mathstodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for maths people. We have LaTeX rendering in the web interface!

Server stats:

2.7K
active users

#tips

26 posts22 participants4 posts today

New Open-Source Tool Spotlight 🚨🚨🚨

Kubernetes Goat is a deliberately vulnerable Kubernetes cluster for hands-on security learning. From container escapes to RBAC misconfigurations, it’s packed with scenarios to explore real-world vulnerabilities in a safe environment. #Kubernetes #CloudSecurity

🔗 Project link on #GitHub 👉 github.com/madhuakula/kubernet

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️

🛵Snel je scooterrijbewijs halen? Let op waar je boekt!

Op sommige websites kun je een examenpakket kopen met slagingsgarantie. De verkoper boekt dan voor jou praktijklessen en het examen in. Helaas is dit niet altijd betrouwbaar.🙁
Soms moet je erg lang wachten op het examen of is de locatie ver weg. Wil je dan toch sneller of dichterbij? Dan moet je ineens bijbetalen. Of je moet ineens bijbetalen voor het examen. 😱

Trap hier niet in. Check de website en reviews goed!

Tip 85 of #TuesdayCodingTips - Incomplete types and name demangling

While writing type-safe APIs, a "tag" type is often useful. It is nothing more than a forward declaration of a type that will never be fully defined, just for the sake of creating a template with a unique type.

Even without reflection, type-driven APIs can provide an opportunity to auto-generate (de)serialization code using typeid::name() utility. With two caveats:

You can't get the type info of an incomplete type
Unlike MSVC, both GCC and Clang will output mangled names
Luckily, both have a solution. While you can't get type info of an incomplete type, getting info of a pointer to an incomplete type is valid. You can trim the trailing star from the name. As for demangling, you can use the related ABI function (internally used by the c++filt tool).

Just remember to free your buffers, as said ABI function is written in a C-compatible way.

New Open-Source Tool Spotlight 🚨🚨🚨

DefectDojo consolidates DevSecOps workflows with ASPM and vulnerability management into one tool. It supports deduplication, end-to-end testing, and analysis—all Docker-deployable. Highly maintained with 4k stars on GitHub. #AppSec #DevSecOps

🔗 Project link on #GitHub 👉 github.com/DefectDojo/django-D

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️

New Open-Source Tool Spotlight 🚨🚨🚨

The "Damn Vulnerable MCP Server" is a deliberately vulnerable implementation of the Model Context Protocol (MCP), designed for educational use. It includes 10 challenges that highlight specific security flaws, from prompt injection to multi-vector attacks. A hands-on tool for security researchers learning to secure MCP in LLM contexts. #Cybersecurity #AI

🔗 Project link on #GitHub 👉 github.com/harishsg993010/damn

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️

La suscripción al servicio de VPN se ha pagado solo simplemente con el descuento que he encontrado para una noche de hotel la semana que viene en EEUU. Sin siquiera reiniciar la app, sólo con volver a buscar después de conectar a un servidor en Dallas, precios más baratos. Hay que joderse.

Pude cancelar la reserva que tenía y hacer una nueva más barata en un hotel que está a sólo cinco minutos de donde pasaré la semana.

Replied in thread

@jwildeboer what do you mean with “manually”?

What worked well for me to get multiple years of photos from my iPhone was connect a cable to a computer and copy them over usb (I used rsync).

I found that setting the Nextcloud app to ‘delete after syncing’ in combination with the ‘sync over WiFi only’ option works good for me: it keeps my phone “clean” and it syncs all photos.

#nextcloud #tips

Oh and I suspect that the reason the “sync stops after a few 1000 photos” behavior of the nextcloud app cannot be blamed on nextcloud but is instead to be blamed on Apple and the restrictions on what (third party) apps are allowed to do.

New Open-Source Tool Spotlight 🚨🚨🚨

WinPwn simplifies internal Windows penetration testing by automating reconnaissance and exploitation through PowerShell. Features include domain recon, privilege escalation, Kerberoasting, UAC bypasses, and proxy-aware scripting. Also works offline with `Offline_Winpwn.ps1`. #cybersecurity #pentesting

🔗 Project link on #GitHub 👉 github.com/S3cur3Th1sSh1t/WinP

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️

How does a threat actor evade detection using Microsoft Paint and Outlook? 🖼️📧

A newly identified cyberespionage group known as Earth Alux has been actively targeting sectors like government, telecom, logistics, and IT across countries in the Asia-Pacific and Latin America since mid-2023. According to Trend Micro researchers, the group uses a layered and adaptive toolset designed for stealth and persistence.

The attack starts with the exploitation of vulnerable public-facing services to deploy Godzilla, a web shell that acts as the entry point. Once inside, Earth Alux typically deploys either VARGEIT or COBEACON backdoors. VARGEIT is notable for spawning within benign processes such as *mspaint.exe*, allowing it to execute reconnaissance and steal data while blending into normal activity.

COBEACON, based on Cobalt Strike Beacon, is usually deployed first and delivered by MASQLOADER—an obfuscated shellcode loader. Some versions of MASQLOADER employ anti-API hooking by directly patching NTDLL.dll, a core Windows system library, to bypass endpoint detection solutions.

VARGEIT stands out for its flexible command-and-control mechanisms. It can communicate through up to 10 different channels, including DNS, ICMP, and even Microsoft Outlook via the Graph API. Communication through Outlook drafts is structured using specific prefixes ("r_" for commands, "p_" for responses), allowing attackers to maintain control without raising immediate flags.

The group also utilizes DLL side-loading techniques through loaders like RAILLOAD, accompanied by a timestomping module called RAILSETTER that ensures persistence by altering timestamps and setting scheduled tasks. To find new binaries suitable for side-loading, Earth Alux reportedly runs detection tests using open-source tools like ZeroEye and VirTest, both widely used in Chinese-speaking security circles.

Researchers suggest that the group carefully tests each component for stealth and evasion, pointing to a longer-term campaign focused on espionage rather than quick monetization. The structure and testing of tools indicate professional development practices and a commitment to remaining undetected in targeted environments.

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️

New Open-Source Tool Spotlight 🚨🚨🚨

PAYGoat is a deliberately vulnerable banking app designed to explore business logic flaws like BOLAC, race conditions, and balance tampering. A hands-on tool for researchers, pen testers, and devs studying secure backend design. #AppSec #CyberSecurity

🔗 Project link on #GitHub 👉 github.com/stuxctf/PAYGoat

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️