pe3zx
|
dae21ab5cb
|
Add AVCaesar
|
2018-09-23 18:25:59 +07:00 |
|
pe3zx
|
2da8cad42e
|
Add Hybrid-Analysis
|
2018-09-23 18:24:28 +07:00 |
|
pe3zx
|
b4a5d14d78
|
Add contagio malware dump
|
2018-09-23 18:22:15 +07:00 |
|
pe3zx
|
cebe48618f
|
trisf/theZoo
|
2018-09-23 18:04:37 +07:00 |
|
pe3zx
|
d8a99dd72c
|
Add ThunderCls/xAnalyzer
|
2018-09-23 17:58:52 +07:00 |
|
pe3zx
|
e02d5d9dcc
|
Add Cn33liz/p0wnedShell
|
2018-09-23 17:55:39 +07:00 |
|
pe3zx
|
4222889cee
|
Add CVE-2018-3620 and CVE-2018-3646
|
2018-09-23 17:53:15 +07:00 |
|
pe3zx
|
6626016ed6
|
Add byt3bl33d3r/SprayingToolkit
|
2018-09-23 17:37:09 +07:00 |
|
pe3zx
|
813448d1f8
|
Add Exploitus
|
2018-09-23 17:34:51 +07:00 |
|
pe3zx
|
567edc808f
|
Add Phishing Frenzy
|
2018-09-23 17:30:19 +07:00 |
|
pe3zx
|
392b5e7669
|
Add droidefense/engine
|
2018-09-23 17:27:12 +07:00 |
|
pe3zx
|
4e5fe97abf
|
Add Compiler Explorer
|
2018-09-23 17:23:52 +07:00 |
|
pe3zx
|
da1b3d3db6
|
Add JPCERTCC/SysmonSearch
|
2018-09-23 13:21:13 +07:00 |
|
pe3zx
|
cf9c44448d
|
Add APT Groups and Operations
|
2018-09-23 13:18:51 +07:00 |
|
pe3zx
|
1cd72adee9
|
Add Uncoder.io
|
2018-09-23 13:11:07 +07:00 |
|
pe3zx
|
c9b075baaf
|
Add VSCMount
|
2018-09-23 13:09:07 +07:00 |
|
pe3zx
|
ed57a0a663
|
Add Google Dataset Search
|
2018-09-23 13:03:38 +07:00 |
|
pe3zx
|
7a766b4318
|
Add Neo23x0/exotron
|
2018-09-23 13:00:39 +07:00 |
|
pe3zx
|
df9831b119
|
Add mxmssh/drltrace
|
2018-09-23 12:57:12 +07:00 |
|
pe3zx
|
6ad9d83126
|
Add Heapple Pie - The macOS/iOS default heap
|
2018-09-22 17:55:26 +07:00 |
|
pe3zx
|
513e1fbc29
|
Add Apple File System Reference
|
2018-09-22 17:29:00 +07:00 |
|
pe3zx
|
3c5c85342f
|
[Add] DCShadow - Minimal permissions, Active Directory Deception, Shadowception and more
|
2018-08-26 22:53:13 +07:00 |
|
pe3zx
|
37ebbb52f5
|
[Add] ACTIVE DIRECTORY ATTACK - DCSHADOW
|
2018-08-26 22:48:51 +07:00 |
|
pe3zx
|
c9bb813f1d
|
[Add] Hot Potato – Windows Privilege Escalation
|
2018-08-26 22:35:24 +07:00 |
|
pe3zx
|
011847e2ad
|
[Add] DCShadow: Attacking Active Directory with Rogue DCs
|
2018-08-26 22:33:36 +07:00 |
|
pe3zx
|
6b69ed2ef2
|
[Add] Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.
|
2018-08-26 22:00:52 +07:00 |
|
pe3zx
|
39022312ae
|
[Add] felixweyne/imaginaryC2: Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware.
