pe3zx
|
e04e4320bd
|
[Articles][Exploitation] UAF Explanation
|
2018-02-20 20:01:34 +07:00 |
|
pe3zx
|
996b45f08e
|
[Tools][Simulation] alphasoc/flightsim
|
2018-02-20 19:10:33 +07:00 |
|
pe3zx
|
9452a0fcc5
|
[Tools][Privacy] securitywithoutborders/hardentools
|
2018-02-20 19:09:05 +07:00 |
|
pe3zx
|
35f43707f6
|
[Articles][Digital Forensics and Incident Response] Tool Analysis Result Sheet
|
2018-02-20 19:07:40 +07:00 |
|
pe3zx
|
bbada9ab89
|
[Tools][Digital Forensics and Incident Response] JPCERTCC/LogonTracer
|
2018-02-20 19:01:50 +07:00 |
|
pe3zx
|
c5ff83153a
|
Clean working directory
|
2018-02-19 21:20:59 +07:00 |
|
pe3zx
|
4a703e2e6d
|
[Tools][Malware Analysis] CAPE Sandbox
|
2018-02-19 16:32:01 +07:00 |
|
pe3zx
|
8e151b334b
|
[Tools][Digital Forensics and Incident Response] Log Parser
|
2018-02-19 15:49:49 +07:00 |
|
pe3zx
|
faf2a6265c
|
[Articles][Reverse Engineering] How to decompile any Python binary
|
2018-02-19 15:32:43 +07:00 |
|
pe3zx
|
2359ab6dd2
|
[Articles][Digital Forensics and Incident Response] Bruteforcing Linux Full Disk Encryption (LUKS) with hashcat - The Forensic way
|
2018-02-19 15:22:26 +07:00 |
|
pe3zx
|
24d036f6ab
|
[Tools][Digital Forensics and Incident Response] Hibernation Recon
|
2018-02-19 15:14:01 +07:00 |
|
pe3zx
|
fd5a2e98e4
|
Remove unreachable link
|
2018-02-19 13:51:28 +07:00 |
|
pe3zx
|
8c9464eb00
|
Remove machine-learning stuff
|
2018-02-19 13:49:44 +07:00 |
|
pe3zx
|
6fccbce26d
|
[Tools][Windows] HTA encryption tool for RedTeams
|
2018-02-19 13:35:40 +07:00 |
|
pe3zx
|
11e92d198e
|
[Tools][Malware Analysis] OALabs/PyIATRebuild
|
2018-02-19 13:30:01 +07:00 |
|
pe3zx
|
b65c89f17f
|
[Tools][Simulation] NextronSystems/APTSimulator
|
2018-02-16 00:17:00 +07:00 |
|
pe3zx
|
36ae283e64
|
Remove error links
|
2018-02-16 00:08:00 +07:00 |
|
pe3zx
|
80ed5f0bb8
|
[Tools][Malware Analysis]: phage-nz/ph0neutria
|
2018-02-16 00:01:41 +07:00 |
|
pe3zx
|
ca7188f294
|
[Tools][Exploits] Eplox/TCP-Starvation
|
2018-02-15 23:54:06 +07:00 |
|
pe3zx
|
e8a1349216
|
[Tools][Digital Forensics and Incident Response] ANSSI-FR/bmc-tools
|
2018-02-15 23:46:05 +07:00 |
|
pe3zx
|
4cb5008206
|
[Tools][Digital Forensics and Incident Response] File Parser
|
2018-02-15 23:45:21 +07:00 |
|
pe3zx
|
80462afb61
|
[Tools][Digital Forensics and Incident Response] williballenthin/INDXParse
|
2018-02-15 23:43:26 +07:00 |
|
pe3zx
|
4effc7461a
|
[Tools][Simulation] uber-common/metta
|
2018-02-15 23:25:03 +07:00 |
|
pe3zx
|
a616b5ee78
|
[Tools][Simulation] mitre/caldera
|
2018-02-15 23:24:15 +07:00 |
|
pe3zx
|
8f5465eabf
|
[Tools][Simulation]
|
2018-02-15 23:23:26 +07:00 |
|
pe3zx
|
d28e2c5f8e
