pe3zx
|
3c5c85342f
|
[Add] DCShadow - Minimal permissions, Active Directory Deception, Shadowception and more
|
2018-08-26 22:53:13 +07:00 |
|
pe3zx
|
37ebbb52f5
|
[Add] ACTIVE DIRECTORY ATTACK - DCSHADOW
|
2018-08-26 22:48:51 +07:00 |
|
pe3zx
|
c9bb813f1d
|
[Add] Hot Potato – Windows Privilege Escalation
|
2018-08-26 22:35:24 +07:00 |
|
pe3zx
|
011847e2ad
|
[Add] DCShadow: Attacking Active Directory with Rogue DCs
|
2018-08-26 22:33:36 +07:00 |
|
pe3zx
|
6b69ed2ef2
|
[Add] Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.
|
2018-08-26 22:00:52 +07:00 |
|
pe3zx
|
39022312ae
|
[Add] felixweyne/imaginaryC2: Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware.
|
2018-08-26 21:59:33 +07:00 |
|
pe3zx
|
c1927ee03f
|
[Add] Wazuh: Open Source Host and Endpoint Security
|
2018-08-26 21:51:59 +07:00 |
|
pe3zx
|
1073b45323
|
[Add] gen0cide/gscript: framework to rapidly implement custom droppers for all three major operating systems
|
2018-08-21 23:22:47 +07:00 |
|
pe3zx
|
437cdbba2d
|
Add syscall exploit for CVE-2018-8897
|
2018-08-21 23:18:53 +07:00 |
|
pe3zx
|
ad20f8b182
|
Tools: Malware Analysis: InQuest/python-iocextract
|
2018-08-21 23:11:57 +07:00 |
|
pe3zx
|
a2f8b38392
|
Tools: AWS Security: RhinoSecurityLabs/pacu
|
2018-08-21 23:08:50 +07:00 |
|
pe3zx
|
455f17179d
|
Articles: Digital Forensics and Incident Response: Knowledge is Power! Using the macOS/iOS knowledgeC.db Database to Determine Precise User and Application Usage
|
2018-08-21 22:29:13 +07:00 |
|
pe3zx
|
61003171ab
|
Articles: Digital Forensics and Incident Response: The Forensics of Cortana on Android
|
2018-08-21 22:28:05 +07:00 |
|
pe3zx
|
04c04a1fae
|
Tools: Binary Analysis: Microsoft/binskim
|
2018-08-21 21:44:10 +07:00 |
|
pe3zx
|
1f6b3d06bd
|
Articles: Malware Analysis: MikroTik Cryptojacking Campaigns
|
2018-08-21 21:28:57 +07:00 |
|
pe3zx
|
a1d439644b
|
Tools: Social Engineering and OSINT: InQuest/omnibus
|
2018-08-21 21:23:05 +07:00 |
|
pe3zx
|
da088ef4d0
|
Articles: Tutorials: Emulating Decryption Function With Radare2
|
2018-08-21 21:16:50 +07:00 |
|
pe3zx
|
92be6fd0f5
|
Tools: Web Application Security: nccgroup/singularity
|
2018-08-21 21:12:46 +07:00 |
|
pe3zx
|
4fd370ee93
|
Tools: Digital Forensics and Incident Response: ptresearch/AttackDetection
|
2018-08-21 21:09:26 +07:00 |
|
pe3zx
|
0cccaa7973
|
Add: Kasspy IR's artifacts collectors
|
2018-07-28 11:17:58 +00:00 |
|
pe3zx
|
1cd4c4c578
|
Detection and recovery of NSA's covered up tracks
|
2018-07-28 11:14:20 +00:00 |
|
pe3zx
|
7ac3d19cc8
|
Add: Chasing Adversaries with Autoruns - evading techniques and countermeasures
|
2018-07-28 10:41:12 +00:00 |
|
pe3zx
|
61ae604e7a
|
Add: bfuzzy/auditd-attack
|
2018-07-28 10:05:10 +00:00 |
|
pe3zx
|
b8270712d4
|
Add: Cracking the Walls of the Safari Sandbox - Fuzzing the macOS WindowServer for Exploitable Vulnerabilities
|
2018-07-28 09:45:55 +00:00 |
|
pe3zx
|
55e9c05eba
|
Add: Exploiting a Windows 10 PagedPool off-by-one overflow (WCTF 2018)
