Commit Graph

1040 Commits

Author SHA1 Message Date
pe3zx
8095f343aa Remove unable to connect bookmarks 2019-01-02 03:58:24 +00:00
pe3zx
1dc19bb26d Merge branch 'master' of github.com:pe3zx/my-awesome 2019-01-02 03:52:27 +00:00
pe3zx
52b5cc6ce4 [Tools][Post Exploitation] Kevin-Robertson/Inveigh 2018-12-29 16:14:52 +07:00
pe3zx
849a26e8c6 [Tools][Cryptography] corkami/pcs 2018-12-29 14:57:48 +07:00
pe3zx
4a3b2823dc [Articles][Exploitation] Covering Ian Beer's exploit techniques for getvolattrlist bug (iOS 11-11.3.1) 2018-12-29 14:54:08 +07:00
pe3zx
b2dba46cc0 [Articles][Exploitation] CVE-2017-11176: A step-by-step Linux Kernel exploitation 2018-12-29 14:52:16 +07:00
pe3zx
4b78cd3149 [Articles][Post Exploitation]
Exfiltrating credentials via PAM backdoors & DNS requests
2018-12-29 14:40:21 +07:00
pe3zx
ba3875bee7 [Articles][Malware Analysis] How to become the best Malware Analyst E-V-E-R 2018-12-29 14:29:20 +07:00
pe3zx
1886613d3e [Articles][Malware Analysis] Android SMS Stealer 2018-12-29 11:47:25 +07:00
pe3zx
2ec767682b [Tools][Post Exploitation] fbkcs/ThunderDNS 2018-12-29 11:45:25 +07:00
pe3zx
80fd1ada50 [Articles][Malware Analysis] So You Want To Be A Malware Analyst 2018-12-29 01:57:09 +07:00
pe3zx
86136d88a2 [Articles][Reverse Engineering] Win32 Assembly Tutorials 2018-12-29 01:48:50 +07:00
pe3zx
d0a60b9a41 [Tools][Adversary Emulation] Coalfire-Research/Red-Baron 2018-12-24 01:25:04 +07:00
pe3zx
69e7110d0b [Tools][Social Engineering] certsocietegenerale/swordphish-awareness 2018-12-24 01:09:12 +07:00
pe3zx
145322a0e9 [Tools][Social Engineering] WeebSec/PhishX 2018-12-24 01:08:09 +07:00
pe3zx
6e328aefa1 [Tools][Social Engineering] gophish/gophish 2018-12-24 01:06:55 +07:00
pe3zx
33955e4ad2 [Tools][Social Engineering] thelinuxchoice/shellphish 2018-12-24 01:05:51 +07:00
pe3zx
27c09090fd [Tools][Social Engineering] UndeadSec/SocialFish 2018-12-24 01:04:26 +07:00
pe3zx
f8eed20a5f [Tools][Social Engineering] thelinuxchoice/blackeye 2018-12-24 01:03:03 +07:00
pe3zx
b658be6c38 [Tools][DFIR] blackbagtech/sleuthkit-APFS 2018-12-24 00:34:52 +07:00
pe3zx
5ef70cc990 [Tools][DFIR] salesforce/bro-sysmon 2018-12-23 22:56:45 +07:00
pe3zx
bf572d0c24 [Tools][DFIR] coinbase/dexter 2018-12-23 22:52:43 +07:00
pe3zx
2d56571a57 [Articles][Exploitation] Interactive Beginner's Guide to ROP 2018-12-19 11:50:20 +07:00
pe3zx
65a4228f00 [Tools][Digital Forensics] Detailed properties in the Office 365 audit log 2018-12-18 10:45:50 +07:00
pe3zx
9f60abc183 [Tools][Adversary Emulation] Attack Simulator in Office 365 2018-12-18 10:44:31 +07:00
pe3zx
e480552bda A Deep Analysis of the Microsoft Outlook Vulnerability CVE-2018-8587 2018-12-18 10:39:22 +07:00
pe3zx
e368d488e1 [Tools][Malware Analysis] Halo TI Center Beta 2018-12-13 16:19:45 +07:00
pe3zx
9dd2c3db84 [Tools][Binary Analysis] NASA-SW-VnV/ikos 2018-12-13 16:01:24 +07:00
pe3zx
7ba6f654b9 [Tools][Plugins] fireeye/flare-emu 2018-12-13 15:35:07 +07:00
pe3zx
70ea107e23 [Tools][DFIR] SecurityRiskAdvisors/TALR 2018-12-13 14:43:15 +07:00
pe3zx
d569aaa4e3 [Tools][Malware Analysis] nbulischeck/tyton 2018-12-13 14:39:26 +07:00
pe3zx
bdebb85c19 [Tools][DFIR] Cyber Analytics Repository 2018-12-13 14:33:39 +07:00
pe3zx
f355bbf00b [Articles][Malware Analysis] d00rt/emotet_research 2018-12-13 13:52:34 +07:00
pe3zx
e4334071a5 Add: prsecurity/CVE-2018-15982 2018-12-07 20:14:24 +07:00
pe3zx
05f82d326e Add: smgorelik/Windows-RCE-exploits 2018-12-07 20:09:25 +07:00
pe3zx
e27445bdc0 Add: tomchop/malcom 2018-12-06 13:49:56 +07:00
pe3zx
48339811ae Add: woj-ciech/kamerka 2018-11-30 14:37:53 +07:00
pe3zx
eb3ef3192b Add trustedsec/hate_crack 2018-11-28 17:25:52 +07:00
pe3zx
8d728c1c0a Add: jofpin/trape 2018-11-27 13:45:57 +07:00
pe3zx
2ee47c5713 Add: Encrypting for Apple's Secure Enclave 2018-11-25 21:34:44 +07:00
pe3zx
598911df52 Add: malwaredllc/byob 2018-11-25 21:30:47 +07:00
pe3zx
3457287ce4 Add: infosecn1nja/AD-Attack-Defense - Active Directory Security For Red & Blue Team 2018-11-25 21:28:58 +07:00
pe3zx
8d1b5797c1 Add: SpiderLabs/sheepl 2018-11-25 21:27:51 +07:00
pe3zx
156f8391c4 Add: OMENScan/Achoir 2018-11-25 21:20:03 +07:00
pe3zx
b89a7e6479 Add: VulnReproduction/LinuxFlaw 2018-11-25 21:18:34 +07:00
pe3zx
af0990c4a2 Add: kgretzky/evilginx2 2018-11-25 21:10:09 +07:00
pe3zx
a6e2def67d Remove separator lines 2018-11-13 16:27:54 +07:00
pe3zx
ad47aff52d Add: Four Ways to Bypass iOS SSL Verification and Certificate Pinning 2018-11-13 13:51:17 +07:00
pe3zx
79562ea1cf Remove: unable to connect links 2018-11-12 21:52:10 +07:00
pe3zx
e4ff72f767 Fix: Missing html tag 2018-11-12 21:43:56 +07:00
pe3zx
6444cd24f8 Add: An introduction to exploiting userspace race conditions on iOS 2018-11-11 22:27:57 +07:00
pe3zx
8e12e9da9c Add: EXPLOITING WINDOWS’ IP ID RANDOMIZATION BUG TO LEAK KERNEL DATA AND MORE (CVE-2018-8493) 2018-11-11 22:27:06 +07:00
pe3zx
00de53362f Add: hannob/tls-what-can-go-wrong 2018-11-11 22:23:10 +07:00