|
[Articles][Malware Analysis][Malware Variants] ATM Malware
|
2018-02-15 23:06:40 +07:00 |
|
pe3zx
|
02f775cd14
|
[Tools][Binary Analysis]pierrezurek/Signsrch
|
2018-02-15 22:46:59 +07:00 |
|
pe3zx
|
c1fd0a556a
|
[Articles][Exploitation][Techniques][Bypassing ASLR]: Exploit Mitigation Techniques - Address Space Layout Randomization (ASLR)
|
2018-02-13 16:23:09 +07:00 |
|
pe3zx
|
1e9bb0c2d0
|
[Tools][Windows]: monoxgas/sRDI
|
2018-02-12 15:30:51 +07:00 |
|
pe3zx
|
07c165fb21
|
[Tools][Windows]: stephenfewer/ReflectiveDLLInjection
|
2018-02-12 15:28:53 +07:00 |
|
pe3zx
|
45665f8930
|
[Articles][Web Application Security]: MySQL UDF Exploitation
|
2018-02-12 15:17:53 +07:00 |
|
pe3zx
|
7399f83116
|
[Tools][Social Engineering]: FireEye/ReelPhish
|
2018-02-08 14:31:16 +07:00 |
|
pe3zx
|
6b8675a184
|
[Tools][Windows] Add mattifestation/PoCSubjectInterfacePackage
|
2018-02-05 22:44:43 +07:00 |
|
pe3zx
|
2113bc767b
|
[Article][Reverse Engineering] Add 'ELF hacking with Rekall'
|
2018-02-05 22:41:04 +07:00 |
|
pe3zx
|
2e87229d43
|
[Tools][Web Application Security]: Add mindedsecurity/JStillery
|
2018-02-05 21:58:31 +07:00 |
|
pe3zx
|
0125e286b1
|
[Tools][Malware Analysis]: Add malwareinfosec/EKFiddle
|
2018-02-05 21:57:07 +07:00 |
|
pe3zx
|
6bc607c6c1
|
[Tools][DFIR]: Add Invoke-IR/ACE
|
2018-02-05 21:55:25 +07:00 |
|
pe3zx
|
9151af33f0
|
[Tools][DFIR]: Add Cyb3rWard0g/HELK
|
2018-02-05 21:54:09 +07:00 |
|
pe3zx
|
dcfadb22f1
|
[Tools][DFIR]: Add google/grr
|
2018-02-05 21:50:21 +07:00 |
|
pe3zx
|
b9d6cff8a9
|
[Tools][DFIR]: Add google/rekall
|
2018-02-05 21:49:15 +07:00 |
|
pe3zx
|
e5777f3625
|
[Tools][DFIR]: Add refractionPOINT/limacharlie
|
2018-02-05 21:48:08 +07:00 |
|
pe3zx
|
ec4f103395
|
[Tools][Plugins]: Add CrowdStrike/CrowdDetox
|
2018-02-05 21:34:34 +07:00 |
|
pe3zx
|
56ec93b3b1
|
[Tools][DFIR]: Add ANSSI-FR/bits_parser
|
2018-02-05 21:28:10 +07:00 |
|
pe3zx
|
19c7e65714
|
[Tools][DFIR]: Add williballenthin/EVTXtract
|
2018-02-05 21:25:12 +07:00 |
|
pe3zx
|
7b4bd7a5f4
|
[Tools][DFIR]: TSK and Autopsy
|
2018-02-05 21:23:39 +07:00 |
|
pe3zx
|
5acabb80e0
|
[Article][Tutorial]: Internals of AFL fuzzer - Compile Time Instrumentation
|
2018-02-05 21:19:47 +07:00 |
|
pe3zx
|
082fc7fa90
|
[Article][Exploitation]: The lonely potato
|
2018-02-05 20:40:34 +07:00 |
|
pe3zx
|
4bfe79edf2
|
[Article][Exploitation]: Rotten Potato – Privilege Escalation from Service Accounts to SYSTEM
|
2018-02-05 20:39:20 +07:00 |
|
pe3zx
|
ebf5357281
|
[Article][DFIR]: Reading Notes database on macOS
|
2018-02-05 13:52:27 +07:00 |
|
pe3zx
|
8a4a5cfba2
|
Edit headers on DFIR section
|
2018-02-05 13:51:25 +07:00 |
|