WhisperD: linux voice-to-text using OpenAI whisper-1 transcription
I wrote this as an exercise to learn how to use ioctl & input devices, but I like how it turned out! It does have a hard dependency on pipewire though.
OSWE Web Hacking Tips (IPPSEC): My Study Journey href=”https://we.loveprivacy.club/search?q=%231”>#1** ⌘ Read more
Learning YARA: A Beginner SOC Analyst’s Notes
Learn how to build a YARA-powered malware detection and automation system using n8n, GPT, and hybrid analysis tools. This hands-on guide…
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/learnin … ⌘ Read more
$540 Bounty: How a Misconfigured Warning Endpoint in Apache Airflow Exposed DAG Secrets
CVE-2023–42780: An Improper Access Control Bug That Let Low-Privileged Users View DAG Impo … ⌘ Read more
**From Forgot Password to Forgot Validation: A Broken Flow That Let Me Take Over Accounts **
Hey there!😁
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/from … ⌘ Read more
** From alert(1) to Real-world Impact: Hunting XSS Where Others Don’t Look** ⌘ Read more
Bug Bounty from Scratch | Everything You Need to Know About Bug Bounty
📌Free Article Link
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/bug-bounty-from-scratch-everything-you-need-to-know … ⌘ Read more
🧮 USERS:1 FEEDS:2 TWTS:1359 ARCHIVED:87441 CACHE:2693 FOLLOWERS:22 FOLLOWING:14
What technology to use for a small NGO website?
Hi Lobsters :) hope you’re having a cozy weekend
I’m volunteering to set up and maintain the website of an association/small NGO, and I need to choose the technology we will use. I would appreciate advice from the hive mind on what technologies/setup to use :)
The key constraints are:
- It should be feasible to teach a motivated non-coder how to adjust website content. Most of the content will be text & images describing the organisation and its va … ⌘ Read more
@nghialele@nghia.im Man, I wish I could watch Formula 1 on a regular basis again, but it has become expensive as fuck here. 🫤
This is my highlight, really, haven’t seen this in action in a loooooooong time:
Google Dorking: A Hacker’s Best Friend
Hey, hacker friends! Ever wonder why people say Google is a hacker’s best friend? Well, I’m about to show you why.
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/google-dorking-a-hackers-best-friend-716dfb3e9739? … ⌘ Read more
The Hidden Admin Backdoor in Reddit Ads
An Invisibility Cloak for Attackers: How One Admin Created a Stealth Account That Even the Owner Couldn’t See or Remove
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/the-hidden-admin-backdoor-in-reddit-ads … ⌘ Read more
Bypassing Regex Validations to Achieve RCE: A Wild Bug Story
Free Article Lin
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/bypassing-regex-validations-to-achieve-rce-a-wild-bug-story-6476faccbc23?source=r … ⌘ Read more
The Year We Lost Control: How the AI Race Could End Humanity — or Save It
By now, you’ve probably heard whispers of a future shaped entirely by artificial intelligence. From Nobel laureates to the godfather of AI…
… ⌘ Read more
🧮 USERS:1 FEEDS:2 TWTS:1358 ARCHIVED:87395 CACHE:2683 FOLLOWERS:22 FOLLOWING:14
UK government to spend £1.5bn on six new weapons factories ⌘ Read more
Earthquake of magnitude 6.1 hits Hokkaido in Japan, no tsunami warning ⌘ Read more
🧮 USERS:1 FEEDS:2 TWTS:1357 ARCHIVED:87391 CACHE:2690 FOLLOWERS:22 FOLLOWING:14
Memory Analysis Introduction | TryHackMe Write-Up | FarrosFR
Non-members are welcome to access the full story here.
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/memory-analysis-introduction-tryhackme-write-up-farrosfr-32e … ⌘ Read more
Passkeys: The Waterproof Defense Against Phishing Attacks
The Passkeys — a next-generation authentication technology poised to be a game-changer, offering what many describe as a truly waterproof…
[Continue reading on InfoSec Write-ups … ⌘ Read more
A Hidden Backdoor: Bypassing reCAPTCHA on the Sign-up Page
Free Article Link: Click for free!
