Paste content from Twitter/podcast/blog/GitHub README. LLM extracts up to 5 attack-primitive candidates per paste. Auto-triaged + queued below within 10 min of submit.
Score breakdown columns: novelty / relevance / scope_match. Composite = 0.4*N + 0.3*R + 0.3*SM. Hard-archive when scope_match < 0.2.
| Code | Name | Modality | Status | Composite | N/R/SM | Source | Actions |
|---|---|---|---|---|---|---|---|
PROP_LAYER7SLOWLORISASYMMETRIC | Layer7SlowlorisAsymmetric | web2 | PROMOTED | 0.772 | 1.00/0.54/0.70 | Chang Tan - Ultimate Cybe | |
PROP_SLOWLORISAPPLICATIONDDOS | SlowlorisApplicationDDoS | infra | PROMOTED | 0.676 | 1.00/0.52/0.40 | Chang Tan - Ultimate Cybe | |
PROP_SOCIAL_MEDIA_PROFILE_TARG | Social-Media-Profile-Targeting | web2 | PROMOTED | 0.670 | 1.00/0.20/0.70 | threathuntingwithelastics | |
PROP_DOM_CLOBBERING | DOM-Clobbering | web2 | PROMOTED | 0.666 | 0.99/0.20/0.70 | Web_Hacking_Arsenal.pdf | |
PROP_PASSIVEOSINTSURFACEMAPPIN | PassiveOSINTSurfaceMapping | web2 | PROMOTED | 0.658 | 1.00/0.16/0.70 | CEH_v12_Certified_Ethical | |
PROP_TROJANIZEDTHIRDPARTYINSTA | TrojanizedThirdPartyInstaller | cross-domain | PROMOTED | 0.658 | 1.00/0.26/0.60 | Hacking the Hacker.pdf | |
PROP_TLS_DOWNGRADE_STRIP | TLS-Downgrade-Strip | web2 | PROMOTED | 0.658 | 1.00/0.16/0.70 | Security + 701 Book.pdf | |
PROP_WIRELESS_REPLAY_STATE_SPO | Wireless-Replay-State-Spoof | mobile | PROMOTED | 0.658 | 1.00/0.36/0.50 | Security + 701 Book.pdf | |
PROP_OS_COMMAND_INJECTION | OS Command Injection | web2 | PROMOTED | 0.658 | 1.00/0.16/0.70 | Web-Application-hackers.p | |
PROP_INTELLECTUAL_PROPERTY_EXF | Intellectual-Property-Exfiltration | web2 | PROMOTED | 0.652 | 1.00/0.14/0.70 | The_Art_of_Intrusion_The_ | |
PROP_VERSIONDIFFERENTIATIONTAR | VersionDifferentiationTargeting | web2 | PROMOTED | 0.652 | 1.00/0.14/0.70 | vulnerabilityresearchersh | |
PROP_POWER_STATE_EXPLOITATION | Power-State-Exploitation | cross-domain | PROMOTED | 0.651 | 0.98/0.26/0.60 | Automotive_Cybersecurity_ | |
PROP_SQLINJECTION | SQLInjection | web2 | DEFERRED | 0.646 | 1.00/0.12/0.70 | OSCP_PEN-200.pdf | |
PROP_FILEINCLUSIONVULNERABILIT | FileInclusionVulnerability | web2 | DEFERRED | 0.646 | 1.00/0.12/0.70 | OSCP_PEN-200.pdf | |
PROP_PENETRATION_TEST_SCOPE_VI | Penetration-Test-Scope-Violation | cross-domain | DEFERRED | 0.646 | 1.00/0.22/0.60 | The_Art_of_Intrusion_The_ | |
PROP_RACE_CONDITION_FINANCIAL_ | Race-Condition-Financial-Logic | web2 | DEFERRED | 0.642 | 0.97/0.14/0.70 | Web_Hacking_Arsenal.pdf | |