pe3zx
bd9ebaa733 Add: s0md3v/XSStrike 2018-11-11 22:21:30 +07:00
pe3zx
9d616ae475 Add: Finding TikTok messages in iOS 2018-11-11 22:12:35 +07:00
pe3zx
29074ce5b8 Add: MorteNoir1/virtualbox_e1000_0day 2018-11-07 11:55:35 +07:00
pe3zx
949e0acc33 Add: OmerYa/Invisi-Shell 2018-11-05 11:54:33 +07:00
pe3zx
773fba9b98 Add: Microsoft/ProcDump-for-Linux 2018-11-05 11:52:40 +07:00
pe3zx
31bb2f498d Add: Forensic Analysis Of The μTorrent Peer-to-Peer Client In Windows 2018-11-05 11:32:11 +07:00
pe3zx
4b8e07eceb Update: Detecting Mimikatz & other Suspicious LSASS Access 2018-11-05 11:27:31 +07:00
pe3zx
e68542eeca Add: RegRipper & keys parsed by plugins 2018-11-05 11:26:40 +07:00
pe3zx
d2e8c61336 Add: mac4n6's Presentations 2018-11-05 11:19:12 +07:00
pe3zx
cf8465c6fb Add: "Gone In 10 Seconds" Snapchat Forensics 2018-11-05 11:13:19 +07:00
pe3zx
062d650787 Add: LightSpeed, a race for an iOS/MacOS sandbox escape 2018-11-01 15:37:50 +07:00
pe3zx
c06ecb8619 Add: Kernel RCE caused by buffer overflow in Apple's ICMP packet-handling code (CVE-2018-4407) 2018-10-31 11:42:48 +07:00
pe3zx
7e53378194 Add: A Guide to ARM64 / AArch64 Assembly on Linux with Shellcodes and Cryptography 2018-10-31 11:26:10 +07:00
pe3zx
c15e3a91a9 Add: sensepost/goDoH - godoh - A DNS-over-HTTPS C2 2018-10-30 13:41:35 +07:00
pe3zx
c6ff95d901 Add: TheSecondSun/Bashark - Bash post exploitation toolkit 2018-10-30 13:39:32 +07:00
pe3zx
68a124ecea Add: FortyNorthSecurity/WMImplant - This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported is translated into a WMI-equivalent for use on a network/remote machine. WMImplant is WMI based. 2018-10-30 13:35:20 +07:00
pe3zx
bf099e9960 Add: Patrowl/PatrowlManager - PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform 2018-10-30 13:24:41 +07:00
pe3zx
15507e7c47 Add: https://www.fortinet.com/blog/threat-research/inspect-mach-messages-in-macos-kernel-mode--part-ii--sniffing-th.html 2018-10-30 13:17:46 +07:00
pe3zx
c93c9bdb2b Add: Analysis: Inspecting Mach Messages in macOS Kernel-Mode Part I: Sniffing the sent Mach messages 2018-10-30 13:17:04 +07:00
pe3zx
f9cdfb9f90 Add: google/GiftStick - 1-Click push forensics evidence to the cloud 2018-10-30 13:02:30 +07:00
pe3zx
d00d7210fe Add: 'CVE-2018-8460: EXPOSING A DOUBLE FREE IN INTERNET EXPLORER FOR CODE EXECUTION' 2018-10-20 23:42:30 +07:00
pe3zx
d7929c6159 Add: 'Finding Slack app messages in iOS' 2018-10-20 23:37:35 +07:00
pe3zx
160c67e33a Add: 'An Analysis of Microsoft Edge Chakra JavascriptArray TypeId Handling Memory Corruption (CVE-2018-8467)' 2018-10-20 23:34:41 +07:00
pe3zx
fa2ee2ff38 Add: 'Cloud Forensics: Google Drive' 2018-10-20 23:32:03 +07:00
pe3zx
a211cd445d Add: 0xbecca/Amcache_Scan 2018-10-20 23:30:50 +07:00
pe3zx
0257aa0d9f Add: 'Writing the worlds worst Android fuzzer, and then improving it' 2018-10-20 23:03:02 +07:00
pe3zx
580e338db1 Add salesforce/ja3 on Tools 2018-10-20 21:02:06 +07:00
pe3zx
80ccbca617 Remove unreachable resources 2018-10-13 16:28:10 +07:00
pe3zx
bc301a4b32 Add: CrowdStrike/Forensics 2018-10-07 20:52:09 +07:00
pe3zx
04ad196481 Add: AIR GO 2018-10-07 20:42:35 +07:00
pe3zx
d21d8c9f78 Add: cmu-sei/cyobstract 2018-10-07 20:38:50 +07:00
pe3zx
c2fc36e036 Add: chryzsh/DarthSidious 2018-10-07 20:34:01 +07:00
pe3zx
8001c388fa Fix wrong reference on PoS malware 2018-10-07 15:40:12 +07:00
pe3zx
32cd6d7466 Add: Backoff: New Point of Sale Malware 2018-10-02 21:17:59 +07:00
pe3zx
3fc4fe8ed8 Add: RawPOS Technical Brief 2018-10-02 21:17:07 +07:00
pe3zx
118e1fe4d0 Add: New FrameworkPOS variant exfiltrates data via DNS requests 2018-10-02 21:15:59 +07:00
pe3zx
14033e1630 Add: Evolution and Characterization of Point-of-Sale RAM Scraping Malware 2018-10-02 21:15:15 +07:00
pe3zx
7f1bc5917b Add: Buy Candy, Lose Your Credit Card - Investigation PoS RAM Scraping Malware 2018-10-02 21:13:46 +07:00
pe3zx
0bd717d9bb Add: PoS RAM Scraper Malware - Past, Present, and Future 2018-10-02 21:12:26 +07:00
pe3zx
127e9fd2a9 Add: Attacks on point-of-sales systems 2018-10-02 21:11:00 +07:00
pe3zx
c9124fb51c Add: Another Brick in the FrameworkPoS 2018-10-02 21:09:29 +07:00
pe3zx
c36aa9a292 Add: Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6 2018-10-02 21:07:38 +07:00
pe3zx
093b909075 Add Word Forensic Analysis And Compound File Binary Format 2018-09-23 18:59:20 +07:00
pe3zx
3a8b85c7d1 Add alexandreborges/malwoverview 2018-09-23 18:46:15 +07:00
pe3zx
369406c1d9 Add 10 recent OSX/iOS/Mac malware samples 2018-09-23 18:44:21 +07:00
pe3zx
c2b3514c21 Add Mac Malware 2018-09-23 18:43:04 +07:00
pe3zx
95762c8f92 ashishb/android-malware 2018-09-23 18:41:45 +07:00
pe3zx
462aeb8b9d Add AndroMalShare 2018-09-23 18:40:40 +07:00
pe3zx
d6573128ad Add scumware.org 2018-09-23 18:39:04 +07:00
pe3zx
970685defe Add VX Vault 2018-09-23 18:37:36 +07:00
pe3zx
a96225b40b Add Malc0de database 2018-09-23 18:36:33 +07:00
pe3zx
51bb91dda9 Add SARVAN 2018-09-23 18:35:03 +07:00
