#Malware_analysis
1. GuLoader Malware Uses Advanced Anti-Analysis Techniques to Evade Detection
https://gbhackers.com/guloader-malware-advanced-anti-analysis
2. CatB Ransomware
https://minerva-labs.com/blog/new-catb-ransomware-employs-2-year-old-dll-hijacking-technique-to-evade-detection
1. GuLoader Malware Uses Advanced Anti-Analysis Techniques to Evade Detection
https://gbhackers.com/guloader-malware-advanced-anti-analysis
2. CatB Ransomware
https://minerva-labs.com/blog/new-catb-ransomware-employs-2-year-old-dll-hijacking-technique-to-evade-detection
#Threat_Research
APT Hackers Turn to Malicious Excel Add-ins as Initial Intrusion Vector
https://thehackernews.com/2022/12/apt-hackers-turn-to-malicious-excel-add.html
APT Hackers Turn to Malicious Excel Add-ins as Initial Intrusion Vector
https://thehackernews.com/2022/12/apt-hackers-turn-to-malicious-excel-add.html
#reversing
1. Reverse Engineering Rustlang Binaries - A Series
https://brightprogrammer.netlify.app/post/reverse-engineering-rustlang-binaries-0x1-empty-program
2. Huawei's Security Hypervisor
https://blog.impalabs.com/2212_huawei-security-hypervisor.html
1. Reverse Engineering Rustlang Binaries - A Series
https://brightprogrammer.netlify.app/post/reverse-engineering-rustlang-binaries-0x1-empty-program
2. Huawei's Security Hypervisor
https://blog.impalabs.com/2212_huawei-security-hypervisor.html
BrightProgrammer
Reverse Engineering Rustlang Binaries - A Series | BrightProgrammer
I’ve been struggling with reverse engineering rustlang binaries for a while in CTF challenges. So I’m starting a reverse engineering series where I reverse engineer several rustlang binariesa and try to understand how they actually work.
#Offensive_security
1. Custom Implicit & Explicit Conversions in C#
https://offensivedefence.co.uk/posts/implicit-explicit-conversions
2. .NET Process injection in a new process with QueueUserAPC using D/invoke
https://gist.github.com/tothi/9cdd2be3b49cb42723726fd75df96471
3. Deceiving Defender: The Big Stack Bypass
https://steve-s.gitbook.io/0xtriboulet/deceiving-defender/deceiving-defender-the-big-stack-bypass
1. Custom Implicit & Explicit Conversions in C#
https://offensivedefence.co.uk/posts/implicit-explicit-conversions
2. .NET Process injection in a new process with QueueUserAPC using D/invoke
https://gist.github.com/tothi/9cdd2be3b49cb42723726fd75df96471
3. Deceiving Defender: The Big Stack Bypass
https://steve-s.gitbook.io/0xtriboulet/deceiving-defender/deceiving-defender-the-big-stack-bypass
offensivedefence.co.uk
Custom Implicit & Explicit Conversions in C#
Implicit and explicited operators are provided as a means of converting one datatype to another.
// this is an implicit conversion from an int to a double int i = 8; double d = i; // this is an explicit conversion from a double to an int double d = 8.8; int…
// this is an implicit conversion from an int to a double int i = 8; double d = i; // this is an explicit conversion from a double to an int double d = 8.8; int…
#hardening
Windows 10 Hardening (v.0.9.0) settings and configurations
https://github.com/0x6d69636b/windows_hardening
Windows 10 Hardening (v.0.9.0) settings and configurations
https://github.com/0x6d69636b/windows_hardening
GitHub
GitHub - 0x6d69636b/windows_hardening: HardeningKitty and Windows Hardening Settings
HardeningKitty and Windows Hardening Settings. Contribute to 0x6d69636b/windows_hardening development by creating an account on GitHub.
🧰RedTeam-Tools is github repository contains a collection of tools and resources that can be useful for red teaming activities.