PROP_LINKSHORTENERXSSDEFACEMEN | LinkShortenerXSSDefacement | web2 | DEFERRED | 0.640 | 1.00/0.10/0.70 | Chang Tan - Ultimate Cybe | |
PROP_ERROR_INFORMATION_LEAKAGE | Error-Information-Leakage | web2 | DEFERRED | 0.640 | 1.00/0.10/0.70 | Mastering_Secure_Coding.p | |
PROP_VULNERABILITYSCANNEREVASI | VulnerabilityScannerEvasion | web2 | DEFERRED | 0.640 | 1.00/0.10/0.70 | vulnerabilityresearchersh | |
PROP_BUSINESS_LOGIC_FLAWS | Business Logic Flaws | web2 | DEFERRED | 0.637 | 0.96/0.14/0.70 | Web-Application-hackers.p | |
PROP_FILEUPLOADRCE | FileUploadRCE | web2 | DEFERRED | 0.634 | 1.00/0.08/0.70 | OSCP_PEN-200.pdf | |
PROP_PHPSTREAMWRAPPERABUSE | PHPStreamWrapperAbuse | web2 | DEFERRED | 0.634 | 1.00/0.08/0.70 | OSCP_PEN-200.pdf | |
PROP_DEPRECATEDCOMPONENTTARGET | DeprecatedComponentTargeting | cross-domain | DEFERRED | 0.634 | 1.00/0.18/0.60 | vulnerabilityresearchersh | |
PROP_DNS_SPOOFING | DNS Spoofing | web2 | DEFERRED | 0.628 | 1.00/0.06/0.70 | CEH_v12_Certified_Ethical | |
PROP_OSCOMMANDINJECTION | OSCommandInjection | web2 | DEFERRED | 0.628 | 1.00/0.06/0.70 | OSCP_PEN-200.pdf | |
PROP_OFFICEMACROINJECTION | OfficeMacroInjection | cross-domain | DEFERRED | 0.628 | 1.00/0.16/0.60 | OSCP_PEN-200.pdf | |
PROP_CROSS_SITE_SCRIPTING_CONT | Cross-Site-Scripting-Context | web2 | DEFERRED | 0.628 | 1.00/0.06/0.70 | Security + 701 Book.pdf | |
PROP_WEB_STORAGE_SECOND_ORDER_ | Web-Storage-Second-Order-XSS | web2 | DEFERRED | 0.628 | 1.00/0.06/0.70 | Web_Hacking_Arsenal.pdf | |
PROP_POSTMESSAGE_ORIGIN_VALIDA | PostMessage-Origin-Validation-Bypass | web2 | DEFERRED | 0.627 | 0.97/0.10/0.70 | Web_Hacking_Arsenal.pdf | |
PROP_XML_EXTERNAL_ENTITY__XXE_ | XML External Entity (XXE) Injection | web2 | DEFERRED | 0.625 | 0.98/0.08/0.70 | Web-Application-hackers.p | |
PROP_STOREDANDREFLECTEDXSS | StoredAndReflectedXSS | web2 | DEFERRED | 0.622 | 1.00/0.04/0.70 | Mastering_Secure_Coding.p | |
PROP_WEBSOCKET_CROSS_SITE_HIJA | WebSocket-Cross-Site-Hijacking | web2 | DEFERRED | 0.622 | 1.00/0.04/0.70 | Web_Hacking_Arsenal.pdf | |
PROP_SOCIALENGINEERINGFAKELEOE | SocialEngineeringFakeLEOEmergency | web2 | DEFERRED | 0.616 | 1.00/0.02/0.70 | Chang Tan - Ultimate Cybe | |
PROP_PHISHINGCREDENTIALHARVEST | PhishingCredentialHarvest | web2 | DEFERRED | 0.616 | 1.00/0.02/0.70 | Hacking the Hacker.pdf | |
PROP_PHISHING_EMAIL_SOCIAL_ENG | Phishing Email Social Engineering | web2 | DEFERRED | 0.616 | 1.00/0.02/0.70 | Hacking the Hacker.pdf | |