pe3zx
e9c436043a Add malware.one 2018-09-23 18:32:28 +07:00
pe3zx
63755d2176 Add ViruSign 2018-09-23 18:31:18 +07:00
pe3zx
c2ffe5a591 Add VirusBay 2018-09-23 18:30:06 +07:00
pe3zx
cda141fad0 Add MalShare 2018-09-23 18:28:24 +07:00
pe3zx
dae21ab5cb Add AVCaesar 2018-09-23 18:25:59 +07:00
pe3zx
2da8cad42e Add Hybrid-Analysis 2018-09-23 18:24:28 +07:00
pe3zx
b4a5d14d78 Add contagio malware dump 2018-09-23 18:22:15 +07:00
pe3zx
cebe48618f trisf/theZoo 2018-09-23 18:04:37 +07:00
pe3zx
d8a99dd72c Add ThunderCls/xAnalyzer 2018-09-23 17:58:52 +07:00
pe3zx
e02d5d9dcc Add Cn33liz/p0wnedShell 2018-09-23 17:55:39 +07:00
pe3zx
4222889cee Add CVE-2018-3620 and CVE-2018-3646 2018-09-23 17:53:15 +07:00
pe3zx
6626016ed6 Add byt3bl33d3r/SprayingToolkit 2018-09-23 17:37:09 +07:00
pe3zx
813448d1f8 Add Exploitus 2018-09-23 17:34:51 +07:00
pe3zx
567edc808f Add Phishing Frenzy 2018-09-23 17:30:19 +07:00
pe3zx
392b5e7669 Add droidefense/engine 2018-09-23 17:27:12 +07:00
pe3zx
4e5fe97abf Add Compiler Explorer 2018-09-23 17:23:52 +07:00
pe3zx
da1b3d3db6 Add JPCERTCC/SysmonSearch 2018-09-23 13:21:13 +07:00
pe3zx
cf9c44448d Add APT Groups and Operations 2018-09-23 13:18:51 +07:00
pe3zx
1cd72adee9 Add Uncoder.io 2018-09-23 13:11:07 +07:00
pe3zx
c9b075baaf Add VSCMount 2018-09-23 13:09:07 +07:00
pe3zx
ed57a0a663 Add Google Dataset Search 2018-09-23 13:03:38 +07:00
pe3zx
7a766b4318 Add Neo23x0/exotron 2018-09-23 13:00:39 +07:00
pe3zx
df9831b119 Add mxmssh/drltrace 2018-09-23 12:57:12 +07:00
pe3zx
6ad9d83126 Add Heapple Pie - The macOS/iOS default heap 2018-09-22 17:55:26 +07:00
pe3zx
513e1fbc29 Add Apple File System Reference 2018-09-22 17:29:00 +07:00
pe3zx
3c5c85342f [Add] DCShadow - Minimal permissions, Active Directory Deception, Shadowception and more 2018-08-26 22:53:13 +07:00
pe3zx
37ebbb52f5 [Add] ACTIVE DIRECTORY ATTACK - DCSHADOW 2018-08-26 22:48:51 +07:00
pe3zx
c9bb813f1d [Add] Hot Potato – Windows Privilege Escalation 2018-08-26 22:35:24 +07:00
pe3zx
011847e2ad [Add] DCShadow: Attacking Active Directory with Rogue DCs 2018-08-26 22:33:36 +07:00
pe3zx
6b69ed2ef2 [Add] Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents. 2018-08-26 22:00:52 +07:00
pe3zx
39022312ae [Add] felixweyne/imaginaryC2: Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. 2018-08-26 21:59:33 +07:00
pe3zx
c1927ee03f [Add] Wazuh: Open Source Host and Endpoint Security 2018-08-26 21:51:59 +07:00
pe3zx
1073b45323 [Add] gen0cide/gscript: framework to rapidly implement custom droppers for all three major operating systems 2018-08-21 23:22:47 +07:00
pe3zx
437cdbba2d Add syscall exploit for CVE-2018-8897 2018-08-21 23:18:53 +07:00
pe3zx
ad20f8b182 Tools: Malware Analysis: InQuest/python-iocextract 2018-08-21 23:11:57 +07:00
pe3zx
a2f8b38392 Tools: AWS Security: RhinoSecurityLabs/pacu 2018-08-21 23:08:50 +07:00
pe3zx
455f17179d Articles: Digital Forensics and Incident Response: Knowledge is Power! Using the macOS/iOS knowledgeC.db Database to Determine Precise User and Application Usage 2018-08-21 22:29:13 +07:00
pe3zx
61003171ab Articles: Digital Forensics and Incident Response: The Forensics of Cortana on Android 2018-08-21 22:28:05 +07:00
pe3zx
04c04a1fae Tools: Binary Analysis: Microsoft/binskim 2018-08-21 21:44:10 +07:00
pe3zx
1f6b3d06bd Articles: Malware Analysis: MikroTik Cryptojacking Campaigns 2018-08-21 21:28:57 +07:00
pe3zx
a1d439644b Tools: Social Engineering and OSINT: InQuest/omnibus 2018-08-21 21:23:05 +07:00
pe3zx
da088ef4d0 Articles: Tutorials: Emulating Decryption Function With Radare2 2018-08-21 21:16:50 +07:00
pe3zx
92be6fd0f5 Tools: Web Application Security: nccgroup/singularity 2018-08-21 21:12:46 +07:00
pe3zx
4fd370ee93 Tools: Digital Forensics and Incident Response: ptresearch/AttackDetection 2018-08-21 21:09:26 +07:00
pe3zx
0cccaa7973 Add: Kasspy IR's artifacts collectors 2018-07-28 11:17:58 +00:00
pe3zx
1cd4c4c578 Detection and recovery of NSA's covered up tracks 2018-07-28 11:14:20 +00:00
pe3zx
7ac3d19cc8 Add: Chasing Adversaries with Autoruns - evading techniques and countermeasures 2018-07-28 10:41:12 +00:00
pe3zx
61ae604e7a Add: bfuzzy/auditd-attack 2018-07-28 10:05:10 +00:00
pe3zx
b8270712d4 Add: Cracking the Walls of the Safari Sandbox - Fuzzing the macOS WindowServer for Exploitable Vulnerabilities 2018-07-28 09:45:55 +00:00
pe3zx
55e9c05eba Add: Exploiting a Windows 10 PagedPool off-by-one overflow (WCTF 2018) 2018-07-28 09:44:21 +00:00
pe3zx
4e829b445e Add: Delving deep into VBScript - Analysis of CVE-2018-8174 exploitation 2018-07-28 09:43:15 +00:00
pe3zx
8cf5fd362d Add: Weaponization of a JavaScriptCore Vulnerability -Illustrating the Progression of Advanced Exploit Primitives In Practice] 2018-07-28 09:42:07 +00:00
pe3zx
3d5f8c13cb Add: An Analysis of the Use-After-Free Bug in the Microsoft Edge Chakra Engine (CVE-2018-0946) 2018-07-28 09:40:14 +00:00
pe3zx
