Talkback

Talkback is a smart infosec resource aggregator, designed to help security enthusiasts, practitioners and researchers be more productive.

The system works by continuously monitoring several resource mediums for infosec news and publications, parses all content, classifies and hydrates the data-set, then presents this via a simple UI.

A couple of the key interfaces in Talkback are:

  • Chronicles that provides a snapshot view for a given week or month.
  • Resources that allows drilling down and browsing the Talkback library.

For more information on how Talkback works and its key features, see our blog post Keeping up with the Pwnses - an overview of Talkback.

Talkback is a project developed by elttam  .

Featured Resources

Last 7 days
Anyone can Access Deleted and Private Repository Data on GitHub ◆ Truffle Security Co. app cloud

GitHub's Cross Fork Object Reference (CFOR) vulnerability allows users to access data from deleted and private repositories indefinitely by supplying commit hashes.

Thread Name-Calling - using Thread Name for offense exp sys

Thread Name-Calling is a novel process injection technique utilizing Windows APIs to bypass endpoint protection and execute remote code in running processes without write privileges.

Injecting Java in-memory payloads for post-exploitation app exp

In-memory payloads can be injected into applications like Bitbucket, Jenkins, and Confluence to achieve Remote Code Execution (RCE) by exploiting vulnerabilities like arbitrary deserialization, SSTI, scripting engines, and command injections.

Deep Sea Phishing Pt. 1 exp rev

Custom payloads are more effective than stock shellcode for bypassing EDR systems, requiring the creation of custom shellcode loaders or implants to avoid detection and increase the chances of success.

Unfashionably secure: why we use isolated VMs cloud

Canary's security product prioritizes customer isolation through individual tenant consoles on separate AWS EC2 instances, enhancing security and compliance while incurring higher operational costs.

A hex editor and nothing to lose - Binary patching Golang to fix net/http rev exp

The article explores modifying Golang code at the assembly level to customize behavior in the net/http library, highlighting the process of identifying and patching header canonicalization functions.

Trending Vulnerabilities

Last 7 days

Trending Topics

Last 7 days