Security_Strategies_Linux.epub
32.1 MB
#Tech_book
"Security Strategies in Linux Platforms and Applications. Third Edition", 2022.
"Security Strategies in Linux Platforms and Applications. Third Edition", 2022.
๐1
rsa_2048.pdf
6.2 MB
#Research
#cryptography
"Factoring integers with sublinear resources on a superconducting quantum processor", Dec. 2022.
#cryptography
"Factoring integers with sublinear resources on a superconducting quantum processor", Dec. 2022.
iOS_macOS_Kernel_Trenches.pdf
2.2 MB
#Offensive_security
"More Tales from the iOS/macOS Kernel Trenches (Kernel: CVE-2022-22640, IOGPU (Kernel Driver): CVE-2022-32821)"
"More Tales from the iOS/macOS Kernel Trenches (Kernel: CVE-2022-22640, IOGPU (Kernel Driver): CVE-2022-32821)"
๐น Usefull Websites ๐น
1. Digital Library - Archive.org
2. Online Courses - w3schools.com
3. Screenshot Taker (Permanent) - Archive.is
4. Learn Languages - Duolingo.com
5. Screenshot Taker (HD) - Screenshot.guru
6. Bypass Login (Websites) - Bugmenot.com
7. Graphic Softwares - Vectr.com
8. Cracked Softwares - CrackingPatching.com
9. File Sharing (2GB) - wetransfer.com
10. Autodraw (A.I) - Autodraw.com
1. Digital Library - Archive.org
2. Online Courses - w3schools.com
3. Screenshot Taker (Permanent) - Archive.is
4. Learn Languages - Duolingo.com
5. Screenshot Taker (HD) - Screenshot.guru
6. Bypass Login (Websites) - Bugmenot.com
7. Graphic Softwares - Vectr.com
8. Cracked Softwares - CrackingPatching.com
9. File Sharing (2GB) - wetransfer.com
10. Autodraw (A.I) - Autodraw.com
๐1
๐2
#Analytics
#Infographics
Systematization of attacks on the perimeter of L2/L3 network equipment. Ver. 3.0.
#Infographics
Systematization of attacks on the perimeter of L2/L3 network equipment. Ver. 3.0.
#Offensive_security
1. Pure-python implementation of MemoryModule technique to load a dll entirely from memory
https://github.com/naksyn/PythonMemoryModule
2. Nuclei template generator for WordPress plugins
https://github.com/ricardomaia/nuclei-template-generator-for-wordpress-plugins
]-> https://github.com/projectdiscovery/nuclei-templates/pull/6202
1. Pure-python implementation of MemoryModule technique to load a dll entirely from memory
https://github.com/naksyn/PythonMemoryModule
2. Nuclei template generator for WordPress plugins
https://github.com/ricardomaia/nuclei-template-generator-for-wordpress-plugins
]-> https://github.com/projectdiscovery/nuclei-templates/pull/6202
GitHub
GitHub - naksyn/PythonMemoryModule: pure-python implementation of MemoryModule technique to load dll and unmanaged exe entirelyโฆ
pure-python implementation of MemoryModule technique to load dll and unmanaged exe entirely from memory - naksyn/PythonMemoryModule
#Threat_Research
1. Prototype Pollution in Python
https://blog.abdulrah33m.com/prototype-pollution-in-python
2. Pre-Auth RCE in Liferay Portal CE (CVE-2019-16891)
https://y4tacker.github.io/2023/01/03/year/2023/TetCTF2023-Liferay-CVE-2019-16891-Pre-Auth-RCE
1. Prototype Pollution in Python
https://blog.abdulrah33m.com/prototype-pollution-in-python
2. Pre-Auth RCE in Liferay Portal CE (CVE-2019-16891)
https://y4tacker.github.io/2023/01/03/year/2023/TetCTF2023-Liferay-CVE-2019-16891-Pre-Auth-RCE
#info
A roadmap to teach myself compiler dev, malware reverse engineering, exploitation and kernel dev fundamentals
https://github.com/ujjwal-kr/system-programming-roadmap
A roadmap to teach myself compiler dev, malware reverse engineering, exploitation and kernel dev fundamentals
https://github.com/ujjwal-kr/system-programming-roadmap
GitHub
GitHub - ujjwal-kr/system-programming-roadmap: A roadmap to teach myself compiler dev, malware reverse engineering, exploitationโฆ
A roadmap to teach myself compiler dev, malware reverse engineering, exploitation and kernel dev fundamentals - ujjwal-kr/system-programming-roadmap
Cross_Layer_Attacks.pdf
1.1 MB
#Research
"From IP to Transport and Beyond: Cross-Layer Attacks Against Applications", 2022.
"From IP to Transport and Beyond: Cross-Layer Attacks Against Applications", 2022.
#DFIR
DFIR Artifact Museum from various operating systems
https://github.com/AndrewRathbun/DFIRArtifactMuseum
DFIR Artifact Museum from various operating systems
https://github.com/AndrewRathbun/DFIRArtifactMuseum
GitHub
GitHub - AndrewRathbun/DFIRArtifactMuseum: The goal of this repo is to archive artifacts from all versions of various OS's andโฆ
The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifact validation processes as well as increase access t...
๐1
Forwarded from Cyber security intelligent program
๐ฅPhantom DLL Hollower is a PoC performs Phantom DLL Hollowing which reported by @_forrestorr.
๐Masking Malicious Memory Artifacts โ Part I: Phantom DLL Hollowing
โ๏ธPhantom DLL hollowing PoC
๐Masking Malicious Memory Artifacts โ Part I: Phantom DLL Hollowing
โ๏ธPhantom DLL hollowing PoC
โค1
Forwarded from Cyber security intelligent program
๐ฅPhpMyAdmin Setup is Accessible Without Authentication
1๏ธโฃRecon through shodan and censys
2๏ธโฃVisit all ips and fuzz them according to their running services.
3๏ธโฃwappalyzer showed php so sid0krypt used php.txt from here
4๏ธโฃphpMyAdmin/setup was accessible
1๏ธโฃRecon through shodan and censys
2๏ธโฃVisit all ips and fuzz them according to their running services.
3๏ธโฃwappalyzer showed php so sid0krypt used php.txt from here
4๏ธโฃphpMyAdmin/setup was accessible
Forwarded from Cyber security intelligent program
๐ฅUsing the bruteforce of directories, an endpoint was found: /phpmyadmin/scripts/setup.php
๐คThx @0x_rood
๐คThx @0x_rood