5777611316 Add: Windows Exploitation and AntiExploitation Evolution 2018-07-28 09:38:14 +00:00
pe3zx
ff0ed2e3a7 Add: Timeless Debugging of Complex Software: Root Cause Analysis of a Non-Deterministic JavaScriptCore Bug 2018-07-28 09:37:09 +00:00
pe3zx
d24955396e Update Web Application Security section name 2018-07-28 09:35:04 +00:00
pe3zx
b88728001a Relocate analysis of SSCA vulnerabilities from Exploits section to Articles 2018-07-28 09:28:42 +00:00
pe3zx
604e12aeb1 Add: Post-Spectre Threat Model Re-Think 2018-07-28 09:25:45 +00:00
pe3zx
7338c4c9db Change 'Exploitation: Vulnerability: Spectre and Meltdown' to 'Speculative Side-Channel Attacks' 2018-07-28 09:25:02 +00:00
pe3zx
b932e4085b Add: A Methodical Approach to Browser Exploitation 2018-07-28 09:04:50 +00:00
pe3zx
b966ba29b7 Add: Arbitrary Code Guard vs. Kernel Code Injections 2018-07-28 09:03:28 +00:00
pe3zx
301b29b65b Add: ANALYSIS OF A WIN32K NULL POINTER DEREFERENCE BY MATCHING THE MAY PATCH 2018-07-28 09:01:15 +00:00
pe3zx
e2e5256ce2 Add: Dissecting the POP SS Vulnerability 2018-07-28 08:57:45 +00:00
pe3zx
22a26033dc Add: The HIDeous parts of IOKit 2018-07-28 08:54:27 +00:00
pe3zx
d9e8ddbe25 Add: MMap Vulnerabilities – Linux Kernel 2018-07-28 08:44:36 +00:00
pe3zx
9465e1997b Add: Fuzzing Adobe Reader for exploitable vulns (fun != profit) 2018-07-28 08:41:51 +00:00
pe3zx
0a3fae6b34 Add: DCShadow 2018-07-28 08:36:32 +00:00
pe3zx
bfaa881cea Add: Golden Ticket 2018-07-28 08:35:37 +00:00
pe3zx
a71ef91e06 Add: DCShadow explained: A technical deep dive into the latest AD attack technique 2018-07-28 08:21:40 +00:00
pe3zx
674919a71e Articles: Tutotirlas: Windows DMA Attacks : Ganing SYSTEM shells using a generic patch 2018-07-28 08:12:21 +00:00
pe3zx
f2178321ec Add 'Tools: Hardware' with urisk/pcileech 2018-07-28 08:06:53 +00:00
pe3zx
dbbbed7446 Tools: Post Exploitation: huntresslabs/evading-autoruns 2018-07-28 05:34:21 +00:00
pe3zx
b5b33e0621 Articles: Post Exploitation: Evading Microsoft's Autoruns 2018-07-28 05:30:09 +00:00
pe3zx
06f04d61a9 Remove 404 link 2018-07-28 05:11:11 +00:00
pe3zx
f83b9e9de5 Add 'Articles: Exploitation: Hardware-related Attacks' with 'Attacking a co-hosted VM: A hacker, a hammer and two memory modules' 2018-07-28 05:06:54 +00:00
pe3zx
ab71fe611d Tools: Data Exfiltration: SySS-Research/Seth 2018-07-26 13:34:31 +00:00
pe3zx
258b93b784 Tools: Malware Analysis: Maltiverse 2018-07-26 13:24:42 +00:00
pe3zx
9d2eed6e25 Articles: Digital Forensics and Incident Response: I Know What You Did Last Month: A New Artifact of Execution on macOS 10.13 2018-07-26 12:52:39 +00:00
pe3zx
e18e674c80 Tools: Vulnerable: Reverse Engineering 2018-07-26 10:54:11 +00:00
pe3zx
b5fa2800c7 Tools: Malware Analysis: Malwares 2018-07-26 10:32:28 +00:00
pe3zx
7541ca6f43 Tools: AWS Security: ThreatResponse/margaritashotgun 2018-07-26 10:30:30 +00:00
pe3zx
e7478c68c3 Tools: AWS Security: ThreatResponse/aws_ir 2018-07-26 10:28:52 +00:00
pe3zx
955876a105 Tools: AWS Security: RiotGames/cloud-custodian 2018-07-26 10:26:38 +00:00
pe3zx
606adcbf35 Tools: AWS Security: sendgrid/krampus 2018-07-26 10:24:51 +00:00
pe3zx
a1e399307c Tools: AWS Security: andresriancho/nimbostratus 2018-07-26 10:23:20 +00:00
pe3zx
434fc1231f Tools: AWS Security: disruptops/cred_scanner 2018-07-26 10:21:22 +00:00
pe3zx
920a69a634 Tools: AWS Security: nccgroup/aws-inventory 2018-07-26 10:19:29 +00:00
pe3zx
c701a4b334 Tools: AWS Security: awslabs/aws-security-benchmark 2018-07-26 10:17:47 +00:00
pe3zx
b64417b790 Tools: Exploits: SPECTRE Variant 1 scanning tool 2018-07-26 10:13:59 +00:00
pe3zx
bf99ab483b Move content in Tools: Windows to Tools: Post Exploitation 2018-07-26 10:09:18 +00:00
pe3zx
c3743266e8 Tools: Digital Forensics and Incident Response: bromiley/olaf 2018-07-26 10:02:39 +00:00
pe3zx
2effa752b3 Update TOC 2018-07-16 20:35:17 +00:00
pe3zx
b07ad07b2a Tools: Data Sets: BOTS 1.0 Dataset 2018-07-16 20:34:52 +00:00
pe3zx
883762c3ba Tools: Data Sets: SecRepo 2018-07-16 20:33:25 +00:00
pe3zx
6b072368b7 Tools: Cryptography: CERTCC/keyfinder 2018-07-16 20:25:26 +00:00
pe3zx
4aa30c5797 Remove broken links 2018-07-16 19:10:41 +00:00
pe3zx
8f31ca8fc2 Tools: Digital Forensics and Incident Response: gleeda/memtriage 2018-07-16 19:06:56 +00:00
pe3zx
34da8c330a Tools: Web Application Security: mwrlabs/dref 2018-07-02 17:42:45 +00:00
pe3zx
bc47dc961b Tools: Windows: mdsecactivebreach/SharpShooter 2018-07-02 17:41:26 +00:00
pe3zx
e448780dd2 Tools: Windows: 0xbadjuju/Tokenvator 2018-06-25 10:54:21 +07:00
pe3zx
19992becf1 Tools: Web Application Security: brannondorsey/dns-rebind-toolkit 2018-06-25 10:52:50 +07:00
pe3zx
0652d84706 Tools: Adversary Emulation: n0dec/MalwLess 2018-06-25 10:47:41 +07:00
pe3zx
7b1615d88b Tools: AWS Security: nccgroup/PMapper 2018-06-24 04:39:38 +00:00
pe3zx
73524e4302 Remove issue links 2018-06-22 15:18:29 +07:00
pe3zx
3e22bbb884 Articles: Web Application Security: Exploting CORS misconfigurations for Bitcoins and bounties 2018-06-22 14:37:20 +07:00