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/a-hidden-backdoor-bypassing-recaptcha-on-the-sign-up-page-2b5b3c18257f … ⌘ Read more
** Cache Me If You Can: How I Poisoned the CDN and Hijacked User Sessions**
Free Link 🎈
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/cache-me-if-you-can-how-i-poisoned-the-cdn-and-hijacked … ⌘ Read more
Unauthenticated Remote Code Execution in vBulletin 6.0.1 via replaceAdTemplate Method ⌘ Read more
Walkthrough — Assessment Methodologies: Vulnerability Assessment CTF 1 ⌘ Read more
🧮 USERS:1 FEEDS:2 TWTS:1356 ARCHIVED:87389 CACHE:2690 FOLLOWERS:22 FOLLOWING:14
GitHub Recon: The Underrated Technique to Discover High-Impact Leaks in Bug Bounty
Master the Art of Finding API Keys, Credentials and Sensitive Data in Public Repositories
[Continue re … ⌘ Read more
10 Quirky, but Necessary, Food Safety Rules of the Past
Long before “hand sanitizer” became a household staple or single-use packaging sparked environmental debates, a series of surprisingly odd—and occasionally ingenious—food-safety laws quietly reshaped what ended up on our plates (and in our hands). From Victorian London’s shared ice-cream glasses that contributed to typhoid outbreaks to postwar Japan’s precision-sealed juice jars, each bizarre reform emerged […]
The post [1 … ⌘ Read more
**Uncovering Amazon S3 Bucket Vulnerabilities: A Comprehensive Guide for Ethical Hackers **
How to Identify, Exploit, and Secure S3 Bucket Misconfigurations
[Continue reading on InfoSec Wr … ⌘ Read more
Logic Flaw: Deleting HackerOne Team Reports Without Access Rights
How a GraphQL Mutation Allowed Unauthorized Report Deletion Across Teams
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/logic-flaw … ⌘ Read more
This One Hacker Trick Got Me Access to an Admin Dashboard ️
Sometimes, it’s not about brute force. It’s about finesse. One header. One oversight. One open door.
— A Hacker’s Mindset 🧠
[Continue reading on InfoSec … ⌘ Read more
Cracking JWTs: A Bug Bounty Hunting Guide [Part 1] ⌘ Read more
Walkthrough — Assessment Methodologies: Information Gathering CTF 1 ⌘ Read more
**Unsafe Redirects = Unlimited Ride: How Open Redirect Led Me to Internal Dashboards **
Hey there!😁
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/unsafe-redirects-unlimi … ⌘ Read more
I Tried 10 Recon Tools for 7 Days — Here’s What Actually Found Bugs
Free Article Link
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/i-tried-10-recon-tools-for-7-days-heres-what-actually-found-bug … ⌘ Read more
🧮 USERS:1 FEEDS:2 TWTS:1355 ARCHIVED:87386 CACHE:2688 FOLLOWERS:22 FOLLOWING:14
MYIR Launches Sub-$100 i.MX 91 Board for Embedded and Industrial Use
MYIR has introduced the MYC-LMX91, a compact SoM powered by NXP’s energy-efficient i.MX 91 processor. Designed for smart devices, the module targets applications such as industrial gateways, EV chargers, smart home systems, medical platforms, and building automation. The MYC-LMX91 is built around the 1.4 GHz Arm Cortex-A55-based i.MX 91 (MIMX9131CVVXJAA) and comes equipped with 1GB […] ⌘ Read more
$500 Bounty: Shopify Referrer Leak: Hijacking Storefront Access with a Single Token
Referrer Header Leaks + Iframe Injection = Storefront Password Bypass
[Continue reading on InfoSec Writ … ⌘ Read more
$750 Bounty: for HTTP Reset Password Link in Mattermost
How an Unsecured Protocol in a Critical Workflow Opened the Door for Network-Based Account Takeovers
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/750-bounty-for … ⌘ Read more
Exploiting Web Cache Poisoning with X-Host Header Using Param Miner
[Write-up] Web Cache Poisoning Using an Unknown Header.
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/exploiting-web-ca … ⌘ Read more
**Header Injection to Hero: How I Hijacked Emails and Made the Server Sing **
Hey there!😁
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/header-injection-to-hero-how-i-hijacked-emails-an … ⌘ Read more