An Hour with Ghidra : The Good and The Ugly
http://blog.fadyothman.com/an-hour-with-ghidra-the-good-and-the-ugly/
http://blog.fadyothman.com/an-hour-with-ghidra-the-good-and-the-ugly/
Fady's Technical Blog
An Hour with Ghidra : The Good and The Ugly
So, the NSA decided to release their reverse engineering tool named Ghidra, I
did have some time to play with it, and to be honest I was really impressed it's
an awesome tool, however there are some problems that I encountered when using
the tool.
The Good…
did have some time to play with it, and to be honest I was really impressed it's
an awesome tool, however there are some problems that I encountered when using
the tool.
The Good…
Server Side Request Forgery SSRF Types And Ways To Exploit It:-
Part 1:-
https://t.co/Iv2NkSLDYB
Part 2:-
https://t.co/p7rVZYCZkL
Part 1:-
https://t.co/Iv2NkSLDYB
Part 2:-
https://t.co/p7rVZYCZkL
HackersOnlineClub
Server Side Request Forgery SSRF Types And Ways To Exploit it (Part-1) - HackersOnlineClub
In this tutorial we will learn about SSRF and its Types. What is Server Side Request Forgery (SSRF)? Server Side Request Forgery (SSRF) refers...
Released a short introductory/quickstart tutorial for Ghidra: Solving a simple crackme. https://t.co/1cRlJi1i21
YouTube
Ghidra quickstart & tutorial: Solving a simple crackme
In this introduction to Ghidra we will solve a simple crackme - without reading any assembly! Twitter: https://twitter.com/ghidraninja Links from the video: ...
NMAP Tips: RTFM?
https://blog.zsec.uk/nmap-rtfm/
https://blog.zsec.uk/nmap-rtfm/
ZephrSec - Adventures In Information Security
NMAP Tips: RTFM?
NMAP TL;DR
It's a tool used for portscanning and this post will explore some of the common
and useful flags that can be used while scanning to pick up usful information
about targets.
What Is NMAP?
Nmap or Network mapper is an open source tool for network…
It's a tool used for portscanning and this post will explore some of the common
and useful flags that can be used while scanning to pick up usful information
about targets.
What Is NMAP?
Nmap or Network mapper is an open source tool for network…
Extracting Android KeyStores from apps – ceres-c
http://ceres-c.it/frida-android-keystore/
http://ceres-c.it/frida-android-keystore/
How to steal NTLMv2 hashes using file download vulnerability in web application | Start With Linux | Mannu Linux
http://www.mannulinux.org/2018/12/how-to-steal-ntlmv2-hashes-using-file.html?m=1
http://www.mannulinux.org/2018/12/how-to-steal-ntlmv2-hashes-using-file.html?m=1
www.mannulinux.org
How to steal NTLMv2 hashes using file download vulnerability in web application
Learn Basic Concepts of Linux. Best site to learn Linux from beginner to Advanced.
awesome-windows-kernel-security-development/README.md at master · ExpLife0011/awesome-windows-kernel-security-development · GitHub
https://github.com/ExpLife0011/awesome-windows-kernel-security-development/blob/master/README.md
https://github.com/ExpLife0011/awesome-windows-kernel-security-development/blob/master/README.md
GitHub
awesome-windows-kernel-security-development/README.md at master · ExpLife0011/awesome-windows-kernel-security-development
windows kernel security development. Contribute to ExpLife0011/awesome-windows-kernel-security-development development by creating an account on GitHub.
GitHub - skelsec/pypykatz_agent_dn: Pypykatz agent implemented in .NET
https://github.com/skelsec/pypykatz_agent_dn
https://github.com/skelsec/pypykatz_agent_dn
GitHub
skelsec/pypykatz_agent_dn
Pypykatz agent implemented in .NET. Contribute to skelsec/pypykatz_agent_dn development by creating an account on GitHub.
A small game that helps improve your XSS skills! It dynamically generates (increasingly more difficult) levels for you to exploit XSS vulnerabilities. No level is the same. https://t.co/bch4wIOAO4
Python for Reverse Engineering #1: ELF Binaries - DEV Community 👩💻👨💻
https://dev.to/icyphox/python-for-reverse-engineering-1-elf-binaries-1fo4
https://dev.to/icyphox/python-for-reverse-engineering-1-elf-binaries-1fo4
DEV Community
Python for Reverse Engineering #1: ELF Binaries
That’s radare2. No, our scripts don’t look anything like this :(
Buil...
Buil...
Windows DHCP Client RCE
https://labs.mwrinfosecurity.com/advisories/windows-dhcp-client/
https://labs.mwrinfosecurity.com/advisories/windows-dhcp-client/
[Research] Java Serialization Objects (JSO): An Exploitation Guide | Rapid7
https://www.rapid7.com/research/report/exploiting-jsos/
https://www.rapid7.com/research/report/exploiting-jsos/
Rapid7
Rapid7 Labs - Trusted Cybersecurity Research
Port Forwarding in Windows | Windows OS Hub
http://woshub.com/port-forwarding-in-windows/
http://woshub.com/port-forwarding-in-windows/
Windows OS Hub
Configuring Port Forwarding in Windows | Windows OS Hub
You can configure network port forwarding in all Windows versions without using third-party tools. Using a port forwarding rule, you can redirect an incoming TCP connection (IPv4 or IPv6) from…
GitHub - Critical-Start/pastebin_scraper
https://github.com/Critical-Start/pastebin_scraper
https://github.com/Critical-Start/pastebin_scraper
sirdarckcat: [🌐💧💥] HTTP Cache Cross-Site Leaks
http://sirdarckcat.blogspot.com/2019/03/http-cache-cross-site-leaks.html?m=1
http://sirdarckcat.blogspot.com/2019/03/http-cache-cross-site-leaks.html?m=1
Blogspot
[🌐💧💥] HTTP Cache Cross-Site Leaks
In this blog post I want to talk about a cool type of attacks ( XSLeaks ) that are cooler than what most developers and security researchers...
Fuzzilli, JavaScript engine fuzzer, is now open source: https://t.co/2noeJIATVf
GitHub
googleprojectzero/fuzzilli
A JavaScript Engine Fuzzer. Contribute to googleprojectzero/fuzzilli development by creating an account on GitHub.
Authenticated Arbitrary Command Execution on PostgreSQL 9.3 > Latest
https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5
https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5
Medium
Authenticated Arbitrary Command Execution on PostgreSQL 9.3 > Latest
PostgreSQL from 9.3 to latest has functionality allowing the database superuser & users in the ‘pg_read_server_files’ to execute OS…
A macOS, post-exploit, red teaming framework built with python3 and JavaScript. It's designed to provide a collaborative and user friendly interface for operators, managers, and reporting throughout mac and linux based red teaming. https://github.com/its-a-feature/Apfell
GitHub
GitHub - its-a-feature/Mythic: A collaborative, multi-platform, red teaming framework
A collaborative, multi-platform, red teaming framework - its-a-feature/Mythic