pe3zx
ebf9cdcfff Tools: AWS Security: cyberark/SkyArk 2018-06-19 17:55:31 +07:00
pe3zx
0c5c4dc288 Tools: AWS Security: eth0izzle/bucket-stream 2018-06-19 17:27:53 +07:00
pe3zx
b99e7512f2 Tools: AWS Security: random-robbie/slurp 2018-06-19 17:26:43 +07:00
pe3zx
486ae3b316 Tools: AWS Security: dagrz/aws_pwn 2018-06-19 17:25:01 +07:00
pe3zx
ab57315fe0 Tools: AWS Security: carnal0wnage/weirdAAL 2018-06-19 17:23:45 +07:00
pe3zx
36fc68ebaa Tools: AWS Security: duo-labs/cloudtracker 2018-06-19 17:22:21 +07:00
pe3zx
c330a026d6 Tools: AWS Security: duo-labs/cloudmapper 2018-06-19 17:21:14 +07:00
pe3zx
41b9357423 Tools: AWS Security: prevade/cloudjack 2018-06-19 17:19:47 +07:00
pe3zx
76b7b5bbd0 Tools: AWS Security: MindPointGroup/cloudfrunt 2018-06-19 17:18:41 +07:00
pe3zx
6ac6551a63 Tools: AWS Security: airbnb/streamalert 2018-06-19 17:17:39 +07:00
pe3zx
f21da1a3f9 Tools: AWS Security: Diffy is a digital forensics and incident response (DFIR) tool developed by Netflix's Security Intelligence and Response Team (SIRT). 2018-06-19 17:15:48 +07:00
pe3zx
77de480a59 Tools: AWS Security: RiotGames/cloud-inquisitor 2018-06-19 17:14:15 +07:00
pe3zx
2bfea0410a Tools: AWS Security: toniblyx/prowler 2018-06-19 17:04:20 +07:00
pe3zx
2f098dd4e9 Tools: AWS Secrutiy: lyft/metadataproxy 2018-06-19 17:02:53 +07:00
pe3zx
7c689d02ce Articles: Tutorials: Decrypting APT33’s Dropshot Malware with Radare2 and Cutter – Part 1 and Part 2 2018-06-19 16:16:36 +07:00
pe3zx
1cb5760fa3 Articles: Digital Forensics and Incident Response: Malicious PowerShell in the Registry - Persistence 2018-06-19 15:29:04 +07:00
pe3zx
200f3590cb Tools: Mobile Security: nccgroup/house 2018-06-18 08:41:56 +00:00
pe3zx
9ac5f17df7 Tools: Digital Forensics and Incident Response: IllusiveNetworks-Labs/HistoricProcessTree 2018-06-18 08:35:55 +00:00
pe3zx
42bebcefb2 Tools: Digital Forensics and Incident Response: williballenthin/process-forest 2018-06-18 08:34:24 +00:00
pe3zx
3af10457cb Articles: Digital Forensics and Incident Response: Detection of Backdating The System Clock in MacOS 2018-06-18 08:27:09 +00:00
pe3zx
5e4925f4bf Articles: Exploitation: Marshalling to SYSTEM - An analysis of CVE-2018-0824 2018-06-18 07:37:59 +00:00
pe3zx
854d738265 Tools: Malware Analysis: Koodous 2018-06-18 07:35:26 +00:00
pe3zx
89c91767d2 Tools: externalist/exploit_playground 2018-06-18 06:58:44 +00:00
pe3zx
aa79b9e451 Articles: Web Application Security: Advanced CORS Exploitation Techniques 2018-06-18 12:47:58 +07:00
pe3zx
39e617b852 Tools: AWS Security: asecurityteam/spacecrab 2018-06-17 18:14:33 +00:00
pe3zx
e41cac608e Articles: Digital Forensics and Incident Response: In-depth forensic analysis of Windows registry files 2018-06-17 18:12:10 +00:00
pe3zx
b81f0220ff Articles: Digital Forensics and Incident Response: Forensic Relavance of Vim Artifacts 2018-06-17 18:10:59 +00:00
pe3zx
e87955b42b Articles: Digital Forensics and Incident Response: Staring into the Spotlight 2018-06-17 18:08:54 +00:00
pe3zx
cb1334f432 Remove 404 links 2018-06-14 07:34:31 +00:00
pe3zx
1cb1bac315 Articles: Web Application Security: BugBountyProtip ~ Collection 2018-06-14 07:21:24 +00:00
pe3zx
44284b3fe4 Articles: Web Application Security: List of bug bounty writeups 2018-06-13 14:58:25 +00:00
pe3zx
dbfc97cb13 Tools: Malware Analysis: fireeye/flare-fakenet-ng 2018-06-13 14:57:17 +00:00
pe3zx
a78f1b162e Tools: Malware Analysis: P4T12ICK/ypsilon 2018-06-13 14:55:57 +00:00
pe3zx
33ff01a45b Tools: Digital Forensics and Incident Response: draios/sysdig 2018-06-13 14:53:42 +00:00
pe3zx
f81820db3e Tools: Windows: FuzzySecurity/PowerShell-Suite 2018-06-13 14:51:13 +00:00
pe3zx
ad95973af8 Tools: Plugins: nccgroup/freddy
nccgroup/freddy - Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans
2018-06-08 15:18:30 +07:00
pe3zx
23632a90b2 Fix issue links 2018-06-07 12:51:37 +07:00
pe3zx
4d8e7662f7 Articles: Digital Forensics and Incident Response: Apple Probably Knows What You Did Last Summer 2018-06-06 11:18:52 +07:00
pe3zx
9dbfae0ee8 Articles: Web Application Security: Understanding Java deserialization 2018-05-31 15:17:20 +07:00
pe3zx
bbf80a4b84 Change 'PHP Object Injection' to 'Serialization/Deserialization' in Articles/Web Application Security 2018-05-31 15:16:34 +07:00
pe3zx
b97b917510 Articles: Tutorials: Collect NTFS forensic information with osquery 2018-05-31 15:13:03 +07:00
pe3zx
44e20c7207 Articles: Tutorials: Manage your fleet’s firewalls with osquery 2018-05-31 15:10:57 +07:00
pe3zx
2946559674 Tools: Digital Forensics and Incident Response: Broctets-and-Bytes/Darwin 2018-05-31 15:08:49 +07:00
pe3zx
a00cbe3c11 Articles: Malware Analysis: Quick analysis of malware created with NSIS 2018-05-29 17:13:48 +07:00
pe3zx
5509aa588e Tools: Plugins: 1N3/IntruderPayloads 2018-05-29 16:46:42 +07:00
pe3zx
5753c52cef Toools: Plugins: trailofbits/osquery-extensions 2018-05-29 16:43:49 +07:00
