Nice quick introduction to persistence techniques in Windows by Ari Novick (@CyberArk)
https://www.cyberark.com/resources/threat-research-blog/persistence-techniques-that-persist
#cybersecurity
π£0xor0ne
π@malwr
https://www.cyberark.com/resources/threat-research-blog/persistence-techniques-that-persist
#cybersecurity
π£0xor0ne
π@malwr
I made a video of how to solve Hex-Ray's CTF using path driven symbolic execution by using Binary Ninja and the plugin SENinja. :) https://youtu.be/lay3PtTtubM
π£yates82
π@malwr
π£yates82
π@malwr
YouTube
Solving the Hex-Rays CTF using path driven symbolic execution.
Here I demonstrate how to solve the CTF using a binary ninja plugin called SENinja. Note that this version of the plugin shown in the video is part of a non-merged pull request of the plugin's master branch.
Nice reading on how to modify meterpreter for bypassing EDRs
Credits @VirtualAllocEx
https://redops.at/en/blog/meterpreter-vs-modern-edrs-in-2023
#redteam #infosec #cybersecurity #offsec
π£0xor0ne
π@malwr
Credits @VirtualAllocEx
https://redops.at/en/blog/meterpreter-vs-modern-edrs-in-2023
#redteam #infosec #cybersecurity #offsec
π£0xor0ne
π@malwr
π₯1
Hunting Lazarus Groupβs TTPs. Introduction | by montysecurity | May, 2023 | Medium https://montysecurity.medium.com/hunting-lazarus-groups-ttps-925c17469077
π£NeobeePaul
π@malwr
π£NeobeePaul
π@malwr
Medium
Hunting Lazarus Groupβs TTPs
Introduction
π₯1
Docker for Pentester
Abusing Docker API
https://www.hackingarticles.in/docker-for-pentester-abusing-docker-api/
Image Vulnerability Assessment
https://www.hackingarticles.in/docker-for-pentester-image-vulnerability-assessment/
Pentesting Framework
https://www.hackingarticles.in/docker-for-pentester-pentesting-framework/
Docker Privilege Escalation
https://www.hackingarticles.in/docker-privilege-escalation/
#infosec #cybersecurity #cybersecuritytips #pentestingβ¦
π£hackinarticles
π@malwr
Abusing Docker API
https://www.hackingarticles.in/docker-for-pentester-abusing-docker-api/
Image Vulnerability Assessment
https://www.hackingarticles.in/docker-for-pentester-image-vulnerability-assessment/
Pentesting Framework
https://www.hackingarticles.in/docker-for-pentester-pentesting-framework/
Docker Privilege Escalation
https://www.hackingarticles.in/docker-privilege-escalation/
#infosec #cybersecurity #cybersecuritytips #pentestingβ¦
π£hackinarticles
π@malwr
π₯2
Windows Security Log Quick Reference Cheat-sheet Credit:https://ultimatewindowssecurity.com/securitylog/quickref/Default.aspxβ¦β¦
#cybersecurity #pentesting #informationsecurity #hacking #DataSecurity #CyberSec #Hackers #bugbountytips #Linux #websecurity #Network #NetworkSecurity #cybersecurityawareness
π£Shubham_pen
π@malwr
#cybersecurity #pentesting #informationsecurity #hacking #DataSecurity #CyberSec #Hackers #bugbountytips #Linux #websecurity #Network #NetworkSecurity #cybersecurityawareness
π£Shubham_pen
π@malwr
Nice beginners series by @IntezerLabs on malware reverse engineering
Part 1: https://www.intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/
Part 2: https://www.intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/
#malware
π£0xor0ne
π@malwr
Part 1: https://www.intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/
Part 2: https://www.intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/
#malware
π£0xor0ne
π@malwr
π₯1
Malware Reverse Engineering for Beginners - Part 2 https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ #Pentesting #Malware #ReverseEngineering #CyberSecurity #Infosec
π£ptracesecurity
π@malwr
π£ptracesecurity
π@malwr
DFIR Framework for OT
Source: NIST
Download Link:
https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8428.pdf
Join us to get access to the best cyber security research and innovation reports and other essential tools for cyber professionals:
https://cyberstartupobservatory.com/cyber-security-newsletter/
#CyberSecurity #InfoSec #InformationSecurity
π£MaiteOrtegaCSO
π@malwr
Source: NIST
Download Link:
https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8428.pdf
Join us to get access to the best cyber security research and innovation reports and other essential tools for cyber professionals:
https://cyberstartupobservatory.com/cyber-security-newsletter/
#CyberSecurity #InfoSec #InformationSecurity
π£MaiteOrtegaCSO
π@malwr