|
2018-08-26 21:59:33 +07:00 |
|
pe3zx
|
c1927ee03f
|
[Add] Wazuh: Open Source Host and Endpoint Security
|
2018-08-26 21:51:59 +07:00 |
|
pe3zx
|
1073b45323
|
[Add] gen0cide/gscript: framework to rapidly implement custom droppers for all three major operating systems
|
2018-08-21 23:22:47 +07:00 |
|
pe3zx
|
437cdbba2d
|
Add syscall exploit for CVE-2018-8897
|
2018-08-21 23:18:53 +07:00 |
|
pe3zx
|
ad20f8b182
|
Tools: Malware Analysis: InQuest/python-iocextract
|
2018-08-21 23:11:57 +07:00 |
|
pe3zx
|
a2f8b38392
|
Tools: AWS Security: RhinoSecurityLabs/pacu
|
2018-08-21 23:08:50 +07:00 |
|
pe3zx
|
455f17179d
|
Articles: Digital Forensics and Incident Response: Knowledge is Power! Using the macOS/iOS knowledgeC.db Database to Determine Precise User and Application Usage
|
2018-08-21 22:29:13 +07:00 |
|
pe3zx
|
61003171ab
|
Articles: Digital Forensics and Incident Response: The Forensics of Cortana on Android
|
2018-08-21 22:28:05 +07:00 |
|
pe3zx
|
04c04a1fae
|
Tools: Binary Analysis: Microsoft/binskim
|
2018-08-21 21:44:10 +07:00 |
|
pe3zx
|
1f6b3d06bd
|
Articles: Malware Analysis: MikroTik Cryptojacking Campaigns
|
2018-08-21 21:28:57 +07:00 |
|
pe3zx
|
a1d439644b
|
Tools: Social Engineering and OSINT: InQuest/omnibus
|
2018-08-21 21:23:05 +07:00 |
|
pe3zx
|
da088ef4d0
|
Articles: Tutorials: Emulating Decryption Function With Radare2
|
2018-08-21 21:16:50 +07:00 |
|
pe3zx
|
92be6fd0f5
|
Tools: Web Application Security: nccgroup/singularity
|
2018-08-21 21:12:46 +07:00 |
|
pe3zx
|
4fd370ee93
|
Tools: Digital Forensics and Incident Response: ptresearch/AttackDetection
|
2018-08-21 21:09:26 +07:00 |
|
pe3zx
|
0cccaa7973
|
Add: Kasspy IR's artifacts collectors
|
2018-07-28 11:17:58 +00:00 |
|
pe3zx
|
1cd4c4c578
|
Detection and recovery of NSA's covered up tracks
|
2018-07-28 11:14:20 +00:00 |
|
pe3zx
|
7ac3d19cc8
|
Add: Chasing Adversaries with Autoruns - evading techniques and countermeasures
|
2018-07-28 10:41:12 +00:00 |
|
pe3zx
|
61ae604e7a
|
Add: bfuzzy/auditd-attack
|
2018-07-28 10:05:10 +00:00 |
|
pe3zx
|
b8270712d4
|
Add: Cracking the Walls of the Safari Sandbox - Fuzzing the macOS WindowServer for Exploitable Vulnerabilities
|
2018-07-28 09:45:55 +00:00 |
|
pe3zx
|
55e9c05eba
|
Add: Exploiting a Windows 10 PagedPool off-by-one overflow (WCTF 2018)
|
2018-07-28 09:44:21 +00:00 |
|
pe3zx
|
4e829b445e
|
Add: Delving deep into VBScript - Analysis of CVE-2018-8174 exploitation
|
2018-07-28 09:43:15 +00:00 |
|
pe3zx
|
8cf5fd362d
|
Add: Weaponization of a JavaScriptCore Vulnerability -Illustrating the Progression of Advanced Exploit Primitives In Practice]
|
2018-07-28 09:42:07 +00:00 |
|
pe3zx
|
3d5f8c13cb
|
Add: An Analysis of the Use-After-Free Bug in the Microsoft Edge Chakra Engine (CVE-2018-0946)
|
2018-07-28 09:40:14 +00:00 |
|
pe3zx
|
5777611316
|
Add: Windows Exploitation and AntiExploitation Evolution
|
2018-07-28 09:38:14 +00:00 |
|