PROP_BLINDEXPLOITATION | BlindExploitation | web2 | DEFERRED | 0.616 | 1.00/0.02/0.70 | OSCP_PEN-200.pdf | |
PROP_CROSS_SITE_SCRIPTING__XSS | Cross-Site Scripting (XSS) | web2 | DEFERRED | 0.616 | 1.00/0.02/0.70 | Web-Application-hackers.p | |
PROP_MUTATION_XSS | Mutation-XSS | web2 | DEFERRED | 0.616 | 1.00/0.02/0.70 | Web_Hacking_Arsenal.pdf | |
PROP_SQLINJECTIONVIASTRINGCONC | SQLInjectionViaStringConcatenation | web2 | DEFERRED | 0.615 | 0.97/0.06/0.70 | Mastering_Secure_Coding.p | |
PASTE_OAUTHSTATETOCTURACE | OAuthStateToctuRace | web2 | DEFERRED | 0.612 | 0.97/0.04/0.70 | manual_paste_twitter | |
PROP_TOKENBUCKETRATELIMITBYPAS | TokenBucketRateLimitBypass | web2 | DEFERRED | 0.610 | 1.00/0.00/0.70 | Mastering_Secure_Coding.p | |
PROP_DOUBLEENCODINGSANITIZERBY | DoubleEncodingSanitizerBypass | web2 | DEFERRED | 0.610 | 1.00/0.00/0.70 | Mastering_Secure_Coding.p | |
PROP_VULNERABLETHIRDPARTYDEPEN | VulnerableThirdPartyDependencyChain | cross-domain | DEFERRED | 0.610 | 1.00/0.10/0.60 | Mastering_Secure_Coding.p | |
PROP_SQL_INJECTION | SQL Injection | web2 | DEFERRED | 0.610 | 1.00/0.00/0.70 | CEH_v12_Certified_Ethical | |
PROP_DOUBLE_ENCODING_FILTER_EV | Double-Encoding-Filter-Evasion | web2 | DEFERRED | 0.610 | 1.00/0.00/0.70 | Mastering_Secure_Coding.p | |
PROP_DNS_POISONING_REDIRECT | DNS-Poisoning-Redirect | web2 | DEFERRED | 0.610 | 1.00/0.00/0.70 | Security + 701 Book.pdf | |
PROP_PATH_TRAVERSAL___DIRECTOR | Path Traversal / Directory Traversal | web2 | DEFERRED | 0.610 | 0.97/0.04/0.70 | Web-Application-hackers.p | |
PROP_WEAPONIZATION_VECTOR_SELE | Weaponization-Vector-Selection | infra | DEFERRED | 0.610 | 1.00/0.30/0.40 | threathuntingwithelastics | |
PROP_TIMINGSIDECHANNELINCOMPAR | TimingSideChannelInComparison | cross-domain | DEFERRED | 0.604 | 1.00/0.08/0.60 | Mastering_Secure_Coding.p | |
PROP_DEFENSE_INTEGRATION_BYPAS | Defense-Integration-Bypass | cross-domain | DEFERRED | 0.604 | 1.00/0.08/0.60 | Mastering_Secure_Coding.p | |
PROP_DIRECTORY_TRAVERSAL_ESCAP | Directory-Traversal-Escape | web2 | DEFERRED | 0.604 | 0.97/0.02/0.70 | Security + 701 Book.pdf | |
PROP_CROSS_SITE_REQUEST_FORGER | Cross-Site Request Forgery (CSRF) | web2 | DEFERRED | 0.603 | 0.98/0.00/0.70 | Web-Application-hackers.p | |
PROP_POWER_MODE_GLITCH_STATE_C | Power/Mode Glitch State Confusion | infra | DEFERRED | 0.602 | 0.99/0.28/0.40 | Automotive_Cybersecurity_ | |
