Linux, Material de hacking y noticias
@Linux_and_hacking_material
1.49K
subscribers
246
photos
28
videos
3.36K
files
9.66K
links
Canal destinado a diversos contenidos: material de Linux, hacking y seguridad informática
Download Telegram
Join
Linux, Material de hacking y noticias
1.49K subscribers
Linux, Material de hacking y noticias
https://shamsher-khan.medium.com/tryhackme-intro-to-python-f06ea09a5d0b
Medium
Intro to Python TryHackme
This is a Writeup of Tryhackme room “Intro to Python”
Linux, Material de hacking y noticias
https://en.iguru.gr/2020/08/07/hackdroid-250-pentesting-efarmoges-gia-android/
iGuRu
HackDroid: 250+ Pentesting apps for Android! - iGuRu
HackDroid is a collection of 250+ penetration testing applications for all Android devices. The applications are divided into different categories, so you can download any…
Linux, Material de hacking y noticias
https://latesthackingnews.com/2021/01/23/millions-of-devices-exposed-to-dnspooq-vulnerabilities-allowing-dns-hijacking/
Latest Hacking News
Millions Of Devices Exposed To DNSpooq Vulnerabilities
DNSpooq vulnerabilities allow DNS cache poisoning, RCE, and dos attacks on vulnerable targets by exploiting dnsmasq. Update dnsmasq now.
Linux, Material de hacking y noticias
https://mega.nz/folder/kXhUXITD#6T9nAXtL9h739uRGpxCLXg
mega.nz
File folder on MEGA
Linux, Material de hacking y noticias
https://pentestlaboratories.com/2021/01/18/process-herpaderping-windows-defender-evasion/
Pentest Laboratories
Process Herpaderping – Windows Defender Evasion
Windows Defender has improved significantly the security posture of Windows environments since it has better detection capabilities compare to other security products. When a process is created Win…
Linux, Material de hacking y noticias
https://viralhacks.net/dQPJNJG
Linux, Material de hacking y noticias
https://github.com/c4ebt/House-of-Rust
GitHub
GitHub - c4ebt/House-of-Rust: The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that…
The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses. - c4ebt/House-of-Rust
Linux, Material de hacking y noticias
https://viralhacks.net/2ZJeXrD
viralhacks.net
Viralhacks.net is a completely free tool where you can create short links and earn from them, which apart from being free and use url anywhere 100% safe and secure.
Linux, Material de hacking y noticias
https://mobile.twitter.com/infosec_scarlet/status/1354528499105636353
Twitter
Infosec Scarlett
I have seen a lot of #pentesters struggle with tunneling and port-forwarding concepts. All #hackers should definitely understand these concepts for successful tests. This thread is dedicated to Tunneling/PortForwarding tricks. #infosec #pentest #tunneling…
Linux, Material de hacking y noticias
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/mcafee-atr-launches-education-inspired-capture-the-flag-contest/
McAfee Blog
McAfee ATR Launches Education-Inspired Capture the Flag Contest! | McAfee Blog
McAfee’s Advanced Threat Research team just completed its second annual capture the flag (CTF) contest for internal employees. Based on tremendous
Linux, Material de hacking y noticias
https://frichetten.com/blog/ssm-agent-tomfoolery/
Frichetten
Intercept SSM Agent Communications
Research on post-exploitation techniques against SSM Agent abusing send-command and start-session.
Linux, Material de hacking y noticias
https://www.fireeye.com/blog/threat-research/2021/01/phishing-campaign-woff-obfuscation-telegram-communications.html
Trellix
Research | Trellix Stories
Trellix Research, get the latest cybersecurity trends, best practices, security vulnerabilities, and more from industry leaders.
Linux, Material de hacking y noticias
https://labs.nettitude.com/blog/introducing-fcomm-c2-lateral-movement/
LRQA
Introducing FComm - C2 Lateral Movement
Over the past few years, we have found a few edge cases where the traditional lateral movement communication methods contained within PoshC2 did not suit particular client environments. To solve this problem, we have created FComm. Today, we are sharing FComm…
Linux, Material de hacking y noticias
https://cybersecurity.att.com/blogs/labs-research/teamtnt-delivers-malware-with-new-detection-evasion-tool#When:11:00:00Z
LevelBlue
TeamTNT delivers malware with new detection evasion tool
Executive Summary LevelBlue Labs
™
has identified a new tool from the TeamTNT adversary group, which has been previously observed targeting exposed Docker infrastructure for cryptocurrency mining purposes and credential theft. The group is using a new detection…
Linux, Material de hacking y noticias
https://ajinabraham.com/blog/detecting-zero-days-in-software-supply-chain-with-static-and-dynamic-analysis
Ajin Abraham
Detecting zero days in software supply chain with static and dynamic analysis
This blog shares some ideas about detecting zero-days in the software supply chain even before they get flagged by your typical Software Composition Analysis (SCA) or Dependency checking tools. Also shares the proof of concept code to detect malicious behavior…
Linux, Material de hacking y noticias
https://medium.com/malware-buddy/reverse-engineering-tips-binary-diffing-17760bd89f39
Medium
[Reverse Engineering Tips] — Binary Diffing
Binary diffing is a great way to visualize and spot differences in multiple samples. As a malware researcher, this is useful for…
Linux, Material de hacking y noticias
https://research.nccgroup.com/2021/01/27/real-world-cryptography-conference-2021-a-virtual-experience/#SoK-Computer-Aided-Cryptography
NCC Group Research
Real World Cryptography Conference 2021: A Virtual Experience
In this post, members of NCC Group's Cryptography Services team share summaries and insights from some of our favorite talks from Real World Crypto 2021
Linux, Material de hacking y noticias
https://access.redhat.com/security/vulnerabilities/RHSB-2021-002
Red Hat Customer Portal
RHSB-2021-002 Privilege escalation via command line argument parsing - sudo - (CVE-2021-3156) | Red Hat Customer Portal
Access Red Hat’s knowledge, guidance, and support through your subscription.
Linux, Material de hacking y noticias
https://blogsbunny.com/post/ghost-hack-ndash-criminals-use-deceased-employee-rsquo-s-account-to-wreak-havoc
Blogsbunny
Ghost hack – criminals use deceased employee’s account to wreak havoc
Most companies are quick to remove ex-staff from the payroll, but often not so quick to shut down their network access.
Linux, Material de hacking y noticias
https://www.blackarrow.net/from-n-day-exploit-to-kerberos-eop-in-linux-environments/
Tarlogic Security
BlackArrow - Offensive security services
BlackArrow is the offensive and defensive security services division of Tarlogic Security. A team of high level professionals