-
(Originally raised on slack)
Currently node/subflow icons have to either be a FA classname, or the name of an icon file provided by the nodes.
It would useful to be able to provide the icon as a…
-
### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the…
-
Potential FTDI bus collision issue.
- Prerequisite: debug return port (exfiltration) is enabled.
- The CPLD (command processor FSM) receives the start of a command from the host.
- During the com…
-
While PowerSteg can and will embed as much data as an image will hold, it gets prohibitively slow to do so after about 15kb.
In my testing, adding a 15kb file took 93 minutes, or an hour and a half…
-
**MSSQL login**
When trying to authenticate using mssql I get the following error (this is true for both windows and normal logins):
```
» cme --verbose mssql 192.168.74.53 -a normal --local-auth…
-
As an infrastructure admin, I want to be able to examine container running processes within my Kubernetes infrastructure so that I can easily alert on potential data exfiltration events (ie: need to b…
-
I support an MSP where we deploy hundreds of AKS clusters at scale. These AKS clusters run analytics software, often with sensitive/protected data. Having a default egress of anything is not acceptabl…
-
I think we can improve that part using compression and/or base32 encoding.
DoZ10 updated
4 years ago
-
Not a bug, just a feature request.
It would be awesome if you could include Hak5's new Rubber Ducky Keystroke Reflection Exfiltration technique! It allows data Exfiltration WITHOUT the need for Mas…
-
As a Researcher I need to be able to access the UI for my current workspace from a VM inside the workspace. This is needed so that I can retrieve connection URIs to services such as AML, and read/copy…