Tracking and Analyzing Location Data
๐ฃgue-niiiii
Very nice implementation.
๐คpleiadeslink
๐@malwr
๐ฃgue-niiiii
Very nice implementation.
๐คpleiadeslink
๐@malwr
www.jakobmaier.at
Tracking and Analyzing My Location Data | Jakob Maier
How I tracking and analyze my location history safely and privacy conscious with Owntracks, Leaflet and a simple Express app.
WindowSpy: WindowSpy is a Cobalt Strike Beacon Object File meant for targetted user surveillance. The goal of this project was to trigger surveillance capabilities only on certain targets, e.g. browser login pages, confidential documents, VPN logins etc.
๐ฃdigicat
๐@malwr
๐ฃdigicat
๐@malwr
GitHub
GitHub - CodeXTF2/WindowSpy: WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.
WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance. - CodeXTF2/WindowSpy
Windows Defenderๅ
ๅญๆซๆๅ่ฝๅๆ - Analysis of Windows Defender memory scanning function - Chinese reverse engineering and analysis of how Defender memory scanning works
๐ฃdigicat
๐@malwr
๐ฃdigicat
๐@malwr
ๅพฎไฟกๅ
ฌไผๅนณๅฐ
Windows Defenderๅ
ๅญๆซๆๅ่ฝๅๆ
ๅฆไฝๅฎ็ฐDefenderๅ
ๅญๆซๆๅ่ฝ๏ผๅฆไฝๅฎไฝๅ
ๅญ็นๅพ็ ๅๅ
ๅญๆซๆ่งฆๅๆต็จ๏ผ
Preparing for a Russian cyber offensive against Ukraine this winter
๐ฃdigicat
There is no such thing as a cyber offensive or cyber weapons.
๐คjdmark
Why would it now - almost a year after the start of the war?
I think the Russians just can't do it. Sure, little pinpricks here and there...
๐คRedWineAndWomen
๐@malwr
๐ฃdigicat
There is no such thing as a cyber offensive or cyber weapons.
๐คjdmark
Why would it now - almost a year after the start of the war?
I think the Russians just can't do it. Sure, little pinpricks here and there...
๐คRedWineAndWomen
๐@malwr
Microsoft On the Issues
Preparing for a Russian cyber offensive against Ukraine this winter
As we report more fully below, in the wake of Russian battlefield losses to Ukraine this fall, Moscow has intensified its multi-pronged hybrid technology approach to pressure the sources of Kyivโs military and political support, domestic and foreign. Thisโฆ
ida_gpt: This is a basic idapython script to get you started with analyzing disassembly with GPT. Load it as a script file or just copy/paste the whole thing into your REPL.
๐ฃdigicat
๐@malwr
๐ฃdigicat
๐@malwr
GitHub
GitHub - MayerDaniel/ida_gpt
Contribute to MayerDaniel/ida_gpt development by creating an account on GitHub.
ine-labs/GCPGoat. GCPGoat is a vulnerable by design infrastructure on GCP featuring the latest released OWASP Top 10 web application security risks (2021)
๐ฃmunrobotic
๐@malwr
๐ฃmunrobotic
๐@malwr
GitHub
GitHub - ine-labs/GCPGoat: GCPGoat : A Damn Vulnerable GCP Infrastructure
GCPGoat : A Damn Vulnerable GCP Infrastructure. Contribute to ine-labs/GCPGoat development by creating an account on GitHub.
Novel Pipeline Vulnerability Discovered; Rust Found Vulnerable - In this fourth blog covering vulnerable GitHub Actions, we will explore this new technique of artifact poisoning and describe who could be vulnerable, including how we found this vulnerability in the Rust programming language
๐ฃdigicat
๐@malwr
๐ฃdigicat
๐@malwr
Legitsecurity
Novel Pipeline Vulnerability Discovered; Rust Found Vulnerable
New software supply chain vulnerabilities use artifact poisoning and attack the software development pipelines on projects using GitHub Actions.
AzureGraph: Azure AD enumeration over MS Graph
๐ฃdigicat
Hey can't click on link yet but can I use this officially instead of powershell for azure administration?
๐คTwixPoe
Nice tool, seems well built and nice that it uses MS Graph rather than PowerShell, but not sure what the use case for something like this would be rather than something like AzureHound that can map out paths of attack, or just interacting with Microsoft's Graph Explorer or PowerShell commands.
Nonetheless a nice little tool.
๐คcarrots32
๐@malwr
๐ฃdigicat
Hey can't click on link yet but can I use this officially instead of powershell for azure administration?
๐คTwixPoe
Nice tool, seems well built and nice that it uses MS Graph rather than PowerShell, but not sure what the use case for something like this would be rather than something like AzureHound that can map out paths of attack, or just interacting with Microsoft's Graph Explorer or PowerShell commands.
Nonetheless a nice little tool.
๐คcarrots32
๐@malwr
GitHub
GitHub - JoelGMSec/AzureGraph: Azure AD enumeration over MS Graph
Azure AD enumeration over MS Graph. Contribute to JoelGMSec/AzureGraph development by creating an account on GitHub.
A Detailed Analysis of The Last Version of REvil Ransomware [PDF](https://securityscorecard.pathfactory.com/research/detailed-analysis-revil)
๐ฃCyberMasterV
๐@malwr
๐ฃCyberMasterV
๐@malwr
Security Scorecard
A Detailed Analysis Of The Last Version Of R Evil Ransomware