A suite of tools to disrupt campaigns using the Sliver C2 framework.
https://github.com/ACE-Responder/RogueSliver
https://github.com/ACE-Responder/RogueSliver
GitHub
GitHub - ACE-Responder/RogueSliver: A suite of tools to disrupt campaigns using the Sliver C2 framework.
A suite of tools to disrupt campaigns using the Sliver C2 framework. - ACE-Responder/RogueSliver
curated list of known malicious bootloaders for various operating systems. The project aims to assist security professionals in staying informed and mitigating potential threats associated with bootloaders.
https://www.bootloaders.io/
https://www.bootloaders.io/
Visualizing Qakbot Infrastructure Part II: Uncharted Territory
A Data-Driven Approach Based on Analysis of Network Telemetry
https://www.team-cymru.com/post/visualizing-qakbot-infrastructure-part-ii-uncharted-territory
A Data-Driven Approach Based on Analysis of Network Telemetry
https://www.team-cymru.com/post/visualizing-qakbot-infrastructure-part-ii-uncharted-territory
Team-Cymru
Visualizing Qakbot Infrastructure: Network Telemetry | Team Cymru
Explore Qakbot’s evolving C2 infrastructure through NetFlow analysis, revealing new servers, port trends, and insights into upstream communication layers.
PoCs for my Pwn2Own 2023 Miami entry as well as the other bugs that I found and reported to ZDI after the contest.
https://github.com/0vercl0k/pwn2own2023-miami
https://github.com/0vercl0k/pwn2own2023-miami
GitHub
GitHub - 0vercl0k/pwn2own2023-miami: Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting…
Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category. - 0vercl0k/pwn2own2023-miami
How a simple K-TypeConfusion took me 3 months long to create a exploit? [HEVD] - Windows 11 (build 22621)
https://wafzsucks.medium.com/how-a-simple-k-typeconfusion-took-me-3-months-long-to-create-a-exploit-f643c94d445f
https://wafzsucks.medium.com/how-a-simple-k-typeconfusion-took-me-3-months-long-to-create-a-exploit-f643c94d445f
Medium
How a simple K-TypeConfusion took me 3 months long to create a exploit?
Have you ever tested something for a really long time, that it made part of your life? that’s what happen to me for the last months when a…
Yet Another Memory Analyzer for malware detection
https://github.com/JPCERTCC/YAMA
https://blogs.jpcert.or.jp/en/2023/08/yama.html
https://github.com/JPCERTCC/YAMA
https://blogs.jpcert.or.jp/en/2023/08/yama.html
GitHub
GitHub - JPCERTCC/YAMA: Yet Another Memory Analyzer for malware detection
Yet Another Memory Analyzer for malware detection. Contribute to JPCERTCC/YAMA development by creating an account on GitHub.
Fake Blockchain Games Deliver RedLine Stealer & Realst Stealer - A New macOS Infostealer Malware
https://iamdeadlyz.gitbook.io/malware-research/july-2023/fake-blockchain-games-deliver-redline-stealer-and-realst-stealer-a-new-macos-infostealer-malware
https://iamdeadlyz.gitbook.io/malware-research/july-2023/fake-blockchain-games-deliver-redline-stealer-and-realst-stealer-a-new-macos-infostealer-malware
Close Encounters of the Advanced Persistent Kind: Leveraging Rootkits for Post-Exploitation
красивая презентация, бля умеют же люди
https://github.com/FuzzySecurity/BHUSA-2023
красивая презентация, бля умеют же люди
https://github.com/FuzzySecurity/BHUSA-2023
GitHub
GitHub - FuzzySecurity/BHUSA-2023
Contribute to FuzzySecurity/BHUSA-2023 development by creating an account on GitHub.