022 | past | 3 comments |
|
| | An Intro to Fuzzing (a.k.a. Fuzz Testing) (bishopfox.com) |
| 4 points by historynops on Oct 25, 2021 | past |
|
| | IAM Vulnerable – An AWS IAM Privilege Escalation Playground (bishopfox.com) |
| 1 point by thinkmassive on Sept 10, 2021 | past |
|
| | You're Doing IoT RNG (bishopfox.com) |
| 3 points by gregmac on Aug 9, 2021 | past | 1 comment |
|
| | Lexss: Bypassing Lexical Parsing Security Controls (bishopfox.com) |
| 16 points by todsacerdoti on June 25, 2021 | past | 2 comments |
|
| | Bad Pods: Kubernetes Pod Privilege Escalation (bishopfox.com) |
| 2 points by lateoctober on April 20, 2021 | past |
|
| | An Exploration of JSON Interoperability Vulnerabilities (bishopfox.com) |
| 46 points by theBumbleSec on Feb 26, 2021 | past | 14 comments |
|
| | Lessons Learned on Brute-Forcing RMI-IIOP with RMIScout (bishopfox.com) |
| 1 point by bishop_fox on Dec 8, 2020 | past |
|
| | OpenClinic Version 0.8.2 – security advisory (bishopfox.com) |
| 1 point by bishop_fox on Dec 1, 2020 | past |
|
| | The Pen Testing Tools We’re Thankful for in 2020 (bishopfox.com) |
| 3 points by bishop_fox on Nov 23, 2020 | past |
|
| | Diverse Perspectives Offer a Broader Understanding of Your Attack Surface (bishopfox.com) |
| 1 point by bishop_fox on Nov 17, 2020 | past |
|
| | Cheating at Online Video Games and What It Can Teach Us About AppSec (Part 3) (bishopfox.com) |
| 1 point by bishop_fox on Nov 10, 2020 | past |
|
| | Immuta Version 2.8.2 – Security Advisory (bishopfox.com) |
| 1 point by bishop_fox on Nov 4, 2020 | past |
|
| | Cheating at Online Video Games and What It Can Teach Us About AppSec (Part 2) (bishopfox.com) |
| 2 points by bishop_fox on Nov 2, 2020 | past |
|
| | Cheating at Online Video Games and What It Can Teach Us About AppSec (Part 1) (bishopfox.com) |
| 1 point by bishop_fox on Oct 29, 2020 | past |
|
| | Winston Privacy Version 1.5.4 Disclosure (bishopfox.com) |
| 1 point by bishop_fox on Oct 27, 2020 | past |
|
| | Accidentally Secure Is Not Secure: A Case of Three Stooges Syndrome (bishopfox.com) |
| 2 points by bishop_fox on Oct 20, 2020 | past |
|
| | How to Keep Your Organization Safe from Social Engineering (bishopfox.com) |
| 2 points by bishop_fox on Oct 13, 2020 | past |
|
| | Defining the Scope of Your Pen Test (bishopfox.com) |
| 1 point by bishop_fox on Oct 6, 2020 | past |
|
|
| More |