#Heap #exploitation Intro Series: Used and Abused -> UaF (#Linux)
https://sensepost.com/blog/2017/linux-heap-exploitation-intro-series-used-and-abused-use-after-free/
@sec_nerd_en
  
  https://sensepost.com/blog/2017/linux-heap-exploitation-intro-series-used-and-abused-use-after-free/
@sec_nerd_en
Sensepost
  
  SensePost |   Linux heap exploitation intro series: used and abused – use after free
  Leaders in Information Security
  RemoteRecon
RemoteRecon provides the ability to execute post-exploitation capabilities against a remote host, without having to expose your complete toolkit/agent.
https://github.com/xorrior/Remo
  RemoteRecon provides the ability to execute post-exploitation capabilities against a remote host, without having to expose your complete toolkit/agent.
https://github.com/xorrior/Remo
EDM proxy for infecting files on-the-fly
Offensive Proxy server
POC for infecting PE files, ZIP files, Office documents on the fly during a HTTP MitM.
https://github.com/LeonardoNve/edm
#wtf
#mitm
#windows
@sec_nerd_en
  
  Offensive Proxy server
POC for infecting PE files, ZIP files, Office documents on the fly during a HTTP MitM.
https://github.com/LeonardoNve/edm
#wtf
#mitm
#windows
@sec_nerd_en
GitHub
  
  LeonardoNve/edm
  Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2 - LeonardoNve/edm
  https://www.nytimes.com/2018/09/09/world/europe/sergei-skripal-russian-spy-poisoning.html
#Skripal_case
#Spy_stories
  
  #Skripal_case
#Spy_stories
NY Times
  
  A Spy Story: Sergei Skripal Was a Little Fish. He Had a Big Enemy. (Published 2018)
  Sergei Skripal and Vladimir Putin, Soviet men of the same age, were raised to wage war against the West. After the Soviet Union collapsed, one rose. And one fell.
  Penetration Testing/Security Cheatsheets a huge list.
https://raw.githubusercontent.com/n00py/ReadingList/master/gunsafe.txt
#pentest
@sec_nerd_en
  https://raw.githubusercontent.com/n00py/ReadingList/master/gunsafe.txt
#pentest
@sec_nerd_en
Use PowerShell to Find the History of USB Flash Drive Usage
https://blogs.technet.microsoft.com/heyscriptingguy/2012/05/18/use-powershell-to-find-the-history-of-usb-flash-drive-usage/
#windows
#ps
#enum
@sec_nerd_en
  https://blogs.technet.microsoft.com/heyscriptingguy/2012/05/18/use-powershell-to-find-the-history-of-usb-flash-drive-usage/
#windows
#ps
#enum
@sec_nerd_en
Droidefense Engine
Advance Android Malware Analysis Framework
https://github.com/droidefense/engine
#android
#malware
@sec_nerd_en
  Advance Android Malware Analysis Framework
https://github.com/droidefense/engine
#android
#malware
@sec_nerd_en
How does a #Bitcoin Transaction work? {Infographic}
#blockchain #fintech #BTC #CyberSecurity #DLT #innovation #cryptocurrency #infosec #disruption #Security #Crypto
@sec_nerd_en
  #blockchain #fintech #BTC #CyberSecurity #DLT #innovation #cryptocurrency #infosec #disruption #Security #Crypto
@sec_nerd_en
https://www.malwaretech.com/2015/01/inline-hooking-for-programmers-part-2.html
#Windows_API_Hooking
#Malware
#PoC
  
  #Windows_API_Hooking
#Malware
#PoC
Malwaretech
  
  Inline Hooking for Programmers (Part 2: Writing a Hooking Engine)
  We’ll be writing a hooking engine using trampoline based hooks as explained in the previous article (we don’t handle relative instructions as they’re very rare, but we do use atomic write operations to prevent race conditions).
First things first, we need…
  First things first, we need…
IoT Pentesting 101 && IoT security 101
https://github.com/V33RU/IoTSecurity101
#iot
#pentest
#security
@sec_nerd_en
  
  https://github.com/V33RU/IoTSecurity101
#iot
#pentest
#security
@sec_nerd_en
GitHub
  
  GitHub - V33RU/awesome-connected-things-sec: A Curated list of Security Resources for all connected things
  A Curated list of Security Resources for all connected things - V33RU/awesome-connected-things-sec