PROP_DIRECTORYTRAVERSAL | DirectoryTraversal | web2 | DEFERRED | 0.600 | 0.97/0.00/0.70 | OSCP_PEN-200.pdf | |
PROP_PHISHINGANDPRETEXTSOCIALE | PhishingAndPretextSocialEngineering | cross-domain | DEFERRED | 0.598 | 1.00/0.06/0.60 | CEH_v12_Certified_Ethical | |
PROP_PSYOPSDEFACEMENTCHAINING | PsyOpsDefacementChaining | cross-domain | DEFERRED | 0.598 | 1.00/0.06/0.60 | Chang Tan - Ultimate Cybe | |
PROP_ORM_CONFIG_SQLI_BYPASS | ORM-Config-SQLi-Bypass | web2 | DEFERRED | 0.597 | 0.97/0.00/0.70 | Mastering_Secure_Coding.p | |
PROP_ROGUE_ENDPOINT_IMPERSONAT | Rogue-Endpoint-Impersonate | mobile | DEFERRED | 0.592 | 1.00/0.14/0.50 | Security + 701 Book.pdf | |
PROP_COORDINATEDDISCLOSUREBYPA | CoordinatedDisclosureBypass | cross-domain | DEFERRED | 0.592 | 1.00/0.04/0.60 | vulnerabilityresearchersh | |
PROP_ACTIVE_RECONNAISSANCE_EVA | Active-Reconnaissance-Evasion | infra | DEFERRED | 0.588 | 0.97/0.26/0.40 | threathuntingwithelastics | |
PROP_SUPPLY_CHAIN_COMPROMISE_P | Supply-Chain-Compromise-Pivot | cross-domain | DEFERRED | 0.586 | 1.00/0.02/0.60 | threathuntingwithelastics | |
PROP_C2_INFRASTRUCTURE_OBFUSCA | C2-Infrastructure-Obfuscation | infra | DEFERRED | 0.586 | 1.00/0.22/0.40 | threathuntingwithelastics | |
PROP_ZERODAYWINDOWEXPLOITATION | ZeroDayWindowExploitation | cross-domain | DEFERRED | 0.586 | 1.00/0.02/0.60 | vulnerabilityresearchersh | |
PROP_PRETEXT_BASED_SOCIAL_ENGI | Pretext-Based-Social-Engineering | cross-domain | DEFERRED | 0.582 | 0.97/0.04/0.60 | The_Art_of_Intrusion_The_ | |
PROP_CVEDATABASERACECONDITION | CVEDatabaseRaceCondition | cross-domain | DEFERRED | 0.580 | 1.00/0.00/0.60 | vulnerabilityresearchersh | |
PROP_DEBUG_PORT_EXPOSURE__JTAG | Debug Port Exposure (JTAG/SWD) | infra | DEFERRED | 0.574 | 1.00/0.18/0.40 | Automotive_Cybersecurity_ | |
PROP_CAN_MESSAGE_SPOOFING | CAN-Message-Spoofing | infra | DEFERRED | 0.574 | 1.00/0.18/0.40 | Automotive_Cybersecurity_ | |
PROP_ANTIDISASSEMBLYOBFUSCATIO | AntiDisassemblyObfuscation | infra | DEFERRED | 0.574 | 1.00/0.18/0.40 | Zhassulan_Zhussupov_Malwa | |
PROP_DETECTION_GAP_EXPLOITATIO | Detection-Gap-Exploitation | infra | DEFERRED | 0.574 | 1.00/0.18/0.40 | threathuntingwithelastics | |
PROP_UDS_SERVICE_EXPLOITATION | UDS-Service-Exploitation | infra | DEFERRED | 0.573 | 0.98/0.20/0.40 | Automotive_Cybersecurity_ | |
PROP_PHYSICAL_SECURITY_BYPASS_ | Physical-Security-Bypass-for-Logical-Access | infra | DEFERRED | 0.570 | 0.97/0.20/0.40 | The_Art_of_Intrusion_The_ | |
