pe3zx
|
e4ff72f767
|
Fix: Missing html tag
|
2018-11-12 21:43:56 +07:00 |
|
pe3zx
|
6444cd24f8
|
Add: An introduction to exploiting userspace race conditions on iOS
|
2018-11-11 22:27:57 +07:00 |
|
pe3zx
|
8e12e9da9c
|
Add: EXPLOITING WINDOWS’ IP ID RANDOMIZATION BUG TO LEAK KERNEL DATA AND MORE (CVE-2018-8493)
|
2018-11-11 22:27:06 +07:00 |
|
pe3zx
|
00de53362f
|
Add: hannob/tls-what-can-go-wrong
|
2018-11-11 22:23:10 +07:00 |
|
pe3zx
|
bd9ebaa733
|
Add: s0md3v/XSStrike
|
2018-11-11 22:21:30 +07:00 |
|
pe3zx
|
9d616ae475
|
Add: Finding TikTok messages in iOS
|
2018-11-11 22:12:35 +07:00 |
|
pe3zx
|
29074ce5b8
|
Add: MorteNoir1/virtualbox_e1000_0day
|
2018-11-07 11:55:35 +07:00 |
|
pe3zx
|
949e0acc33
|
Add: OmerYa/Invisi-Shell
|
2018-11-05 11:54:33 +07:00 |
|
pe3zx
|
773fba9b98
|
Add: Microsoft/ProcDump-for-Linux
|
2018-11-05 11:52:40 +07:00 |
|
pe3zx
|
31bb2f498d
|
Add: Forensic Analysis Of The μTorrent Peer-to-Peer Client In Windows
|
2018-11-05 11:32:11 +07:00 |
|
pe3zx
|
4b8e07eceb
|
Update: Detecting Mimikatz & other Suspicious LSASS Access
|
2018-11-05 11:27:31 +07:00 |
|
pe3zx
|
e68542eeca
|
Add: RegRipper & keys parsed by plugins
|
2018-11-05 11:26:40 +07:00 |
|
pe3zx
|
d2e8c61336
|
Add: mac4n6's Presentations
|
2018-11-05 11:19:12 +07:00 |
|
pe3zx
|
cf8465c6fb
|
Add: "Gone In 10 Seconds" Snapchat Forensics
|
2018-11-05 11:13:19 +07:00 |
|
pe3zx
|
062d650787
|
Add: LightSpeed, a race for an iOS/MacOS sandbox escape
|
2018-11-01 15:37:50 +07:00 |
|
pe3zx
|
c06ecb8619
|
Add: Kernel RCE caused by buffer overflow in Apple's ICMP packet-handling code (CVE-2018-4407)
|
2018-10-31 11:42:48 +07:00 |
|
pe3zx
|
7e53378194
|
Add: A Guide to ARM64 / AArch64 Assembly on Linux with Shellcodes and Cryptography
|
2018-10-31 11:26:10 +07:00 |
|
pe3zx
|
c15e3a91a9
|
Add: sensepost/goDoH - godoh - A DNS-over-HTTPS C2
|
2018-10-30 13:41:35 +07:00 |
|
pe3zx
|
c6ff95d901
|
Add: TheSecondSun/Bashark - Bash post exploitation toolkit
|
2018-10-30 13:39:32 +07:00 |
|
pe3zx
|
68a124ecea
|
Add: FortyNorthSecurity/WMImplant - This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported is translated into a WMI-equivalent for use on a network/remote machine. WMImplant is WMI based.
