Commit Graph

757 Commits

Author SHA1 Message Date
pe3zx
a1d439644b Tools: Social Engineering and OSINT: InQuest/omnibus 2018-08-21 21:23:05 +07:00
pe3zx
da088ef4d0 Articles: Tutorials: Emulating Decryption Function With Radare2 2018-08-21 21:16:50 +07:00
pe3zx
92be6fd0f5 Tools: Web Application Security: nccgroup/singularity 2018-08-21 21:12:46 +07:00
pe3zx
4fd370ee93 Tools: Digital Forensics and Incident Response: ptresearch/AttackDetection 2018-08-21 21:09:26 +07:00
pe3zx
0cccaa7973 Add: Kasspy IR's artifacts collectors 2018-07-28 11:17:58 +00:00
pe3zx
1cd4c4c578 Detection and recovery of NSA's covered up tracks 2018-07-28 11:14:20 +00:00
pe3zx
7ac3d19cc8 Add: Chasing Adversaries with Autoruns - evading techniques and countermeasures 2018-07-28 10:41:12 +00:00
pe3zx
61ae604e7a Add: bfuzzy/auditd-attack 2018-07-28 10:05:10 +00:00
pe3zx
b8270712d4 Add: Cracking the Walls of the Safari Sandbox - Fuzzing the macOS WindowServer for Exploitable Vulnerabilities 2018-07-28 09:45:55 +00:00
pe3zx
55e9c05eba Add: Exploiting a Windows 10 PagedPool off-by-one overflow (WCTF 2018) 2018-07-28 09:44:21 +00:00
pe3zx
4e829b445e Add: Delving deep into VBScript - Analysis of CVE-2018-8174 exploitation 2018-07-28 09:43:15 +00:00
pe3zx
8cf5fd362d Add: Weaponization of a JavaScriptCore Vulnerability -Illustrating the Progression of Advanced Exploit Primitives In Practice] 2018-07-28 09:42:07 +00:00
pe3zx
3d5f8c13cb Add: An Analysis of the Use-After-Free Bug in the Microsoft Edge Chakra Engine (CVE-2018-0946) 2018-07-28 09:40:14 +00:00
pe3zx
5777611316 Add: Windows Exploitation and AntiExploitation Evolution 2018-07-28 09:38:14 +00:00
pe3zx
ff0ed2e3a7 Add: Timeless Debugging of Complex Software: Root Cause Analysis of a Non-Deterministic JavaScriptCore Bug 2018-07-28 09:37:09 +00:00
pe3zx
d24955396e Update Web Application Security section name 2018-07-28 09:35:04 +00:00
pe3zx
b88728001a Relocate analysis of SSCA vulnerabilities from Exploits section to Articles 2018-07-28 09:28:42 +00:00
pe3zx
604e12aeb1 Add: Post-Spectre Threat Model Re-Think 2018-07-28 09:25:45 +00:00
pe3zx
7338c4c9db Change 'Exploitation: Vulnerability: Spectre and Meltdown' to 'Speculative Side-Channel Attacks' 2018-07-28 09:25:02 +00:00
pe3zx
b932e4085b Add: A Methodical Approach to Browser Exploitation 2018-07-28 09:04:50 +00:00
pe3zx
b966ba29b7 Add: Arbitrary Code Guard vs. Kernel Code Injections 2018-07-28 09:03:28 +00:00
pe3zx
301b29b65b Add: ANALYSIS OF A WIN32K NULL POINTER DEREFERENCE BY MATCHING THE MAY PATCH 2018-07-28 09:01:15 +00:00
pe3zx
e2e5256ce2 Add: Dissecting the POP SS Vulnerability 2018-07-28 08:57:45 +00:00
pe3zx
22a26033dc Add: The HIDeous parts of IOKit 2018-07-28 08:54:27 +00:00
pe3zx
d9e8ddbe25 Add: MMap Vulnerabilities – Linux Kernel 2018-07-28 08:44:36 +00:00
pe3zx
9465e1997b Add: Fuzzing Adobe Reader for exploitable vulns (fun != profit) 2018-07-28 08:41:51 +00:00
pe3zx
0a3fae6b34 Add: DCShadow 2018-07-28 08:36:32 +00:00
pe3zx
bfaa881cea Add: Golden Ticket 2018-07-28 08:35:37 +00:00
pe3zx
a71ef91e06 Add: DCShadow explained: A technical deep dive into the latest AD attack technique 2018-07-28 08:21:40 +00:00
pe3zx
674919a71e Articles: Tutotirlas: Windows DMA Attacks : Ganing SYSTEM shells using a generic patch 2018-07-28 08:12:21 +00:00
pe3zx
f2178321ec Add 'Tools: Hardware' with urisk/pcileech 2018-07-28 08:06:53 +00:00
pe3zx
dbbbed7446 Tools: Post Exploitation: huntresslabs/evading-autoruns 2018-07-28 05:34:21 +00:00
pe3zx
b5b33e0621 Articles: Post Exploitation: Evading Microsoft's Autoruns 2018-07-28 05:30:09 +00:00
pe3zx
06f04d61a9 Remove 404 link 2018-07-28 05:11:11 +00:00
pe3zx
f83b9e9de5 Add 'Articles: Exploitation: Hardware-related Attacks' with 'Attacking a co-hosted VM: A hacker, a hammer and two memory modules' 2018-07-28 05:06:54 +00:00
pe3zx
ab71fe611d Tools: Data Exfiltration: SySS-Research/Seth 2018-07-26 13:34:31 +00:00
pe3zx
258b93b784 Tools: Malware Analysis: Maltiverse 2018-07-26 13:24:42 +00:00
pe3zx
9d2eed6e25 Articles: Digital Forensics and Incident Response: I Know What You Did Last Month: A New Artifact of Execution on macOS 10.13 2018-07-26 12:52:39 +00:00
pe3zx
e18e674c80 Tools: Vulnerable: Reverse Engineering 2018-07-26 10:54:11 +00:00
pe3zx
b5fa2800c7 Tools: Malware Analysis: Malwares 2018-07-26 10:32:28 +00:00
pe3zx
7541ca6f43 Tools: AWS Security: ThreatResponse/margaritashotgun 2018-07-26 10:30:30 +00:00
pe3zx
e7478c68c3 Tools: AWS Security: ThreatResponse/aws_ir 2018-07-26 10:28:52 +00:00
pe3zx
955876a105 Tools: AWS Security: RiotGames/cloud-custodian 2018-07-26 10:26:38 +00:00
pe3zx
606adcbf35 Tools: AWS Security: sendgrid/krampus 2018-07-26 10:24:51 +00:00
pe3zx
a1e399307c Tools: AWS Security: andresriancho/nimbostratus 2018-07-26 10:23:20 +00:00
pe3zx
434fc1231f Tools: AWS Security: disruptops/cred_scanner 2018-07-26 10:21:22 +00:00
pe3zx
920a69a634 Tools: AWS Security: nccgroup/aws-inventory 2018-07-26 10:19:29 +00:00
pe3zx
c701a4b334 Tools: AWS Security: awslabs/aws-security-benchmark 2018-07-26 10:17:47 +00:00
pe3zx
b64417b790 Tools: Exploits: SPECTRE Variant 1 scanning tool 2018-07-26 10:13:59 +00:00
pe3zx
bf99ab483b Move content in Tools: Windows to Tools: Post Exploitation 2018-07-26 10:09:18 +00:00