PROP_BACKDOOREDTOOLDISTRIBUTIO | BackdooredToolDistribution | infra | DEFERRED | 0.568 | 1.00/0.16/0.40 | Chang Tan - Ultimate Cybe | |
PROP_INSIDER_ACCESS_ESCALATION | Insider-Access-Escalation | cross-domain | DEFERRED | 0.567 | 0.97/0.00/0.60 | The_Art_of_Intrusion_The_ | |
PROP_PLC4TRUCKS_POWERLINE_COMM | PLC4TRUCKS Powerline Command Injection | infra | DEFERRED | 0.562 | 1.00/0.14/0.40 | Automotive_Cybersecurity_ | |
PROP_USERLANDROOTKITPERSISTENC | UserlandRootkitPersistence | infra | DEFERRED | 0.562 | 1.00/0.14/0.40 | Chang Tan - Ultimate Cybe | |
PROP_STACKMACHINECODEVIRTUALIZ | StackMachineCodeVirtualization | infra | DEFERRED | 0.562 | 1.00/0.14/0.40 | Chang Tan - Ultimate Cybe | |
PROP_MALWARE_TROJAN_EXECUTION | Malware Trojan Execution | infra | DEFERRED | 0.562 | 1.00/0.14/0.40 | Hacking the Hacker.pdf | |
PROP_APCQUEUEINJECTION | APCQueueInjection | infra | DEFERRED | 0.562 | 1.00/0.14/0.40 | Zhassulan_Zhussupov_Malwa | |
PROP_LATERAL_MOVEMENT_VIA_ENUM | Lateral-Movement-via-Enumeration | infra | DEFERRED | 0.562 | 1.00/0.14/0.40 | threathuntingwithelastics | |
PROP_CRYPTOGRAPHIC_KEY_DISCLOS | Cryptographic Key Disclosure from HSM/OTP | infra | DEFERRED | 0.556 | 1.00/0.12/0.40 | Automotive_Cybersecurity_ | |
PROP_BUFFEROVERFLOWANDHEAPSPRA | BufferOverflowAndHeapSpray | infra | DEFERRED | 0.556 | 1.00/0.12/0.40 | CEH_v12_Certified_Ethical | |
PROP_HONEYPOTEVASIONFINGERPRIN | HoneypotEvasionFingerprinting | infra | DEFERRED | 0.556 | 1.00/0.12/0.40 | Hacking the Hacker.pdf | |
PROP_CROSS_DOMAIN_NETWORK_ESCA | Cross-Domain-Network-Escape | infra | DEFERRED | 0.556 | 1.00/0.12/0.40 | Automotive_Cybersecurity_ | |
PROP_BUFFER_OVERFLOW | Buffer Overflow | infra | DEFERRED | 0.556 | 1.00/0.12/0.40 | CEH_v12_Certified_Ethical | |
PROP_WIRELESS_SESSION_HIJACKIN | Wireless Session Hijacking | infra | DEFERRED | 0.556 | 1.00/0.12/0.40 | Hacking the Hacker.pdf | |
PROP_KEYLOGGING_FOR_REAL_TIME_ | Keylogging for Real-Time Credential Capture | infra | DEFERRED | 0.556 | 1.00/0.12/0.40 | Hacking the Hacker.pdf | |
PROP_BROADCAST_RECEIVER_EAVESD | Broadcast Receiver Eavesdropping | mobile | DEFERRED | 0.556 | 1.00/0.02/0.50 | eMAPT.pdf | |
PROP_DALVIK_VM_SANDBOX_ESCAPE | Dalvik VM Sandbox Escape | mobile | DEFERRED | 0.556 | 1.00/0.02/0.50 | eMAPT.pdf | |
PROP_JNI_REFLECTION_PRIVATE_ME | JNI Reflection Private-Method Exposure | mobile | DEFERRED | 0.556 | 1.00/0.02/0.50 | eMAPT.pdf | |
PROP_BLUETOOTHPROXIMITYEXPLOIT | BluetoothProximityExploitation | mobile | DEFERRED | 0.550 | 1.00/0.00/0.50 | CEH_v12_Certified_Ethical | |
