Fake Blockchain Games Deliver RedLine Stealer & Realst Stealer - A New macOS Infostealer Malware
https://iamdeadlyz.gitbook.io/malware-research/july-2023/fake-blockchain-games-deliver-redline-stealer-and-realst-stealer-a-new-macos-infostealer-malware
https://iamdeadlyz.gitbook.io/malware-research/july-2023/fake-blockchain-games-deliver-redline-stealer-and-realst-stealer-a-new-macos-infostealer-malware
Close Encounters of the Advanced Persistent Kind: Leveraging Rootkits for Post-Exploitation
красивая презентация, бля умеют же люди
https://github.com/FuzzySecurity/BHUSA-2023
красивая презентация, бля умеют же люди
https://github.com/FuzzySecurity/BHUSA-2023
GitHub
GitHub - FuzzySecurity/BHUSA-2023
Contribute to FuzzySecurity/BHUSA-2023 development by creating an account on GitHub.
Vulnerabilities in Sogou Keyboard encryption expose keypresses to network eavesdropping
https://citizenlab.ca/2023/08/vulnerabilities-in-sogou-keyboard-encryption/
https://citizenlab.ca/2023/08/vulnerabilities-in-sogou-keyboard-encryption/
The Citizen Lab
“Please do not make it public”
In this report, we analyze the Windows, Android, and iOS versions of Tencent’s Sogou Input Method, the most popular Chinese-language input method in China. Our analysis found serious vulnerabilities in the app’s custom encryption system and how it encrypts…
JTAG 'Hacking' the Original Xbox in 2023
https://blog.ret2.io/2023/08/09/jtag-hacking-the-original-xbox-2023/
https://blog.ret2.io/2023/08/09/jtag-hacking-the-original-xbox-2023/
RET2 Systems Blog
JTAG 'Hacking' the Original Xbox in 2023
Released in November 2001, the original Xbox was Microsoft’s first venture into the game console industry. With its hardware closely resembling a cheap but v...
Diving into Windows Remote Access Service for Pre-Auth Bugs
https://i.blackhat.com/BH-US-23/Presentations/US-23-YukiChen-Diving-into-Windows-Remote-Access.pdf
https://i.blackhat.com/BH-US-23/Presentations/US-23-YukiChen-Diving-into-Windows-Remote-Access.pdf
small introduction to using Unsafe in C#
https://knifecoat.com/Posts/Feeling+Unsafe%2C+going+past+managed+.NET
https://knifecoat.com/Posts/Feeling+Unsafe%2C+going+past+managed+.NET
KnifeCoat
Feeling Unsafe, going past managed .NET - KnifeCoat
Technical Analysis of Multi-layered Obfuscation Techniques in AndroidManifest.xml Aimed at Evading Static Analysis
https://www.liansecurity.com/#/main/news/H_NoQIoBE2npFSfF-iQ5/detail
Unmasking – EVLF DEV-The Creator of CypherRAT and CraxsRAT
https://www.cyfirma.com/outofband/unmasking-evlf-dev-the-creator-of-cypherrat-and-craxsrat/
https://www.liansecurity.com/#/main/news/H_NoQIoBE2npFSfF-iQ5/detail
Unmasking – EVLF DEV-The Creator of CypherRAT and CraxsRAT
https://www.cyfirma.com/outofband/unmasking-evlf-dev-the-creator-of-cypherrat-and-craxsrat/
GIF Steganography from First Principles
https://dtm.uk/gif-steganography/
https://github.com/dtmsecurity/gift
https://dtm.uk/gif-steganography/
https://github.com/dtmsecurity/gift
@dtmsecurity
GIF Steganography from First Principles
Inspiration
Adam's blog on PNG steganography inspired me to start a project in a similar vein but focused on GIF files instead. Although I have previously written several .NET-based steganography tools previously, I have typically relied on existing libraries…
Adam's blog on PNG steganography inspired me to start a project in a similar vein but focused on GIF files instead. Although I have previously written several .NET-based steganography tools previously, I have typically relied on existing libraries…