Forwarded from Hacker News (yahnc_bot)
Building a Compiler with Multi-Level Intermediate Representation (MLIR) (2020) [pdf] https://llvm.org/devmtg/2020-09/slides/MLIR_Tutorial.pdf
About writing malware by smelly_vx
https://papers.vx-underground.org/papers/Other/VXUG%20Zines/2022-12-04%20-%20About%20malware%20writing%20and%20how%20to%20start.html
https://papers.vx-underground.org/papers/Other/VXUG%20Zines/2022-12-04%20-%20About%20malware%20writing%20and%20how%20to%20start.html
https://www.buildyourownlisp.com/chapter5_languages
This, I presume, the understandable explanation I've read about how one of Chomsky's hierarchy principle relate with programing language.
This, I presume, the understandable explanation I've read about how one of Chomsky's hierarchy principle relate with programing language.
β‘2
BBv3.pdf
2.4 MB
Botnet Bible v.3
TD;LR this like message broker consumer in other person computer.
TD;LR this like message broker consumer in other person computer.
bws_book.pdf
2.7 MB
Everything you always wanted to know about mathematics (2013)
Forwarded from Hacker News (yahnc_bot)
China state-sponsored cyber actor living off the land to evade detection [pdf] https://media.defense.gov/2023/May/24/2003229517/-1/-1/0/CSA_Living_off_the_Land.PDF
Aditya_Sood_and_Richard_Enbody_Auth_Targeted_Cyber_Attacks_Multi.pdf
5.5 MB
Targeted Cyber Attack - Aditya Sood, Richard Enbody [2014]
One-stop-shop references of Tactics and Technique of APT :
https://attack.mitre.org/techniques/enterprise/
https://attack.mitre.org/tactics/enterprise/
*a playbook if your wanted to be an APT, ehh
https://attack.mitre.org/techniques/enterprise/
https://attack.mitre.org/tactics/enterprise/
*a playbook if your wanted to be an APT, ehh
according this, conti had fastest implementation of AES algo compared other ransomware,
https://github.com/Cracked5pider/conti_locker
https://github.com/Cracked5pider/conti_locker
NHS England Digital
Conti Ransomware - NHS England Digital
Conti is an advanced ransomware tool that uses a unique encryption routine to identify and encrypt files incredibly quickly.