https://www.nytimes.com/2018/09/09/world/europe/sergei-skripal-russian-spy-poisoning.html
#Skripal_case
#Spy_stories
#Skripal_case
#Spy_stories
NY Times
A Spy Story: Sergei Skripal Was a Little Fish. He Had a Big Enemy. (Published 2018)
Sergei Skripal and Vladimir Putin, Soviet men of the same age, were raised to wage war against the West. After the Soviet Union collapsed, one rose. And one fell.
Penetration Testing/Security Cheatsheets a huge list.
https://raw.githubusercontent.com/n00py/ReadingList/master/gunsafe.txt
#pentest
@sec_nerd_en
https://raw.githubusercontent.com/n00py/ReadingList/master/gunsafe.txt
#pentest
@sec_nerd_en
Use PowerShell to Find the History of USB Flash Drive Usage
https://blogs.technet.microsoft.com/heyscriptingguy/2012/05/18/use-powershell-to-find-the-history-of-usb-flash-drive-usage/
#windows
#ps
#enum
@sec_nerd_en
https://blogs.technet.microsoft.com/heyscriptingguy/2012/05/18/use-powershell-to-find-the-history-of-usb-flash-drive-usage/
#windows
#ps
#enum
@sec_nerd_en
Droidefense Engine
Advance Android Malware Analysis Framework
https://github.com/droidefense/engine
#android
#malware
@sec_nerd_en
Advance Android Malware Analysis Framework
https://github.com/droidefense/engine
#android
#malware
@sec_nerd_en
How does a #Bitcoin Transaction work? {Infographic}
#blockchain #fintech #BTC #CyberSecurity #DLT #innovation #cryptocurrency #infosec #disruption #Security #Crypto
@sec_nerd_en
#blockchain #fintech #BTC #CyberSecurity #DLT #innovation #cryptocurrency #infosec #disruption #Security #Crypto
@sec_nerd_en
https://www.malwaretech.com/2015/01/inline-hooking-for-programmers-part-2.html
#Windows_API_Hooking
#Malware
#PoC
#Windows_API_Hooking
#Malware
#PoC
Malwaretech
Inline Hooking for Programmers (Part 2: Writing a Hooking Engine)
We’ll be writing a hooking engine using trampoline based hooks as explained in the previous article (we don’t handle relative instructions as they’re very rare, but we do use atomic write operations to prevent race conditions).
First things first, we need…
First things first, we need…
IoT Pentesting 101 && IoT security 101
https://github.com/V33RU/IoTSecurity101
#iot
#pentest
#security
@sec_nerd_en
https://github.com/V33RU/IoTSecurity101
#iot
#pentest
#security
@sec_nerd_en
GitHub
GitHub - V33RU/awesome-connected-things-sec: A Curated list of Security Resources for all connected things
A Curated list of Security Resources for all connected things - V33RU/awesome-connected-things-sec
Poison Ivy Group and the Cyberespionage Campaign Against Chinese Military and Goverment
http://blogs.360.cn/post/APT_C_01_en.html
#apt
#china
@sec_nerd_en
http://blogs.360.cn/post/APT_C_01_en.html
#apt
#china
@sec_nerd_en
blogs.360.net
Poison Ivy Group and the Cyberespionage Campaign Against Chinese Military and Goverment
分享奇虎360公司的技术,与安全的互联网共同成长。
CVE-2018-4280: Mach port replacement vulnerability in launchd on iOS 11.2.6 leading to sandbox escape, privilege escalation, and codesigning bypass.
https://github.com/bazad/blanket
#ios
@sec_nerd_en
https://github.com/bazad/blanket
#ios
@sec_nerd_en
GitHub
GitHub - bazad/blanket: CVE-2018-4280: Mach port replacement vulnerability in launchd on iOS 11.2.6 leading to sandbox escape,…
CVE-2018-4280: Mach port replacement vulnerability in launchd on iOS 11.2.6 leading to sandbox escape, privilege escalation, and codesigning bypass. - bazad/blanket