pe3zx
8cb2c99a70
[Articles][Exploitation] A Deep Dive Analysis of Microsoft’s Kernel Virtual Address Shadow Feature
2018-03-29 21:21:52 +07:00
pe3zx
c4dad0a4bf
[Articles][Exploitation] Stack Based Buffer Overflows on x64 (Windows)
2018-03-29 21:20:49 +07:00
pe3zx
6579dcf17a
[Articles][Exploitation] Getting to the Bottom of CVE-2018-0825 Heap Overflow Buffer
2018-03-29 21:17:31 +07:00
pe3zx
04613bd524
[Tools][Malware Analysis] glmcdona/Process-Dump
...
Process Dump is a Windows reverse-engineering command-line tool to dump malware memory components back to disk for analysis. Often malware files are packed and obfuscated before they are executed in order to avoid AV scanners, however when these files are executed they will often unpack or inject a clean version of the malware code in memory. A common task for malware researchers when analyzing malware is to dump this unpacked code back from memory to disk for scanning with AV products or for analysis with static analysis tools such as IDA.
2018-03-29 16:54:04 +07:00
pe3zx
2da6298064
[Tools][Network] NetworkScan Mon
2018-03-28 17:06:55 +07:00
pe3zx
e101ae0a6b
[Articles][Exploitation] Total Meltdown?
2018-03-28 17:04:08 +07:00
pe3zx
bfca1608ba
[Tools][Plugins] IDAConnect/IDAConnect
2018-03-28 16:07:10 +07:00
pe3zx
2e2123c2e1
[Articles][Exploitation][Vulnerability: Spectre and Meltdown]
2018-03-27 12:37:43 +07:00
pe3zx
838d57414f
[Articles][Linux] The Definitive Guide to Linux System Calls
2018-03-27 12:34:12 +07:00
pe3zx
56523ec805
[Articles][Exploitation] Windows Operating System Archaeology
2018-03-27 12:33:28 +07:00
pe3zx
c44e0fc644
[Articles][Exploitation] Introduction to Windows shellcode development
2018-03-27 12:26:05 +07:00
pe3zx
e942c61be8
[Articles][Exploitation] Bypass ASLR with partial EIP overwrite
2018-03-27 12:22:18 +07:00
pe3zx
6f28c5be44
[Articles][Malware analysis] DOSfuscation - Exploring the Depths Cmd.exe Obfuscation and Detection Techniques
2018-03-26 23:21:29 +07:00
pe3zx
ba18975cc9
Cleaning repository
2018-03-26 23:20:24 +07:00
pe3zx
9e3c47c7e3
Cleaning repository
2018-03-26 23:17:14 +07:00
pe3zx
9197dd5b12
[Articles][Digital Forensics and Incident Response] Live Forensic Acquisition From Mac Computers
2018-03-26 13:29:30 +07:00
pe3zx
7e6ec4ca79
[Articles][Digital Forensics and Incident Reponse] macOS Unified log series
2018-03-26 13:25:00 +07:00
pe3zx
5d534fc34f
[Articles][Exploitation] Android Bluetooth Vulnerabilities in the March 2018 Security Bulletin
2018-03-26 12:04:47 +07:00
pe3zx
0c33c3218a
Remove 404 link
2018-03-26 10:48:18 +07:00
pe3zx
a166943a7f
[Articles][Malware Analysis] Dridex v4 - Configuration Files, Network and Binaries
2018-03-26 10:43:07 +07:00
pe3zx
1455040996
[Tools][Mobile Security] qark, mobsf
2018-03-24 12:44:17 +07:00
pe3zx
351e3ba4a3
[Articles][Mobile Security] tanprathan/MobileApp-Pentest-Cheatsheet
2018-03-24 12:42:46 +07:00
