exploit   3222

« earlier    

KeyChest - Profile
The ROCA vulnerability has been discovered by researchers at Masaryk University (Brno, Czech Republic). As two of the researchers are also affiliated with Enigma Bridge we subsequently integrated a ROCA detection tool within this test suite. It allows users of affected products to verify security of their encryption keys.
cryptography  key  security  check  exploit  rsa 
3 days ago by plaxx
Check Infineon-generated RSA keys against ROCA attack
check your RSA keys in a text form, by uploading a keystore in one of the supported types, or by sending an email with a digital signature (S/MIME) or your PGP key to an email responder. 
security  exploit  public  key  cryptography 
4 days ago by dandv
vivisect/vivisect
Fairly un-documented static analysis / emulation / symbolik analysis framework for PE/Elf/Mach-O/Blob binary formats on various architectures.
binary  analysis  reverse-engineering  python  security  exploit  research 
9 days ago by plaxx
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web (PDF)
Abstract—Web developers routinely rely on third-party Java-Script libraries such as jQuery to enhance the functionality of their sites. However, if not properly maintained, such dependen-cies can create attack vectors allowing a site to be compromised.
Javascript  exploit  article  academic  pdf 
15 days ago by aiefel
sensepost/ruler: A tool to abuse Exchange services
Using compromised exchange email credentials to achieve code execution and party
microsoft  exchange  remote  exploit  security  hacking  pentesting  software 
15 days ago by asteroza

« earlier    

related tags

0day  0daytoday  2014  2017  5yrsago  a-2017  abuse  academic  agent  ai  analysis  android  antivirus  apache  app  apple  applocker  arm  arstechnica  article  assembly  attack  automobile  aws  backdoor  binary  blockchain  blog  blueborne  bluetooth  bsd  buffer  bufferoverflow  bug  bypass  c  check  cia  cli  com  community  computing  course  crisis  cryptography  ctf  cyb634  cyberattack  cybersecurity  daemon  data  dde  debugging  deserialize  development  device  disassembler  docker  dragonfly  drive  dvrf  embedded  environment  eternalblue  eternalsynergy  exchange  exploitation  exploits  fail  firmware  foreverday  framework  gadget  gcc  gdb  generator  geteuid  git  glibc  google  hack  hacking  harassment  hard  hayes  heap  heapexploit  hijacking  history  hooking  imagemagick  infineon  infosec  injection  intel  interface  internet  ios  iphone  jailbreak  javascript  kali  kernel  key  keygen  ldpreload  lfi  library  linux  list  loader  lpm  mac  malloc  malware  memory  metasploit  microsoft  mingw  mips  modem  msoffice  netsec  news  nsa  nsfw  overflow  patch  patchguard  path  payload  pdf  pentest  pentesting  phishing  php  pickle  poc  politics  porn  pornography  privacy  privilege-escalation  ptest  public  python  ransomware  red-team  reference  reinstallation  remote  research  revengeporn  reverse-engineering  reverse  rootsecto  rootsector  rop  router  rowhammer  rsa  ruby  safari  sandbox  scanner  security  server-side  shadow_brokers  shared  shell  shellcode  smartbear  software  ssh  stack  struts  surveillance  swift  syscall  table  telnet  telnetd  test  tpm  trick  tutorial  uac  ui  unlock  unserialize  update  ux  variable  vuln  vulnerability  weak  webappsec  whitelist  wifi  windows  wins  wpa2  writeup  x86  yaml 

Copy this bookmark:



description:


tags: