pe3zx
|
7ba6f654b9
|
[Tools][Plugins] fireeye/flare-emu
|
2018-12-13 15:35:07 +07:00 |
|
pe3zx
|
70ea107e23
|
[Tools][DFIR] SecurityRiskAdvisors/TALR
|
2018-12-13 14:43:15 +07:00 |
|
pe3zx
|
d569aaa4e3
|
[Tools][Malware Analysis] nbulischeck/tyton
|
2018-12-13 14:39:26 +07:00 |
|
pe3zx
|
bdebb85c19
|
[Tools][DFIR] Cyber Analytics Repository
|
2018-12-13 14:33:39 +07:00 |
|
pe3zx
|
f355bbf00b
|
[Articles][Malware Analysis] d00rt/emotet_research
|
2018-12-13 13:52:34 +07:00 |
|
pe3zx
|
e4334071a5
|
Add: prsecurity/CVE-2018-15982
|
2018-12-07 20:14:24 +07:00 |
|
pe3zx
|
05f82d326e
|
Add: smgorelik/Windows-RCE-exploits
|
2018-12-07 20:09:25 +07:00 |
|
pe3zx
|
e27445bdc0
|
Add: tomchop/malcom
|
2018-12-06 13:49:56 +07:00 |
|
pe3zx
|
48339811ae
|
Add: woj-ciech/kamerka
|
2018-11-30 14:37:53 +07:00 |
|
pe3zx
|
eb3ef3192b
|
Add trustedsec/hate_crack
|
2018-11-28 17:25:52 +07:00 |
|
pe3zx
|
8d728c1c0a
|
Add: jofpin/trape
|
2018-11-27 13:45:57 +07:00 |
|
pe3zx
|
2ee47c5713
|
Add: Encrypting for Apple's Secure Enclave
|
2018-11-25 21:34:44 +07:00 |
|
pe3zx
|
598911df52
|
Add: malwaredllc/byob
|
2018-11-25 21:30:47 +07:00 |
|
pe3zx
|
3457287ce4
|
Add: infosecn1nja/AD-Attack-Defense - Active Directory Security For Red & Blue Team
|
2018-11-25 21:28:58 +07:00 |
|
pe3zx
|
8d1b5797c1
|
Add: SpiderLabs/sheepl
|
2018-11-25 21:27:51 +07:00 |
|
pe3zx
|
156f8391c4
|
Add: OMENScan/Achoir
|
2018-11-25 21:20:03 +07:00 |
|
pe3zx
|
b89a7e6479
|
Add: VulnReproduction/LinuxFlaw
|
2018-11-25 21:18:34 +07:00 |
|
pe3zx
|
af0990c4a2
|
Add: kgretzky/evilginx2
|
2018-11-25 21:10:09 +07:00 |
|
pe3zx
|
a6e2def67d
|
Remove separator lines
|
2018-11-13 16:27:54 +07:00 |
|
pe3zx
|
ad47aff52d
|
Add: Four Ways to Bypass iOS SSL Verification and Certificate Pinning
|
2018-11-13 13:51:17 +07:00 |
|
pe3zx
|
79562ea1cf
|
Remove: unable to connect links
|
2018-11-12 21:52:10 +07:00 |
|
pe3zx
|
e4ff72f767
|
Fix: Missing html tag
|
2018-11-12 21:43:56 +07:00 |
|
pe3zx
|
6444cd24f8
|
Add: An introduction to exploiting userspace race conditions on iOS
|
2018-11-11 22:27:57 +07:00 |
|
pe3zx
|
8e12e9da9c
|
Add: EXPLOITING WINDOWS’ IP ID RANDOMIZATION BUG TO LEAK KERNEL DATA AND MORE (CVE-2018-8493)
|
2018-11-11 22:27:06 +07:00 |
|
pe3zx
|
00de53362f
|
Add: hannob/tls-what-can-go-wrong
|
2018-11-11 22:23:10 +07:00 |
|
pe3zx
|
bd9ebaa733
|
Add: s0md3v/XSStrike
|
2018-11-11 22:21:30 +07:00 |
|
pe3zx
|
9d616ae475
|
Add: Finding TikTok messages in iOS
|
2018-11-11 22:12:35 +07:00 |
|
pe3zx
|
29074ce5b8
|
Add: MorteNoir1/virtualbox_e1000_0day
|
2018-11-07 11:55:35 +07:00 |
|
pe3zx
|
949e0acc33
|
Add: OmerYa/Invisi-Shell
|
2018-11-05 11:54:33 +07:00 |
|
pe3zx
|
773fba9b98
|
Add: Microsoft/ProcDump-for-Linux
|
2018-11-05 11:52:40 +07:00 |
|
pe3zx
|
31bb2f498d
|
Add: Forensic Analysis Of The μTorrent Peer-to-Peer Client In Windows
|
2018-11-05 11:32:11 +07:00 |
|
pe3zx
|
4b8e07eceb
|
Update: Detecting Mimikatz & other Suspicious LSASS Access
|
2018-11-05 11:27:31 +07:00 |
|
pe3zx
|
e68542eeca
|
Add: RegRipper & keys parsed by plugins
|
2018-11-05 11:26:40 +07:00 |
|
pe3zx
|
d2e8c61336
|
Add: mac4n6's Presentations
|
2018-11-05 11:19:12 +07:00 |
|
pe3zx
|
cf8465c6fb
|
Add: "Gone In 10 Seconds" Snapchat Forensics
|
2018-11-05 11:13:19 +07:00 |
|
pe3zx
|
062d650787
|
Add: LightSpeed, a race for an iOS/MacOS sandbox escape
|
2018-11-01 15:37:50 +07:00 |
|
pe3zx
|
c06ecb8619
|
Add: Kernel RCE caused by buffer overflow in Apple's ICMP packet-handling code (CVE-2018-4407)
|
2018-10-31 11:42:48 +07:00 |
|
pe3zx
|
7e53378194
|
Add: A Guide to ARM64 / AArch64 Assembly on Linux with Shellcodes and Cryptography
|
2018-10-31 11:26:10 +07:00 |
|
pe3zx
|
c15e3a91a9
|
Add: sensepost/goDoH - godoh - A DNS-over-HTTPS C2
|
2018-10-30 13:41:35 +07:00 |
|
pe3zx
|
c6ff95d901
|
Add: TheSecondSun/Bashark - Bash post exploitation toolkit
|
2018-10-30 13:39:32 +07:00 |
|
pe3zx
|
68a124ecea
|
Add: FortyNorthSecurity/WMImplant - This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported is translated into a WMI-equivalent for use on a network/remote machine. WMImplant is WMI based.
|
2018-10-30 13:35:20 +07:00 |
|
pe3zx
|
bf099e9960
|
Add: Patrowl/PatrowlManager - PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
|
2018-10-30 13:24:41 +07:00 |
|
pe3zx
|
15507e7c47
|
Add: https://www.fortinet.com/blog/threat-research/inspect-mach-messages-in-macos-kernel-mode--part-ii--sniffing-th.html
|
2018-10-30 13:17:46 +07:00 |
|
pe3zx
|
c93c9bdb2b
|
Add: Analysis: Inspecting Mach Messages in macOS Kernel-Mode Part I: Sniffing the sent Mach messages
|
2018-10-30 13:17:04 +07:00 |
|
pe3zx
|
f9cdfb9f90
|
Add: google/GiftStick - 1-Click push forensics evidence to the cloud
|
2018-10-30 13:02:30 +07:00 |
|
pe3zx
|
d00d7210fe
|
Add: 'CVE-2018-8460: EXPOSING A DOUBLE FREE IN INTERNET EXPLORER FOR CODE EXECUTION'
|
2018-10-20 23:42:30 +07:00 |
|
pe3zx
|
d7929c6159
|
Add: 'Finding Slack app messages in iOS'
|
2018-10-20 23:37:35 +07:00 |
|
pe3zx
|
160c67e33a
|
Add: 'An Analysis of Microsoft Edge Chakra JavascriptArray TypeId Handling Memory Corruption (CVE-2018-8467)'
|
2018-10-20 23:34:41 +07:00 |
|
pe3zx
|
fa2ee2ff38
|
Add: 'Cloud Forensics: Google Drive'
|
2018-10-20 23:32:03 +07:00 |
|
pe3zx
|
a211cd445d
|
Add: 0xbecca/Amcache_Scan
|
2018-10-20 23:30:50 +07:00 |
|