⚙️Reconnaissance
⚙️Resource Development
⚙️Initial Access
⚙️Execution
⚙️Persistence
⚙️Privilege Escalation
⚙️Defense Evasion
⚙️Credential Access
⚙️Discovery
⚙️Lateral Movement
⚙️Collection
⚙️C&C
⚙️Exfiltration
⚙️Impact
⚙️Reconnaissance
⚙️Resource Development
⚙️Initial Access
⚙️Execution
⚙️Persistence
⚙️Privilege Escalation
⚙️Defense Evasion
⚙️Credential Access
⚙️Discovery
⚙️Lateral Movement
⚙️Collection
⚙️C&C
⚙️Exfiltration
⚙️Impact
Dynamic Routing Security.pdf
1.5 MB
Мой диплом по безопасности динамической маршрутизации, который я защитил на отлично в этом году (заканчивал я значит колледж)
Пользуйтесь на здоровье
Пользуйтесь на здоровье
EarSpy – A New Attack on Android Devices Use Motion Sensors to Steal Sensitive Data
https://gbhackers.com/earspy-android/
https://gbhackers.com/earspy-android/
GBHackers - Latest Cyber Security News | Hacker News
EarSpy - A New Attack on Android Devices Use Motion Sensors to Steal Sensitive Data
There has been a new eavesdropping attack developed by a team of security experts for Android devices which has been dubbed "EarSpy." With the help of this attack, attackers can detect the following things:-
Welcoming Our Forum »» https://system32.ink
ASK: Anything Related To Tech With Create your Own forum
Learn: About Programming,cybersecurity,bugHunting And Many More
Post: Share your Knowledge,Rats,Databases And Videos related to Tech
So SignUp Now And Grow Our Community
Thank You;
ASK: Anything Related To Tech With Create your Own forum
Learn: About Programming,cybersecurity,bugHunting And Many More
Post: Share your Knowledge,Rats,Databases And Videos related to Tech
So SignUp Now And Grow Our Community
Thank You;
#tools
#Blue_Team_Techniques
1. HTML Smuggling Detection - HTML Smuggling Detection
https://micahbabinski.medium.com/html-smuggling-detection-5adefebb6841
2. Log4Shell-Scanner-Exploit - Bash script to identify the Log4j CVE-2021-44228 vulnerability remotely
https://github.com/julian911015/Log4j-Scanner-Exploit
#Blue_Team_Techniques
1. HTML Smuggling Detection - HTML Smuggling Detection
https://micahbabinski.medium.com/html-smuggling-detection-5adefebb6841
2. Log4Shell-Scanner-Exploit - Bash script to identify the Log4j CVE-2021-44228 vulnerability remotely
https://github.com/julian911015/Log4j-Scanner-Exploit
Medium
HTML Smuggling Detection
Introduction
#Threat_Research
CVE-2022-27510, CVE-2022-27518 - Measuring Citrix ADC & Gateway version adoption on the Internet
https://blog.fox-it.com/2022/12/28/cve-2022-27510-cve-2022-27518-measuring-citrix-adc-gateway-version-adoption-on-the-internet
CVE-2022-27510, CVE-2022-27518 - Measuring Citrix ADC & Gateway version adoption on the Internet
https://blog.fox-it.com/2022/12/28/cve-2022-27510-cve-2022-27518-measuring-citrix-adc-gateway-version-adoption-on-the-internet
Fox-IT International blog
CVE-2022-27510, CVE-2022-27518 – Measuring Citrix ADC & Gateway version adoption on the Internet
Authored by Yun Zheng Hu Recently, two critical vulnerabilities were reported in Citrix ADC and Citrix Gateway; where one of them was being exploited in the wild by a threat actor. Due to these vul…
#Analytics
#Sec_code_review
Top 10 bugs found in C++ projects in 2022
https://pvs-studio.com/en/blog/posts/cpp/1021
#Sec_code_review
Top 10 bugs found in C++ projects in 2022
https://pvs-studio.com/en/blog/posts/cpp/1021
PVS-Studio
Top 10 bugs found in C++ projects in 2022
New Year is coming! It means, according to tradition, it′s time to recall 10 of the most interesting warnings that PVS-Studio found during 2022.
#exploit
1. CVE-2022-4178:
Chrome - Design flaw in Synchronous Mojo message handling introduces unexpected reentrancy and allows for multiple UAFs
https://bugs.chromium.org/p/project-zero/issues/detail?id=2372
2. WebKit + Kernel exploit chain for all PS Vita firmwares
https://github.com/TheOfficialFloW/HENlo
3. CVE-2022-41912:
Signature bypass via multiple Assertion elements
https://bugs.chromium.org/p/project-zero/issues/detail?id=2368
1. CVE-2022-4178:
Chrome - Design flaw in Synchronous Mojo message handling introduces unexpected reentrancy and allows for multiple UAFs
https://bugs.chromium.org/p/project-zero/issues/detail?id=2372
2. WebKit + Kernel exploit chain for all PS Vita firmwares
https://github.com/TheOfficialFloW/HENlo
3. CVE-2022-41912:
Signature bypass via multiple Assertion elements
https://bugs.chromium.org/p/project-zero/issues/detail?id=2368
GitHub
GitHub - TheOfficialFloW/HENlo: WebKit+Kernel exploit chain for all PS Vita firmwares
WebKit+Kernel exploit chain for all PS Vita firmwares - TheOfficialFloW/HENlo
#Infographics
#Malware_analysis
Ransomware & Data Extortion Landscape in 2022
https://app.tidalcyber.com
#Malware_analysis
Ransomware & Data Extortion Landscape in 2022
https://app.tidalcyber.com
Tidalcyber
Tidal Cyber
Threat-Informed Defense