Join us

heart Posts from the community tagged with cybersecurity...
Sponsored Link
@faun shared a link, 1 year ago

The art and science of developing intelligent apps with OpenAI GPT-3, DALL·E 2, CLIP, and Whisper.

Explore the fascinating world of Artificial Intelligence and solve real-world problems!

In this practical guide, you will build intelligent real-world applications using GPT-3, DALL-E, Whisper, CLIP, and more tools from the OpenAI and ML ecosystem.

Rest assured, you don't need to be a data scientist or machine learning engineer to follow this guide!

The art and science of developing intelligent apps with OpenAI GPT-3, DALL·E 2, CLIP, and Whisper.
Story
@tutorialboy24 shared a post, 1 year, 5 months ago
tut

Spring Actuator - Stealing Secrets Using Spring Actuators - Part 1:

Spring is a set of frameworks for developing Applications in Java. It is widely used, and so it is not unusual to encounter it during a security audit or penetration test. One of its features that I recently encountered during a Whitebox audit is actuators. In this series of articles, I will use the..

Blue Sky Photocentric Youtube Channel Art.png
Story
@tutorialboy24 shared a post, 1 year, 5 months ago
tut

Turning cookie based XSS into account takeover

EpilogueI reported the exploitation scenario and was rewarded €500, as the impact was high. Be patient, don’t give up, and think out of the box. In this case, I used the company’s service to exploit the bug.Source :- https://tutorialboy24.blogspot.com/2022/09/turning-cookie-based-xss-into-account.ht..

xss.png
Story
@tutorialboy24 shared a post, 1 year, 5 months ago
tut

Exploiting Amazon Simple Notification Service Improper Validation of SigningCertUrl

IntroductionCountless applications rely on Amazon Web Services’ Simple Notification Service for application-to-application communication such as webhooks and callbacks. To verify the authenticity of these messages, these projects use certificate-based signature validation based on the SigningCertURL..

v (1).png
Story
@tutorialboy24 shared a post, 1 year, 6 months ago
tut

A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 1)

IntroductionAs a representative of cloud-native management and orchestration systems, Kubernetes (K8S for short) is receiving more and more attention. A report [1] shows that 96% of organizations are using or evaluating K8S, and its market share in production environments is Visible.The functions of..

k8s
Story
@anasnasim12 shared a post, 1 year, 10 months ago
Student

Machine Learning for Cybersecurity

Everything about Machine Learning for Cybersecurity and in-between.

ML for CS