PROP_HIGHENTROPYPACKEREVASION | HighEntropyPackerEvasion | infra | DEFERRED | 0.550 | 1.00/0.10/0.40 | Chang Tan - Ultimate Cybe | |
PROP_SYSMONANDETWNEUTERING | SysmonAndETWNeutering | infra | DEFERRED | 0.550 | 1.00/0.10/0.40 | Chang Tan - Ultimate Cybe | |
PROP_SIDECHANNELKEYRECOVERY | SideChannelKeyRecovery | infra | DEFERRED | 0.550 | 1.00/0.10/0.40 | Hacking the Hacker.pdf | |
PROP_SENSOR_AUTHENTICATION_BYP | Sensor-Authentication-Bypass | infra | DEFERRED | 0.550 | 1.00/0.10/0.40 | Automotive_Cybersecurity_ | |
PROP_DHCP_STARVATION | DHCP Starvation | infra | DEFERRED | 0.550 | 1.00/0.10/0.40 | CEH_v12_Certified_Ethical | |
PROP_LIVING_OFF_THE_LAND | Living Off the Land | infra | DEFERRED | 0.550 | 1.00/0.10/0.40 | CEH_v12_Certified_Ethical | |
PROP_WPA2_HANDSHAKE_CAPTURE | WPA2 Handshake Capture | mobile | DEFERRED | 0.550 | 1.00/0.00/0.50 | CEH_v12_Certified_Ethical | |
PROP_CODESIGNCERTIFICATEREUSE | CodeSignCertificateReuse | infra | DEFERRED | 0.550 | 1.00/0.10/0.40 | Chang Tan - Ultimate Cybe | |
PROP_CONSTANT_TIME_IMPLEMENTAT | Constant-Time-Implementation-Defeat | infra | DEFERRED | 0.550 | 1.00/0.10/0.40 | Mastering_Secure_Coding.p | |
PROP_AVEVATIONVIAINMEMORYINJEC | AVEvationViaInMemoryInjection | infra | DEFERRED | 0.550 | 1.00/0.10/0.40 | OSCP_PEN-200.pdf | |
PROP_UACSPOOFINGVIAAUTOELEVATE | UACSpoofingViaAutoElevate | infra | DEFERRED | 0.550 | 1.00/0.10/0.40 | Zhassulan_Zhussupov_Malwa | |
PROP_SHARED_UID_PRIVILEGE_CROS | Shared-UID Privilege Crossing | mobile | DEFERRED | 0.550 | 1.00/0.00/0.50 | eMAPT.pdf | |
PROP_INSECURE_FLASH_PROGRAMMIN | Insecure Flash Programming Bootloader | infra | ARCHIVED | 0.544 | 1.00/0.08/0.40 | Automotive_Cybersecurity_ | |
PROP_SIDE_CHANNEL_CRYPTOGRAPHI | Side-Channel Cryptographic Attack | infra | ARCHIVED | 0.544 | 1.00/0.08/0.40 | Hacking the Hacker.pdf | |
PROP_DDOS_AMPLIFICATION | DDoS Amplification | infra | ARCHIVED | 0.544 | 1.00/0.08/0.40 | Hacking the Hacker.pdf | |
PROP_WINDOWSLIBRARYHIJACKING | WindowsLibraryHijacking | infra | ARCHIVED | 0.544 | 1.00/0.08/0.40 | OSCP_PEN-200.pdf | |
PROP_DLLSEARCHORDERHIJACKING | DLLSearchOrderHijacking | infra | ARCHIVED | 0.544 | 1.00/0.08/0.40 | Zhassulan_Zhussupov_Malwa | |
PROP_AMSIMEMORYBYPASS | AMSIMemoryBypass | infra | ARCHIVED | 0.544 | 1.00/0.08/0.40 | Zhassulan_Zhussupov_Malwa | |
PROP_WINLOGONREGISTRYPERSISTEN | WinlogonRegistryPersistence | infra | ARCHIVED | 0.544 | 1.00/0.08/0.40 | Zhassulan_Zhussupov_Malwa | |