pe3zx
67eded6676 Tools: Vulnerable: OWASP/iGoat-Swift 2018-05-29 16:26:52 +07:00
pe3zx
7d9e870d23 Articles: Exploitation: Binary Exploitation ELI5 1,2,3 2018-05-25 19:18:18 +07:00
pe3zx
2591f41463 Articles: Post Exploitation: GTFOBins 2018-05-25 19:15:04 +07:00
pe3zx
9643437053 Tools: Digital Forensics and Incident Response: log2timeline/plaso 2018-05-25 19:12:26 +07:00
pe3zx
1a83b11a80 Tools: Web Application Security: RhinoSecurityLabs/SleuthQL 2018-05-25 19:08:07 +07:00
pe3zx
dac950dbd2 Refactoring README.md 2018-05-25 19:01:01 +07:00
pe3zx
a9ea435161 [Tools][Digital Forensics and Incident Response] cryps1s/DARKSURGEON 2018-05-23 18:28:02 +07:00
pe3zx
e769a8e784 [Tools][Windows] Cybellum/DoubleAgent 2018-05-23 18:26:13 +07:00
pe3zx
a7c1fad302 [Tools][Windows] putterpanda/mimikittenz 2018-05-23 17:48:07 +07:00
pe3zx
09a6f23ed5 [Tools][Digital Forensics and Incident Response] davehull/Kansa 2018-05-23 17:45:14 +07:00
pe3zx
e4220b8aeb [Tools][Malware Analysis] activecm/rita 2018-05-23 17:44:01 +07:00
pe3zx
af5c787701 [Tools][Network] The ZMap Project 2018-05-23 17:41:49 +07:00
pe3zx
285f85c5ee [Tools][Network] WiGLE 2018-05-23 17:40:31 +07:00
pe3zx
d1b763f464 [Tools][Hardening] Strategies to Mitigate Cyber Security Incidents 2018-05-23 17:38:51 +07:00
pe3zx
c846dee65e [Tools][Malware] jgamblin/Mirai-Source-Code 2018-05-23 16:44:28 +07:00
pe3zx
10c7388eae [Tools][Network] infobytes/evikgrade 2018-05-23 16:41:12 +07:00
pe3zx
2b98f7e72e [Tools][Digital Forensics and Incident Response] carmaa/inception 2018-05-23 16:32:56 +07:00
pe3zx
fa4b018ff3 [Tools][Exploits] Microsoft Windows - 'POP/MOV SS' Privilege Escalation 2018-05-23 10:08:09 +07:00
pe3zx
dc6dfe01d7 [Tools][Digital Forensic and Incident Response] google/docker-explorer 2018-05-21 16:31:57 +07:00
pe3zx
2ff502eabb [Articles][Exploitation] Windows Exploit Development (primer II) : Corrupting Structured Exception Handling and Controlling Memory Pointers 2018-05-21 16:26:31 +07:00
pe3zx
078b04c92e [Articles][Exploitation] Windows Exploit Development (primer) : Debugging Threads and Analyzing Memory 2018-05-21 16:25:52 +07:00
pe3zx
a463424af0 [Articles][Digital Forensics and Incident Response] A Few Interesting iOS Forensic Artefacts 2018-05-21 16:18:52 +07:00
pe3zx
b622f9ab2e Remove issue links 2018-05-18 12:09:22 +07:00
pe3zx
e90d6ab242 [Tool][Network] DNSDB 2018-05-18 12:02:38 +07:00
pe3zx
f94f72c29c [Tools][Windows] api0cradle/LOLBAS 2018-05-18 11:59:10 +07:00
pe3zx
4865ce8456 [Tools][Windows] https://github.com/NetSPI/goddi 2018-05-18 11:58:06 +07:00
pe3zx
a8ce56780b [Tools][Web Application Security] NetSPI/PowerUpSQL 2018-05-18 11:56:58 +07:00
pe3zx
6a8d0d1ec5 [Tools][Web Application Security] ismailtasdelen/xss-payload-list 2018-05-18 11:54:15 +07:00
pe3zx
d1cf6be0bf [Tools][Network] byt3bl33d3r/MITMf 2018-05-18 11:52:59 +07:00
pe3zx
50f98f9db5 [Tools][Vulnerable] google/google-ctf 2018-05-18 11:51:34 +07:00
pe3zx
a06000aa13 [Tools][Social Engineering] haccer/twint 2018-05-18 11:48:53 +07:00
pe3zx
d9da97c922 [Tools][Exploits] CVE-2018-8897 POP SS Vulnerability 2018-05-18 11:42:21 +07:00
pe3zx
57dc82b8a8 [Tools][Malware Analysis] APT Groups, Operations and Malware Search Engine 2018-05-18 11:30:36 +07:00
pe3zx
9f9be42b57 [Tools][AWS Secrutiy] jordanpotti/CloudScraper 2018-05-17 19:14:25 +07:00
pe3zx
9c93bbc5a0 [Articles][Exploitation] r0hi7/BinExp - Linux Binary Exploitation 2018-05-17 18:52:44 +07:00
pe3zx
116394584c [Articles][Digital Forensics and Incident Response] Cloud Forensics: pCloud Drive 2018-05-07 09:02:53 +07:00
pe3zx
71321d92ce [Articles][Digital Forensics and Incident Response] Getting Saucy with APFS 2018-05-03 17:28:22 +07:00
pe3zx
d0494efdf2 [Tools][Windows] danielbohannon/Invoke-DOSfuscation 2018-05-03 17:21:12 +07:00
pe3zx
2ecd02677d [Tools][Malware Analysis] hlldz/SpookFlare 2018-05-03 17:18:40 +07:00
pe3zx
5d997fdcdf [Tools][Exploits] MSRC-41869 Local DoS (BSOD) in all versions of Windows 2018-05-03 17:13:10 +07:00
pe3zx
a76007f2bf [Articles][Exploitation] Windows Kernel Exploitation Tutorial Part 8: Use After Free 2018-05-02 16:08:37 +07:00
pe3zx
9a2ba93dcd [Tools][Hardening] Windows Security Baselines 2018-04-27 19:14:31 +07:00
pe3zx
0f91265f3a [Tools][Hardening] Add Hardening section with STIGs 2018-04-27 19:11:43 +07:00
pe3zx
15b16b7062 [Articles][Digital Forensics and Incident Response] How to Perform Hadoop Forensics 2018-04-25 15:07:18 +07:00
pe3zx
db078957d3 Update syntax and content 2018-04-22 00:05:25 +07:00
pe3zx
23bf7913ac [Tools][Windows] trustedsec/unicorn 2018-04-18 18:08:05 +07:00
pe3zx
91c20ee54b [Articles][Privacy] DIY Cybersecurity for Domestic Violence 2018-04-18 17:59:22 +07:00
pe3zx
d7fdbde6d9 [Articles][Privacy] Digital Privacy at the U.S. Border: Protecting the Data On Your Devices 2018-04-18 17:58:37 +07:00
pe3zx
b916e8f44b [Articles][Privacy] The Wired Guide to Digital Security 2018-04-18 17:57:11 +07:00
