-
Hello sir @osqzss,
I don't have words to thank you for helping me so much and guiding me on different occasions. I have successfully spoofed my GNSS receiver and some low-end smartphones. I am stu…
-
As Steve requested, I have copied our email thread into an issue here, so this first entry is in reverse order.
I'll chop out some of the extraneous signature stuff.
(Oh, and in case anyone is inter…
jbize updated
11 years ago
-
> Please provide us with the following information:
> ---------------------------------------------------------------
### This issue is for a: (mark with an `x`)
```
- [ ] bug report -> please…
-
Consider the following script:
```
vim --cmd 'hi def link 2 PreProc' --cmd 'call setmatches([{"group":1,"pattern":2,"id":3,"priority":4}])' --cmd 'echo getmatches()' --cmd cq
```
It should output li…
ZyX-I updated
4 years ago
-
I'm cutting this outline from one of the resource pages to come back to later.
Organized harassment coming from groups like GG and MRAs, white supremacists
Fact sheet on common tactics and p…
-
**Vulnerability Type:** Session Hijacking
**Severity. Critical**
**Description:**
Session hijacking refers to any attack that a hacker uses to infiltrate a legitimate user’s session on a protec…
-
Migrated from NIEM/NIEM-NDR#113
The need to be able to link different roles to the same base object or a specialized object makes sense (link victim, witness, and officer to the same person object…
-
### Configuration
```hcl
resource "databricks_job" "myjob" {
name = "name"
task {
existing_cluster_id = "some-cluster-id"
notebook_task {
notebook_path = databricks_note…
-
First of all, thank you for the contribution!
I'm able to follow the step till "Step 8. Run the Powershell stager script on the victim’s machine" and show below errors, the JSON data however was se…
-
**Is your feature request related to a problem? Please describe.**
There is a vulnerability that can be introduced in Rails templating languages that would allow a malicious user to inject arbitrary …