PROP_LIVINGOFFLAND_BINARY_ABUS | LivingOffLand-Binary-Abuse | infra | ARCHIVED | 0.544 | 1.00/0.08/0.40 | threathuntingwithelastics | |
PROP_UDS_DIAGNOSTIC_SERVICE_AB | UDS Diagnostic Service Abuse | infra | ARCHIVED | 0.538 | 1.00/0.06/0.40 | Automotive_Cybersecurity_ | |
PROP_DDOSREFLECTIONAMPLIFICATI | DDoSReflectionAmplification | infra | ARCHIVED | 0.538 | 1.00/0.06/0.40 | Hacking the Hacker.pdf | |
PROP_CRYPTOKEYRESIDUEMEMORYDIS | CryptoKeyResidueMemoryDisclosure | infra | ARCHIVED | 0.538 | 1.00/0.06/0.40 | Mastering_Secure_Coding.p | |
PROP_ARP_SPOOFING | ARP Spoofing | infra | ARCHIVED | 0.538 | 1.00/0.06/0.40 | CEH_v12_Certified_Ethical | |
PROP_DEANONYMIZATIONVIATOOLBAC | DeanonymizationViaToolBackdoor | infra | ARCHIVED | 0.538 | 1.00/0.06/0.40 | Chang Tan - Ultimate Cybe | |
PROP_DIRECTSYSCALLEVASION | DirectSyscallEvasion | infra | ARCHIVED | 0.538 | 1.00/0.06/0.40 | Zhassulan_Zhussupov_Malwa | |
PROP_POSTEXPLOITPERSISTENCEAND | PostExploitPersistenceAndLOLBin | infra | ARCHIVED | 0.532 | 1.00/0.04/0.40 | CEH_v12_Certified_Ethical | |
PROP_LNKLOADERFORENSICSCRUB | LNKLoaderForensicScrub | infra | ARCHIVED | 0.532 | 1.00/0.04/0.40 | Chang Tan - Ultimate Cybe | |
PROP_KERBEROASTING | Kerberoasting | infra | ARCHIVED | 0.532 | 1.00/0.04/0.40 | CEH_v12_Certified_Ethical | |
PROP_TIMING_SIDE_CHANNEL_LEAKA | Timing-Side-Channel-Leakage | infra | ARCHIVED | 0.532 | 1.00/0.04/0.40 | Mastering_Secure_Coding.p | |
PROP_SYN_FLOOD_LAYER4_DOS | SYN-Flood-Layer4-DOS | infra | ARCHIVED | 0.532 | 1.00/0.04/0.40 | Security + 701 Book.pdf | |
PROP_SENSOR_SPOOFING_AND_SIGNA | Sensor Spoofing and Signal Injection | infra | ARCHIVED | 0.526 | 1.00/0.02/0.40 | Automotive_Cybersecurity_ | |
PROP_WIFIAUTHANDENCRYPTIONATTA | WiFiAuthAndEncryptionAttack | infra | ARCHIVED | 0.526 | 1.00/0.02/0.40 | CEH_v12_Certified_Ethical | |
PROP_SHUFFLECAKEPLAUSIBLEDENIA | ShufflecakePlausibleDeniabilityEncryption | infra | ARCHIVED | 0.526 | 1.00/0.02/0.40 | Chang Tan - Ultimate Cybe | |
PROP_HASHCRACKINGOFFLINERECOVE | HashCrackingOfflineRecovery | infra | ARCHIVED | 0.526 | 1.00/0.02/0.40 | Hacking the Hacker.pdf | |
PROP_PASSWORD_CRACKING_VIA_RAI | Password Cracking via Rainbow Tables | infra | ARCHIVED | 0.526 | 1.00/0.02/0.40 | CEH_v12_Certified_Ethical | |
PROP_SYSMONNEUTERING | SysmonNeutering | infra | ARCHIVED | 0.526 | 1.00/0.02/0.40 | Chang Tan - Ultimate Cybe | |