pe3zx
094ab8603c [Articles][Privacy] Digital Security for Freelance Journalists 2018-04-18 17:55:27 +07:00
pe3zx
e8d1da2c39 [Articles][Privacy] Secure Journalism at Protests 2018-04-18 17:54:05 +07:00
pe3zx
a1632d2486 [Articles][Privacy] Surveillance Self-Defense Checklist 2018-04-18 17:53:15 +07:00
pe3zx
5b7c1afe60 Fix missing/broken links 2018-04-18 17:51:22 +07:00
pe3zx
e6d7854771 Add missing section break lines 2018-04-18 17:49:15 +07:00
pe3zx
98b6087ca9 Add section descriptions 2018-04-18 17:46:59 +07:00
pe3zx
58d05236e0 [Articles][Privacy] Protecting Your Source When Releasing Sensitive Documents 2018-04-18 17:45:04 +07:00
pe3zx
f457211cba [Articles][Privacy] Security Educaiton Companion 2018-04-18 17:43:05 +07:00
pe3zx
e31cedad45 [Articles][Privacy] The Field Guide to Security Training in the Newsroom 2018-04-18 17:39:50 +07:00
pe3zx
f500636d40 [Articles][Malware Analysis] Add Process Injection Infographic 2018-04-18 16:58:58 +07:00
pe3zx
625ab7cd22 [Articles][Digital Forensics and Incident Response] Cloud Forensics: Analyzing MEGASync 2018-04-17 14:39:26 +07:00
pe3zx
5607cff61b Remove 404, 503 and duplicate links 2018-04-17 13:54:18 +07:00
pe3zx
d50b59f45a [Tools][Simulation] Cyb3rWard0g/Invoke-ATTACKAPI 2018-04-17 13:50:49 +07:00
pe3zx
6f139e653e [Tools][Simulation] redhuntlabs/RedHunt-OS 2018-04-17 13:49:43 +07:00
pe3zx
daabe7ae76 [Tools][Simulation] jymcheong/AutoTTP 2018-04-17 13:48:35 +07:00
pe3zx
9a5c19c22a [Tools][Simulation] TryCatchHCF/DumpsterFire 2018-04-17 13:46:47 +07:00
pe3zx
31408dd1f9 [Tools][Simulation] Blue Team Training Toolkit 2018-04-17 13:45:20 +07:00
pe3zx
c0384197ec [Tools][Simulation] guardicore/monkey 2018-04-17 13:43:51 +07:00
pe3zx
a169279814 [Tools][Simulation] redcanaryco/atomic-red-team 2018-04-17 13:29:29 +07:00
pe3zx
f3ed49eaaa [Tools][Simulation] endgameinc/RTA 2018-04-17 13:21:44 +07:00
pe3zx
1557d9b716 [Articles][Exploitation] A Primer to Windows x64 shellcoding 2018-04-16 10:27:36 +07:00
pe3zx
d6b1a5bdc8 [Tools][Windiws] shellster/DCSYNCMonitor 2018-04-13 22:07:02 +07:00
pe3zx
9bf8377e25 [Tools][Exploits] CVE-2018-0886 2018-04-13 22:05:06 +07:00
pe3zx
3d18add3e4 [Tools][Digital Forensics and Incident Response] mozilla/MozDef 2018-04-13 19:50:44 +07:00
pe3zx
09e26102de [Tools][Web Application Security] Snyk 2018-04-13 17:51:53 +07:00
pe3zx
8a8c2b7598 [Tools][Web Application Security] OWASP Zed Attack Proxy Project 2018-04-13 17:49:49 +07:00
pe3zx
62a1a4eba4 [Tools][Web Application Security] IRONWASP 2018-04-13 17:47:35 +07:00
pe3zx
d52d51b260 [Tools][Plugins] ElastAlert 2018-04-13 17:45:27 +07:00
pe3zx
9480e4fea3 [Tools][Digital Forensics and Incident Response] OSSEC 2018-04-13 17:41:51 +07:00
pe3zx
ec70f1094b [Tools][Network] aol/moloch 2018-04-13 17:38:49 +07:00
pe3zx
11d05df543 [Tools][Digital Forensics and Incident Response] mozilla/mig 2018-04-13 17:36:34 +07:00
pe3zx
1ce081949f [Tools][Windows] danielbohannon/Invoke-Obfuscation 2018-04-13 17:00:41 +07:00
pe3zx
a18f1347f8 [Tools][Exploits] Add exploits for CVE-2018-7600 a.k.a Drupalgeddon 2 2018-04-13 16:25:11 +07:00
pe3zx
5f892a73b7 [Articles][Digital Forensics and Incident Response] pstirparo/mac4n6 2018-04-09 11:48:41 +07:00
pe3zx
0ee2e0fa02 [Tools][AWS Security] glen-mac/goGetBucket 2018-04-09 11:37:19 +07:00
pe3zx
c57f994cdd [Articles][Exploitation] Bypass ASLR+NX Part 2 2018-04-07 03:37:43 +07:00
pe3zx
8715cb56ed [Tools][Social Engineering] OCCRP Data 2018-04-05 16:38:30 +07:00
pe3zx
f04c4881f8 [Tools][Plugins] wargio/r2dec-js 2018-04-05 16:11:28 +07:00
pe3zx
c5a362bf49 [Articles][DFIR] Inside iCloud Drive: Downloading 2018-04-05 16:04:28 +07:00
pe3zx
dc52ed212e [Tools][AWS Security] jordanpotti/AWSBucketDump 2018-04-05 16:02:18 +07:00
pe3zx
269d61dcdb [Tools][AWS Security] kromtech/s3-inspector 2018-04-05 16:00:52 +07:00
pe3zx
41dae5bcdf [Tools][AWS Security] sa7mon/S3Scanner 2018-04-05 16:00:04 +07:00
pe3zx
5d09347d5a [Tools][AWS Security] FishermansEnemy/bucket_finder 2018-04-05 15:58:19 +07:00
pe3zx
c9d7ba372d [Tools][Network] USArmyResearchLab/Dshell 2018-04-05 15:33:51 +07:00
pe3zx
d2fa2b58af [Tools][Web Application Security] Oracle EBS Penetration Testing Tool 2018-04-04 16:38:38 +07:00
pe3zx
ff60b58afe [Tools][Web Application Security] pwntester/ysoserial.net 2018-04-03 12:21:14 +07:00
pe3zx
5c3039d308 [Tools][Web Application Security] ambionics/phpggc 2018-04-03 12:20:23 +07:00
pe3zx
6fb9838532 [Articles][Exploitation] Bypass ASLR+NX Part 1 2018-04-03 12:17:02 +07:00
pe3zx
43f1816931 [Articles][Digital Forensics and Incident Response] Inside iCloud Drive: Pushed updates, that syncing feeling 2018-04-03 12:02:16 +07:00
pe3zx
2d1d408371 Remove issue links 2018-04-01 20:34:43 +07:00
pe3zx
3dd1801925 [Tools][Plugins] 0xdea/frida-scripts 2018-04-01 20:31:30 +07:00
pe3zx
43cf38725a [Tools][Plugins] Frida Codeshare 2018-04-01 20:30:47 +07:00
pe3zx
