How to geolocate mobile phones based on IP addresses?
http://nixintel.info/osint/geolocating-mobile-phones-with-an-ip/
@nixintel
@MwOsint
#OSINT #investigation #CTI #infosec #cybersecurity #DFIR #ThreatIntel #intelligence #reconnaissance
π£DailyOsint
π@malwr
http://nixintel.info/osint/geolocating-mobile-phones-with-an-ip/
@nixintel
@MwOsint
#OSINT #investigation #CTI #infosec #cybersecurity #DFIR #ThreatIntel #intelligence #reconnaissance
π£DailyOsint
π@malwr
Scan Container Images for Vulnerabilities with Docker Scout https://buff.ly/3OsMuVI #devops #opensource #automation
π£osodevops
π@malwr
π£osodevops
π@malwr
The New Stack
Scan Container Images for Vulnerabilities with Docker Scout
What sets Docker Scout apart from some of the other offerings is that it not only will display CVEs but also the composition of the image.
Tool Release: Code Credential Scanner (ccs) https://research.nccgroup.com/2023/05/23/tool-release-code-credential-scanner-ccs/
π£Dinosn
π@malwr
π£Dinosn
π@malwr
CrowdStrike Falcon Platform Achieves Certification in AV-Comparativesβ First Anti-Tampering Test
π£BradW-CS
Tamper Resistant != Tamper Proof
π€Vengeful-Melon
Right. And yet it's still trivial?
Exit: W10 only
π€Doctorexx
π@malwr
π£BradW-CS
Tamper Resistant != Tamper Proof
π€Vengeful-Melon
Right. And yet it's still trivial?
Exit: W10 only
π€Doctorexx
π@malwr
crowdstrike.com
CrowdStrike Achieves Certification in AV-Comparativesβ First Anti-Tampering Test
Learn how CrowdStrike Falcon Enterprise successfully defended against all tampering attacks to win certification in AV-Comparatives first Anti-Tampering test.
DNS Identity - This report provides a view of authentication and verification of domain name owners in the context of domain name registration. It identifies the security challenges, good practices, security controls and associated risks in the domain name registration ecosystem.
π£digicat
π@malwr
π£digicat
π@malwr
www.enisa.europa.eu
DNS Identity | ENISA
ENISA is the EU agency dedicated to enhancing cybersecurity in Europe. They offer guidance, tools, and resources to safeguard citizens and businesses from cyber threats.
π Part 1 of our #OALABS Patreon tutorial series on the PEB unlocked for everyoneβ¦
Understanding The PEB for Reverse Engineers
https://youtu.be/uyisPPTupmA
π£herrcore
π@malwr
Understanding The PEB for Reverse Engineers
https://youtu.be/uyisPPTupmA
π£herrcore
π@malwr
π₯1
Check Point's Alexey Bukhteyev & Arie Olshtein provide insights into GuLoader's evolution. GuLoader is a prominent shellcode-based downloader, active for more than 3 years, that has been used in a large number of attacks to deliver a wide range of malware. https://research.checkpoint.com/2023/cloud-based-malware-delivery-the-evolution-of-guloader/
π£virusbtn
π@malwr
π£virusbtn
π@malwr
Nice quick introduction to persistence techniques in Windows by Ari Novick (@CyberArk)
https://www.cyberark.com/resources/threat-research-blog/persistence-techniques-that-persist
#cybersecurity
π£0xor0ne
π@malwr
https://www.cyberark.com/resources/threat-research-blog/persistence-techniques-that-persist
#cybersecurity
π£0xor0ne
π@malwr
I made a video of how to solve Hex-Ray's CTF using path driven symbolic execution by using Binary Ninja and the plugin SENinja. :) https://youtu.be/lay3PtTtubM
π£yates82
π@malwr
π£yates82
π@malwr
YouTube
Solving the Hex-Rays CTF using path driven symbolic execution.
Here I demonstrate how to solve the CTF using a binary ninja plugin called SENinja. Note that this version of the plugin shown in the video is part of a non-merged pull request of the plugin's master branch.
Nice reading on how to modify meterpreter for bypassing EDRs
Credits @VirtualAllocEx
https://redops.at/en/blog/meterpreter-vs-modern-edrs-in-2023
#redteam #infosec #cybersecurity #offsec
π£0xor0ne
π@malwr
Credits @VirtualAllocEx
https://redops.at/en/blog/meterpreter-vs-modern-edrs-in-2023
#redteam #infosec #cybersecurity #offsec
π£0xor0ne
π@malwr
π₯1
Hunting Lazarus Groupβs TTPs. Introduction | by montysecurity | May, 2023 | Medium https://montysecurity.medium.com/hunting-lazarus-groups-ttps-925c17469077
π£NeobeePaul
π@malwr
π£NeobeePaul
π@malwr
Medium
Hunting Lazarus Groupβs TTPs
Introduction
π₯1
Docker for Pentester
Abusing Docker API
https://www.hackingarticles.in/docker-for-pentester-abusing-docker-api/
Image Vulnerability Assessment
https://www.hackingarticles.in/docker-for-pentester-image-vulnerability-assessment/
Pentesting Framework
https://www.hackingarticles.in/docker-for-pentester-pentesting-framework/
Docker Privilege Escalation
https://www.hackingarticles.in/docker-privilege-escalation/
#infosec #cybersecurity #cybersecuritytips #pentestingβ¦
π£hackinarticles
π@malwr
Abusing Docker API
https://www.hackingarticles.in/docker-for-pentester-abusing-docker-api/
Image Vulnerability Assessment
https://www.hackingarticles.in/docker-for-pentester-image-vulnerability-assessment/
Pentesting Framework
https://www.hackingarticles.in/docker-for-pentester-pentesting-framework/
Docker Privilege Escalation
https://www.hackingarticles.in/docker-privilege-escalation/
#infosec #cybersecurity #cybersecuritytips #pentestingβ¦
π£hackinarticles
π@malwr
π₯2