PROP_APT_PERSISTENCE_AND_DETEC | APT Persistence and Detection Evasion | infra | ARCHIVED | 0.526 | 1.00/0.02/0.40 | Hacking the Hacker.pdf | |
PROP_MEMORY_CLEANSING_FAILURE | Memory-Cleansing-Failure | infra | ARCHIVED | 0.526 | 1.00/0.02/0.40 | Mastering_Secure_Coding.p | |
PROP_GAMING_SYSTEM_RNG_MANIPUL | Gaming-System-RNG-Manipulation | infra | ARCHIVED | 0.526 | 1.00/0.02/0.40 | The_Art_of_Intrusion_The_ | |
PROP_FINANCIAL_SYSTEM_DIRECT_F | Financial-System-Direct-Fraud | infra | ARCHIVED | 0.526 | 1.00/0.02/0.40 | The_Art_of_Intrusion_The_ | |
PROP_HYPERVISORDETECTIONEVASIO | HypervisorDetectionEvasion | infra | ARCHIVED | 0.526 | 1.00/0.02/0.40 | Zhassulan_Zhussupov_Malwa | |
PROP_LINUX_KERNEL_DRIVER_PRIVI | Linux Kernel Driver Privilege Escalation | infra | ARCHIVED | 0.526 | 1.00/0.02/0.40 | eMAPT.pdf | |
PROP_CAN_BUS_MESSAGE_INJECTION | CAN-Bus Message Injection | infra | ARCHIVED | 0.520 | 1.00/0.00/0.40 | Automotive_Cybersecurity_ | |
PROP_KERBEROASTINGANDCREDENTIA | KerberoastingAndCredentialExtraction | infra | ARCHIVED | 0.520 | 1.00/0.00/0.40 | CEH_v12_Certified_Ethical | |
PROP_ARPANDDNSSPOOFINGMITM | ARPAndDNSSpoofingMITM | infra | ARCHIVED | 0.520 | 1.00/0.00/0.40 | CEH_v12_Certified_Ethical | |
PROP_BACKDOOREDTOOLSUPPLYCHAIN | BackdooredToolSupplyChain | infra | ARCHIVED | 0.520 | 1.00/0.00/0.40 | Chang Tan - Ultimate Cybe | |
PROP_VPNCHAINJURISDICTIONLAUND | VPNChainJurisdictionLaundering | infra | ARCHIVED | 0.520 | 1.00/0.00/0.40 | Chang Tan - Ultimate Cybe | |
PROP_WIRELESSAPROGUEIMPERSONAT | WirelessAPRogueImpersonation | infra | ARCHIVED | 0.520 | 1.00/0.00/0.40 | Hacking the Hacker.pdf | |
PROP_APTLOWANDSLOWEXFIL | APTLowAndSlowExfil | infra | ARCHIVED | 0.520 | 1.00/0.00/0.40 | Hacking the Hacker.pdf | |
PROP_STACKBUFFEROVERFLOWCONTRO | StackBufferOverflowControlFlowHijack | infra | ARCHIVED | 0.520 | 1.00/0.00/0.40 | Mastering_Secure_Coding.p | |
PROP_OTA_UPDATE_ROLLBACK_RACE | OTA-Update-Rollback-Race | infra | ARCHIVED | 0.520 | 1.00/0.00/0.40 | Automotive_Cybersecurity_ | |
PROP_IV_REUSE_CRYPTO_BREAK | IV-Reuse-Crypto-Break | infra | ARCHIVED | 0.520 | 1.00/0.00/0.40 | Security + 701 Book.pdf | |
PROP_GOVERNMENT_INFRASTRUCTURE | Government-Infrastructure-Breach | infra | ARCHIVED | 0.520 | 1.00/0.00/0.40 | The_Art_of_Intrusion_The_ |
| Received | Source | URL | Status | Extracted | Cost |
|---|---|---|---|---|---|
| 2026-05-16T20:30:29 | https://twitter.com/test/status/123 | PROCESSED | 1 | $0.1087 |
Generated 2026-05-16T22:00:03Z | Idan view