f5b33bc09b [Tools][Plugins] summitt/Burp-Non-HTTP-Extension 2018-04-01 20:29:49 +07:00
pe3zx
bf030f8e67 [Tools][Mobile Security] KJCracks/Clutch 2018-04-01 20:27:48 +07:00
pe3zx
5b4b6bd28f [Tools][Mobile Security] stefanesser/dumpdecrypted 2018-04-01 20:26:50 +07:00
pe3zx
330b63f3e6 [Tools][Mobile Security] nygard/class-dump 2018-04-01 20:25:53 +07:00
pe3zx
681849f0af [Tools][Mobile Security] tcurdt/iProxy 2018-04-01 20:24:52 +07:00
pe3zx
f61ea70aa0 [Tools][Mobile Security] dmayer/idb 2018-04-01 20:23:40 +07:00
pe3zx
9fca90f375 [Tools][Mobile Security] mwrlabs/needle 2018-04-01 20:22:05 +07:00
pe3zx
53aabc61fd [Tools][Mobile Security] chaitin/passionfruit 2018-04-01 20:21:07 +07:00
pe3zx
b17dd29ff9 [Tools][Mobile Security] iSECPartners/Android-SSL-TrustKiller 2018-04-01 20:17:06 +07:00
pe3zx
ea1d1cb2ec [Tools][Mobile Security] frida/frida 2018-04-01 20:15:48 +07:00
pe3zx
1ab2893c09 [Tools][Mobile Security] ac-pm/Inspeckage 2018-04-01 20:14:22 +07:00
pe3zx
d107fc5d0c [Tools][Mobile Security] swdunlop/AndBug 2018-04-01 20:11:03 +07:00
pe3zx
6661e9a5c4 [Tools][Mobile Security] Drozer 2018-04-01 20:09:43 +07:00
pe3zx
776aefe43e [Tools][Mobile Security] skylot/jadx 2018-04-01 20:08:35 +07:00
pe3zx
8b9916efb6 [Tools][Mobile Security] pxb1988/dex2jar 2018-04-01 20:06:50 +07:00
pe3zx
b59544d2d7 [Tools][Mobile Security] Apktool 2018-04-01 20:05:30 +07:00
pe3zx
a84d8952e6 [Tools][Mobile Security] sensepost/objection 2018-04-01 20:03:23 +07:00
pe3zx
b9903c7dbb [Articles][Mobile Security] Mobile Application Hacking Diary 2018-04-01 20:01:27 +07:00
pe3zx
588005f853 [Articles][Digital Forensics and Incident Response] Inside iCloud Drive: uploading a file 2018-03-30 16:47:20 +07:00
pe3zx
f2e86bb7c6 [Articles][Web Application Security] Why You Should Never Pass Untrusted Data to Unserialize When Writing PHP Code 2018-03-30 15:51:00 +07:00
pe3zx
073cef7ec2 [Tools][Malware Analysis] hasherezade/hollows_hunter 2018-03-29 23:58:04 +07:00
pe3zx
c8d19ad39d [Articles][Post Exploitation] Post Exploitation Using NetNTLM Downgrade Attacks 2018-03-29 23:45:01 +07:00
pe3zx
be995ba9a9 [Tools][Windows] eladshamir/Internal-Monologue 2018-03-29 23:36:10 +07:00
pe3zx
a03d7a1881 [Tools][Windows] caseysmithrc/Inject.cs 2018-03-29 21:53:02 +07:00
pe3zx
e049ac999f [Articles][Exploitation] Kernel Exploit Demo - Windows 10 privesc via WARBIRD 2018-03-29 21:29:29 +07:00
pe3zx
7fb604a6e2 [Articles][Exploitation] Shellcoding for Linux and Windows Tutorial 2018-03-29 21:28:47 +07:00
pe3zx
8dd5445c87 [Articles][Exploitation] aPAColypse now: Exploiting Windows 10 in a Local Network with WPAD/PAC and JScript 2018-03-29 21:27:33 +07:00
pe3zx
6434e4e03c [Articles][Exploitation] ropchain 2018-03-29 21:25:57 +07:00
pe3zx
d8bbae9a72 [Articles][Exploitation] Many Formulas, One Calc – Exploiting a New Office Equation Vulnerability 2018-03-29 21:25:18 +07:00
pe3zx
5fdf72e409 [Articles][Exploitation] Heap Safari - Threat Local Caching 2018-03-29 21:23:33 +07:00
pe3zx
8cb2c99a70 [Articles][Exploitation] A Deep Dive Analysis of Microsoft’s Kernel Virtual Address Shadow Feature 2018-03-29 21:21:52 +07:00
pe3zx
c4dad0a4bf [Articles][Exploitation] Stack Based Buffer Overflows on x64 (Windows) 2018-03-29 21:20:49 +07:00
pe3zx
6579dcf17a [Articles][Exploitation] Getting to the Bottom of CVE-2018-0825 Heap Overflow Buffer 2018-03-29 21:17:31 +07:00
pe3zx
04613bd524 [Tools][Malware Analysis] glmcdona/Process-Dump
Process Dump is a Windows reverse-engineering command-line tool to dump malware memory components back to disk for analysis. Often malware files are packed and obfuscated before they are executed in order to avoid AV scanners, however when these files are executed they will often unpack or inject a clean version of the malware code in memory. A common task for malware researchers when analyzing malware is to dump this unpacked code back from memory to disk for scanning with AV products or for analysis with static analysis tools such as IDA.
2018-03-29 16:54:04 +07:00
pe3zx
2da6298064 [Tools][Network] NetworkScan Mon 2018-03-28 17:06:55 +07:00
pe3zx
e101ae0a6b [Articles][Exploitation] Total Meltdown? 2018-03-28 17:04:08 +07:00
pe3zx
bfca1608ba [Tools][Plugins] IDAConnect/IDAConnect 2018-03-28 16:07:10 +07:00
pe3zx
2e2123c2e1 [Articles][Exploitation][Vulnerability: Spectre and Meltdown] 2018-03-27 12:37:43 +07:00
pe3zx
838d57414f [Articles][Linux] The Definitive Guide to Linux System Calls 2018-03-27 12:34:12 +07:00
pe3zx
56523ec805 [Articles][Exploitation] Windows Operating System Archaeology 2018-03-27 12:33:28 +07:00
pe3zx
c44e0fc644 [Articles][Exploitation] Introduction to Windows shellcode development 2018-03-27 12:26:05 +07:00
pe3zx
e942c61be8 [Articles][Exploitation] Bypass ASLR with partial EIP overwrite 2018-03-27 12:22:18 +07:00
pe3zx
6f28c5be44 [Articles][Malware analysis] DOSfuscation - Exploring the Depths Cmd.exe Obfuscation and Detection Techniques 2018-03-26 23:21:29 +07:00