Technical details have been published about the vulnerability of the Arm Mali GPU, which leads to RCE in the kernel and the rooting of Pixel 6 devices using a malicious application installed on the target device.
Technical details have been published about the vulnerability of the Arm Mali GPU, which leads to RCE in the kernel and the rooting of Pixel 6 devices using a malicious application installed on the target device.
Learning programming in the game
I present to you the PythonChallenge game, in which each level can be solved with a little Python programming. All levels can be solved using simple and very short scenarios.
Python Machine Learning Library
I found something that allows beginners to interact with complex operations with a few lines of code.
A service for turbo prototyping websites
The Draftium tool will help you create a website structure from ready-made blocks in a few minutes.
Chromeloader virus analysis: what, how and with what to eat or what is dangerous piracy
VMware has released fixes to address vRealize Log Insight vulnerabilities that could allow attackers to get remote code execution on uncorrected devices.
vRealize Log Insight (VMware Aria Operations for Logs) is a tool for analyzing and managing infrastructure and application logs in VMware environments.
Rapid7 announces the start of operation of the recently fixed critical CVE-2022-47966 in Zoho ManageEngine even before Horizon3.ai released its own PoC exploit.
The problem, considered critical, was discovered in November 2022, when Zoho announced the release of fixes for more than 20 affected local products.
Let's assume that there is nothing besides the victim's login.
Here is the algorithm for hacking an Instagram account that I use:
Automatic captcha completion: I'm not a robot!
We think many of you have come across this annoying captcha, which is available on a variety of web resources.
How to crack an Android password using a brute force attack?
Unlock your phone (or device) Android by selecting the PIN code on the locked screen.
We put passwords on any browsers!
All of us, one way or another, when using browsers, store a bunch of different personal information in them, it can be bookmarks, histories, passwords, logins, and so on. Of course, you can put a password on the computer itself, but such protection is quite easy to do.
🕵🏻♂️A selection of services for searching for information on a face photo.
In this post we will talk about finding the information we are interested in by face photo. And at the very end there will be the sweetest thing — an algorithm for searching / highlighting faces so that you can make your service!
How to quickly create a landing page?
At its core, a landing page is a page on the Internet that encourages users visiting it to do something. For example, it can be both buying tickets for the nearest event and subscribing to social networks.
Kali Linux Utilities in Thermex - Tools
In this post, we will consider an interesting utility from GitHub, it contains quite a lot of utilities that can be found in Kali Linux.
Nmap, Hydra, SQLMap, Metasploit, ngrok, Kali Nethunter, angryFuzzer, RedHawk, Weeman, IP GeoLocation, Cup, routersploit and so on. All this can be found in this utility.
We create our own virus for Android and glue it with another application in .apk!
With the help of the virus, we will get full access over an Android smartphone: we will be able to send SMS, take photos, watch passwords, use a microphone, etc.