The Enigmatic “Roma225” Campaign – Yoroi Blog
https://blog.yoroi.company/research/the-enigmatic-roma225-campaign/
https://blog.yoroi.company/research/the-enigmatic-roma225-campaign/
Yoroi
The Enigmatic “Roma225” Campaign - Yoroi
Introduction The Cybaze-Yoroi ZLab researchers investigated a recent espionage malware implant weaponized to target companies in the Italian automotive sector. The malware was spread through well written phishing email trying to impersonate a senior partner…
How I was able to delete Google Gallery Data [IDOR]
https://medium.com/@yogeshtantak7788/how-i-was-able-to-delete-google-gallery-data-idor-53d2f303efff
https://medium.com/@yogeshtantak7788/how-i-was-able-to-delete-google-gallery-data-idor-53d2f303efff
Medium
How I was able to delete Google Gallery Data [IDOR]
Hi, This is Yogesh Tantak a Security Researcher from India. Today I am writing about a critical bug that I found in Google’s new Product…
Bypassing Windows User Account Control – d3struct0 – Medium
https://www.peerlyst.com/posts/bypassing-windows-user-account-control-ian-barwise-m-s-cissp-ceh-cnda
https://www.peerlyst.com/posts/bypassing-windows-user-account-control-ian-barwise-m-s-cissp-ceh-cnda
How to bypass AMSI and execute ANY malicious Powershell code | zc00l blog
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
zc00l blog
How to bypass AMSI and execute ANY malicious Powershell code
Hello again. In my previous posts I detailed how to manually get SYSTEM shell from Local Administrators users. That’s interesting but very late game during a penetration assessment as it is presumed that you already owned the target machine.
How to perform the static analysis of website source code with the browser — the beginner’s bug…
https://medium.com/@_bl4de/how-to-perform-the-static-analysis-of-website-source-code-with-the-browser-the-beginners-bug-d674828c8d9a
https://medium.com/@_bl4de/how-to-perform-the-static-analysis-of-website-source-code-with-the-browser-the-beginners-bug-d674828c8d9a
Yes, More Callbacks — The Kernel Extension Mechanism
https://medium.com/yarden-shafir/yes-more-callbacks-the-kernel-extension-mechanism-c7300119a37a
https://medium.com/yarden-shafir/yes-more-callbacks-the-kernel-extension-mechanism-c7300119a37a
Medium
Yes, More Callbacks — The Kernel Extension Mechanism
Recently I had to write a kernel-mode driver. This has made a lot of people very angry and been widely regarded as a bad move. (Douglas…
A Review of my Bug Hunting Journey - My Learning Journey
https://kongwenbin.com/a-review-of-my-bug-hunting-journey/
https://kongwenbin.com/a-review-of-my-bug-hunting-journey/
My Learning Journey
A Review of my Bug Hunting Journey
A review of my bug hunting journey so far, from when I started, to the point where I made it into the Top 200 bug hunters on Bugcrowd after two years.
Sputnik — An Open Source Intelligence Browser Extension
https://medium.com/bugbountywriteup/sputnik-an-open-source-intelligence-browser-extension-da2f2c22c8ec
https://medium.com/bugbountywriteup/sputnik-an-open-source-intelligence-browser-extension-da2f2c22c8ec
Medium
Sputnik — An Open Source Intelligence Browser Extension
Summary
Bash Cookbook for Everyone — Part 1 – ehsahil – Medium
https://medium.com/ehsahil/bash-cookbook-for-everyone-part-1-cc98251e2887
https://medium.com/ehsahil/bash-cookbook-for-everyone-part-1-cc98251e2887
Medium
Bash for Everyone — Part 1
Hi Guys,
Bash Cookbook for Everyone — Part 2 – ehsahil – Medium
https://medium.com/ehsahil/bash-cookbook-for-everyone-part-2-b70d40610025
https://medium.com/ehsahil/bash-cookbook-for-everyone-part-2-b70d40610025
Medium
Bash for Everyone — Part 2
Part-1
Phishing NG. Bypassing 2FA with Modlishka. – duszynski.eu – Piotr Duszyński Personal Blog
https://blog.duszynski.eu/phishing-ng-bypassing-2fa-with-modlishka/
https://blog.duszynski.eu/phishing-ng-bypassing-2fa-with-modlishka/
blog.duszynski.eu
Phishing NG. Bypassing 2FA with Modlishka.
This blog post is an introduction to the reverse proxy “Modlishka” tool, that I have just released.
I hope that this software will reinforce the fact that social engineering is a serious threat, and cannot be treated lightly.
I hope that this software will reinforce the fact that social engineering is a serious threat, and cannot be treated lightly.
Turning the frustration of a mobile game into a reverse engineering training
https://medium.com/@xplodwild/turning-the-frustration-of-a-mobile-game-into-a-reverse-engineering-training-a9887043efdf
https://medium.com/@xplodwild/turning-the-frustration-of-a-mobile-game-into-a-reverse-engineering-training-a9887043efdf
Medium
Turning the frustration of a mobile game into a reverse engineering training
Games can be as fun as frustrating, when bugs ruin the fun for half of the player base, and the dev doesn’t care. So, I fixed it myself.
600 free online courses you can take from universities worldwide — Quartz
https://qz.com/1437623/600-free-online-courses-you-can-take-from-universities-worldwide/
https://qz.com/1437623/600-free-online-courses-you-can-take-from-universities-worldwide/
Quartz
190 universities just launched 600 free online courses. Here’s the full list.
If you haven’t heard, universities around the world are offering their courses online for free (or at least partially free). These courses are collectively called MOOCs or Massive Open Online Courses.
GitHub - yeyintminthuhtut/Awesome-Red-Teaming: List of Awesome Red Teaming Resources
https://github.com/yeyintminthuhtut/Awesome-Red-Teaming
https://github.com/yeyintminthuhtut/Awesome-Red-Teaming
GitHub
GitHub - yeyintminthuhtut/Awesome-Red-Teaming: List of Awesome Red Teaming Resources
List of Awesome Red Teaming Resources. Contribute to yeyintminthuhtut/Awesome-Red-Teaming development by creating an account on GitHub.
The how to get the OSCP certification wiki by Peerlyst - peerlyst wiki, CEH, OSWP
https://www.peerlyst.com/posts/the-how-to-get-the-oscp-certification-wiki-peerlyst
https://www.peerlyst.com/posts/the-how-to-get-the-oscp-certification-wiki-peerlyst
GitHub - pentesteracademy/patoolkit: PA Toolkit is a collection of traffic analysis plugins focused on security
https://github.com/pentesteracademy/patoolkit
https://github.com/pentesteracademy/patoolkit
GitHub
GitHub - pentesteracademy/patoolkit: PA Toolkit is a collection of traffic analysis plugins focused on security
PA Toolkit is a collection of traffic analysis plugins focused on security - pentesteracademy/patoolkit