|
2018-07-28 09:44:21 +00:00 |
|
pe3zx
|
4e829b445e
|
Add: Delving deep into VBScript - Analysis of CVE-2018-8174 exploitation
|
2018-07-28 09:43:15 +00:00 |
|
pe3zx
|
8cf5fd362d
|
Add: Weaponization of a JavaScriptCore Vulnerability -Illustrating the Progression of Advanced Exploit Primitives In Practice]
|
2018-07-28 09:42:07 +00:00 |
|
pe3zx
|
3d5f8c13cb
|
Add: An Analysis of the Use-After-Free Bug in the Microsoft Edge Chakra Engine (CVE-2018-0946)
|
2018-07-28 09:40:14 +00:00 |
|
pe3zx
|
5777611316
|
Add: Windows Exploitation and AntiExploitation Evolution
|
2018-07-28 09:38:14 +00:00 |
|
pe3zx
|
ff0ed2e3a7
|
Add: Timeless Debugging of Complex Software: Root Cause Analysis of a Non-Deterministic JavaScriptCore Bug
|
2018-07-28 09:37:09 +00:00 |
|
pe3zx
|
d24955396e
|
Update Web Application Security section name
|
2018-07-28 09:35:04 +00:00 |
|
pe3zx
|
b88728001a
|
Relocate analysis of SSCA vulnerabilities from Exploits section to Articles
|
2018-07-28 09:28:42 +00:00 |
|
pe3zx
|
604e12aeb1
|
Add: Post-Spectre Threat Model Re-Think
|
2018-07-28 09:25:45 +00:00 |
|
pe3zx
|
7338c4c9db
|
Change 'Exploitation: Vulnerability: Spectre and Meltdown' to 'Speculative Side-Channel Attacks'
|
2018-07-28 09:25:02 +00:00 |
|
pe3zx
|
b932e4085b
|
Add: A Methodical Approach to Browser Exploitation
|
2018-07-28 09:04:50 +00:00 |
|
pe3zx
|
b966ba29b7
|
Add: Arbitrary Code Guard vs. Kernel Code Injections
|
2018-07-28 09:03:28 +00:00 |
|
pe3zx
|
301b29b65b
|
Add: ANALYSIS OF A WIN32K NULL POINTER DEREFERENCE BY MATCHING THE MAY PATCH
|
2018-07-28 09:01:15 +00:00 |
|
pe3zx
|
e2e5256ce2
|
Add: Dissecting the POP SS Vulnerability
|
2018-07-28 08:57:45 +00:00 |
|
pe3zx
|
22a26033dc
|
Add: The HIDeous parts of IOKit
|
2018-07-28 08:54:27 +00:00 |
|
pe3zx
|
d9e8ddbe25
|
Add: MMap Vulnerabilities – Linux Kernel
|
2018-07-28 08:44:36 +00:00 |
|
pe3zx
|
9465e1997b
|
Add: Fuzzing Adobe Reader for exploitable vulns (fun != profit)
|
2018-07-28 08:41:51 +00:00 |
|
pe3zx
|
0a3fae6b34
|
Add: DCShadow
|
2018-07-28 08:36:32 +00:00 |
|
pe3zx
|
bfaa881cea
|
Add: Golden Ticket
|
2018-07-28 08:35:37 +00:00 |
|
pe3zx
|
a71ef91e06
|
Add: DCShadow explained: A technical deep dive into the latest AD attack technique
|
2018-07-28 08:21:40 +00:00 |
|
pe3zx
|
674919a71e
|
Articles: Tutotirlas: Windows DMA Attacks : Ganing SYSTEM shells using a generic patch
|
2018-07-28 08:12:21 +00:00 |
|
pe3zx
|
f2178321ec
|
Add 'Tools: Hardware' with urisk/pcileech
|
2018-07-28 08:06:53 +00:00 |
|
pe3zx
|
dbbbed7446
|
Tools: Post Exploitation: huntresslabs/evading-autoruns
|
2018-07-28 05:34:21 +00:00 |
|
pe3zx
|
b5b33e0621
|
Articles: Post Exploitation: Evading Microsoft's Autoruns
|
2018-07-28 05:30:09 +00:00 |
|
pe3zx
|
06f04d61a9
|
Remove 404 link
|
2018-07-28 05:11:11 +00:00 |
|
pe3zx
|
f83b9e9de5
|
Add 'Articles: Exploitation: Hardware-related Attacks' with 'Attacking a co-hosted VM: A hacker, a hammer and two memory modules'
|
2018-07-28 05:06:54 +00:00 |
|