|
2018-10-30 13:35:20 +07:00 |
|
pe3zx
|
bf099e9960
|
Add: Patrowl/PatrowlManager - PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
|
2018-10-30 13:24:41 +07:00 |
|
pe3zx
|
15507e7c47
|
Add: https://www.fortinet.com/blog/threat-research/inspect-mach-messages-in-macos-kernel-mode--part-ii--sniffing-th.html
|
2018-10-30 13:17:46 +07:00 |
|
pe3zx
|
c93c9bdb2b
|
Add: Analysis: Inspecting Mach Messages in macOS Kernel-Mode Part I: Sniffing the sent Mach messages
|
2018-10-30 13:17:04 +07:00 |
|
pe3zx
|
f9cdfb9f90
|
Add: google/GiftStick - 1-Click push forensics evidence to the cloud
|
2018-10-30 13:02:30 +07:00 |
|
pe3zx
|
d00d7210fe
|
Add: 'CVE-2018-8460: EXPOSING A DOUBLE FREE IN INTERNET EXPLORER FOR CODE EXECUTION'
|
2018-10-20 23:42:30 +07:00 |
|
pe3zx
|
d7929c6159
|
Add: 'Finding Slack app messages in iOS'
|
2018-10-20 23:37:35 +07:00 |
|
pe3zx
|
160c67e33a
|
Add: 'An Analysis of Microsoft Edge Chakra JavascriptArray TypeId Handling Memory Corruption (CVE-2018-8467)'
|
2018-10-20 23:34:41 +07:00 |
|
pe3zx
|
fa2ee2ff38
|
Add: 'Cloud Forensics: Google Drive'
|
2018-10-20 23:32:03 +07:00 |
|
pe3zx
|
a211cd445d
|
Add: 0xbecca/Amcache_Scan
|
2018-10-20 23:30:50 +07:00 |
|
pe3zx
|
0257aa0d9f
|
Add: 'Writing the worlds worst Android fuzzer, and then improving it'
|
2018-10-20 23:03:02 +07:00 |
|
pe3zx
|
580e338db1
|
Add salesforce/ja3 on Tools
|
2018-10-20 21:02:06 +07:00 |
|
pe3zx
|
80ccbca617
|
Remove unreachable resources
|
2018-10-13 16:28:10 +07:00 |
|
pe3zx
|
bc301a4b32
|
Add: CrowdStrike/Forensics
|
2018-10-07 20:52:09 +07:00 |
|
pe3zx
|
04ad196481
|
Add: AIR GO
|
2018-10-07 20:42:35 +07:00 |
|
pe3zx
|
d21d8c9f78
|
Add: cmu-sei/cyobstract
|
2018-10-07 20:38:50 +07:00 |
|
pe3zx
|
c2fc36e036
|
Add: chryzsh/DarthSidious
|
2018-10-07 20:34:01 +07:00 |
|
pe3zx
|
8001c388fa
|
Fix wrong reference on PoS malware
|
2018-10-07 15:40:12 +07:00 |
|
pe3zx
|
32cd6d7466
|
Add: Backoff: New Point of Sale Malware
|
2018-10-02 21:17:59 +07:00 |
|
pe3zx
|
3fc4fe8ed8
|
Add: RawPOS Technical Brief
|
2018-10-02 21:17:07 +07:00 |
|
pe3zx
|
118e1fe4d0
|
Add: New FrameworkPOS variant exfiltrates data via DNS requests
|
2018-10-02 21:15:59 +07:00 |
|
pe3zx
|
14033e1630
|
Add: Evolution and Characterization of Point-of-Sale RAM Scraping Malware
|
2018-10-02 21:15:15 +07:00 |
|
pe3zx
|
7f1bc5917b
|
Add: Buy Candy, Lose Your Credit Card - Investigation PoS RAM Scraping Malware
|
2018-10-02 21:13:46 +07:00 |
|
pe3zx
|
0bd717d9bb
|
Add: PoS RAM Scraper Malware - Past, Present, and Future
|
2018-10-02 21:12:26 +07:00 |
|
pe3zx
|
127e9fd2a9
|
Add: Attacks on point-of-sales systems
|
2018-10-02 21:11:00 +07:00 |
|
pe3zx
|
c9124fb51c
|
Add: Another Brick in the FrameworkPoS
|
2018-10-02 21:09:29 +07:00 |
|
pe3zx
|
c36aa9a292
|
Add: Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6
|
2018-10-02 21:07:38 +07:00 |
|
pe3zx
|
093b909075
|
Add Word Forensic Analysis And Compound File Binary Format
|
2018-09-23 18:59:20 +07:00 |
|
pe3zx
|
3a8b85c7d1
|
Add alexandreborges/malwoverview
|
2018-09-23 18:46:15 +07:00 |
|
pe3zx
|
369406c1d9
|
Add 10 recent OSX/iOS/Mac malware samples
|
2018-09-23 18:44:21 +07:00 |
|
pe3zx
|
c2b3514c21
|
Add Mac Malware
|
2018-09-23 18:43:04 +07:00 |
|