pe3zx
e662802c64
[Articles][Exploitation] Windows Kernel Exploitation Tutorial Series from rootkits.xyz
2018-03-22 14:44:37 +07:00
pe3zx
1d0964e855
[Tools][Exploits] CVE-2017-16995
2018-03-21 14:53:05 +07:00
pe3zx
dea0afa17c
[Tools][Privacy] Outline
2018-03-21 14:48:03 +07:00
pe3zx
79982a2c84
[Tools][Cryptography] CertDB
2018-03-21 14:25:49 +07:00
pe3zx
bd8e2239dd
[Tools][Vulnerable] bkimminich/juice-shop
2018-03-21 14:21:56 +07:00
pe3zx
cd849cd1e2
[Tools][Malware Analysis] hasherezade/pe-sieve
2018-03-21 14:17:35 +07:00
pe3zx
01aa8b9402
[Tools][Plugins] Frida: brompwnie/uitkyk
2018-03-18 18:17:38 +07:00
pe3zx
50a6a2f96e
[Articles][Exploitation] Linux Heap Exploitation Intro Series: Set you free() – part 1
2018-03-18 18:10:02 +07:00
pe3zx
886e6f39c4
[Articles][Exploitation] CVE-2017-13253: Buffer overflow in multiple Android DRM services
2018-03-16 16:32:29 +07:00
pe3zx
503442ed6e
[Tools][Windows] DanMcInerney/icebreaker
2018-03-16 16:29:38 +07:00
pe3zx
9367896c8c
[Tools][Social Engineering] Dark Web Map
2018-03-15 16:58:28 +07:00
pe3zx
cb1c3ab50f
[Articles][Web Application Security] XSS Cheat Sheet
2018-03-15 16:53:05 +07:00
pe3zx
95c307fc10
[Articles][Web Application Security] Brute XSS - Master the art of Cross Site Scripting
2018-03-15 16:47:10 +07:00
pe3zx
604658f9f5
[Tools][Password Tools] berzerk0/Probable-Wordlists
2018-03-13 14:20:46 +07:00
pe3zx
34ff6dd270
[Articles][Digital Forensics and Incident Response] Windows Credentials: Attack + Mitigation + Defense
2018-03-11 05:51:45 +07:00
pe3zx
1901db30c9
[Tools][Windows] shellster/DCSYNCMonitor
2018-03-11 03:04:27 +07:00
pe3zx
03af547069
[Tools][Malware Analysis] KasperskyLab/klara
2018-03-11 02:26:25 +07:00
pe3zx
7a17a16fd8
[Tools][Web Application Security] PublicWWW
2018-03-11 01:35:10 +07:00
pe3zx
b181768b84
Update README.md
...
- Add Post Exploitation section
- Add Windows Post Exploitation on Post Exploitation section
- Add "Top Five Ways I Got Domain Admin on Your Internal Network before Lunch (2018 Edition)"
2018-03-11 01:02:31 +07:00
pe3zx
204658e6cd
[Tools]Exploits]: rxwx/CVE-2017-8570
2018-03-08 15:41:01 +07:00
pe3zx
7418c30079
[Tools][Vulnerable]: Billy-Ellis/Exploit-Challenges
2018-03-08 15:29:59 +07:00
pe3zx
8b4062fb3b
[Tools][Digital Forensics and Incident Response]: ForensicArtifacts/artifacts
2018-03-05 22:32:11 +07:00
pe3zx
4a6dade404
[Articles][Exploitation] New bypass and protection techniques for ASLR on Linux
2018-03-01 16:16:21 +07:00
pe3zx
a19dbbeb7f
[Tools][Privacy] agherzan/yubikey-full-disk-encryption
2018-03-01 15:53:55 +07:00
pe3zx
10933d062e
Clean README.md
2018-02-26 21:01:37 +07:00
pe3zx
75e61c9644
[Tools][Digital Forensics and Incident Response] USN Analytics
2018-02-26 15:01:32 +07:00
pe3zx
456d6c4cdc
[Tools][Vulnerable] SEED Labs
2018-02-26 14:57:14 +07:00
pe3zx
56b72be383
[Tools][Windows] JohnLaTwC/PyPowerShellXray
2018-02-26 14:55:47 +07:00