How to Use Static Type Checking in Python 3.6 – Adam Geitgey – Medium
RT : RT : Using static type checking in Python 3.6 to find bugs before they find you:
from twitter
yesterday
1282 - MsMpEng: mpengine x86 Emulator Heap Corruption in VFS API - project-zero - Monorail
RT : I wrote a fuzzer for the unsandboxed x86 emulator in Windows Defender and found arbitrary read/write.
from twitter
yesterday
(429) https://twitter.com/i/web/status/877975650476462080
RT : Improving code maturity by introducing fuzzing with 's popular "afl" fuzzer as part of QA. More to come...…
from twitter
yesterday
4n6ir: Fileless Application Whitelist Bypass and Powershell Obfuscation
RT : Fileless Application Whitelist Bypass and Powershell Obfuscation. Maybe I can fit more buzzwords?
dfir  infosec  from twitter
3 days ago
Untitled (http://unprotect.tdgt.org/images/2/23/Sandbox-Cheatsheet-1.1.pdf)
RT : Tweak your sandbox to make it harder for malware to detect that it's being analyzed - Cheat sheet PDF by :
from twitter
3 days ago
Twitter
RT : Pyrasite: A Tool For Injecting Arbitrary Code Into Running Python Processes..

infosec  from twitter
4 days ago
Analysis of the Shadow Brokers release and mitigation with Windows 10 virtualization-based security – Windows Security
RT : New blog from MSFT offensive security research. Windows 10 Kernel mitigations vs recent kernel exploits
from twitter
5 days ago
CTFs · GitHub
Collection of CTF write-ups repositories
from twitter
5 days ago
Twitter
RT : Comparing features and performance of , , and with BucketBench from
OSCON  from twitter
5 days ago
Twitter
Fav if you remember how those two go together:
from twitter_favs
5 days ago
Twitter
So displaying the badge of honor, "Not A CISSP" is a trademark violation?
from twitter_favs
6 days ago
Release 1.4.0 · Siguza/ios-kern-utils · GitHub
Fucking FINALLY! kern-utils 1.4.0 is done. Full iOS 9+10 support and kpatch can now do arbitrary patching.
from twitter_favs
6 days ago
Twitter
RT : You should check and the CIS Docker Security benchmark. They have a ton of rec…
from twitter
7 days ago
Peerlyst
A huge list of Windows log file Event IDs for detecting lateral movement - tools, attackers, logs
DFIR  from twitter_favs
8 days ago
Twitter
RT : The materials for the workshop I did at 44con are in my GitHub.
from twitter
8 days ago
(500) https://stardustjs.github.io/
Stardust: GPU-Based Visualization Library ()
from twitter_favs
8 days ago
Rebex SSH Check
SSH crypto auditing tool

— x0rz (x0rz) June 15, 2017
from twitter_favs
10 days ago
Twitter
SSH crypto auditing tool

— x0rz (x0rz) June 15, 2017
from twitter_favs
10 days ago
Hunting In Memory | Endgame
RT : Overview of all the in-memory only code execution techniques for Windows
windows  malware  DFIR  from twitter
11 days ago
Twitter
RT : MacSpy : First Malware as a Service for OSX :
from twitter
12 days ago
Twitter
Jun-13,2017(JST). MalSpam attached ZIP file -> zip -> wsf. Infected .
ransomware  Jaff  from twitter_favs
12 days ago
PSKernel-Primitives/Ntoskrnl-ROP-Dumps at master · FuzzySecurity/PSKernel-Primitives · GitHub
RT : I added Ntoskrnl ROP dumps for various versions of Windows to the PSKernel-Primitives repo =>
from twitter
14 days ago
Twitter
RT : Deep Learning without Backpropagation, a Tutorial on DeepMind's Synthetic Gradients by
from twitter
14 days ago
PracticalPentestLabs.com boxes writeups - Tutorials - 0x00sec
RT : writeups for boxes inside that PracticalPentestLabs vulnerable network
from twitter
14 days ago
Twitter
A viewer in Hugo sent this absolute stunner of the clouds moments before hail started falling. | GALLERY:…
mnwx  from twitter_favs
14 days ago
Twitter
RT : Slides of our Presentation: 'Next Gen Office Malware v2.0' By & Myself Are Now Available:…
from twitter
14 days ago
(500) https://pentest.xn--blohttps:-7e0e//t.co/hoy6zhnKp0
(interesting) Unexpected Journey – From weak password to RCE on Symantec Messaging Gateway --
from twitter_favs
15 days ago
Twitter
welcome to my "Books i really want to read"-pile
from twitter_favs
15 days ago
Twitter
RT : Node.fz: fuzzing the server-side event-driven architecture
fuzzing  from twitter
16 days ago
(500) https://www.blackhillsinfosec.com/?p=5966
RT : New PowerShell tool NetworkRecon for finding network-level vulns by -
pentest  from twitter
17 days ago
Twitter
RT : New PowerShell tool NetworkRecon for finding network-level vulns by -
pentest  from twitter
17 days ago
Twitter
RT : - finding SMM bugs using symbolic execution, fuzzing, and Simics virtual platforms. C…
UEFI  from twitter
18 days ago
Finding BIOS Vulnerabilities with Symbolic Execution and Virtual Platforms | Intel® Software
RT : - finding SMM bugs using symbolic execution, fuzzing, and Simics virtual platforms. C…
UEFI  from twitter
18 days ago
GitHub - airbus-seclab/cpu_rec: Recognize cpu instructions in an arbitrary binary file
RT : "cpu_rec is a tool that recognizes cpu instructions in an arbitrary binary file", standalone or as binwalk plugin
from twitter
19 days ago
GitHub - nelhage/reptyr: Reparent a running program to a new terminal
RT : if you're up for weekend command-line tinkering, try 's `reptyr` to move an existing process to tmux/screen:
from twitter
19 days ago
GitHub - joxeankoret/CVE-2017-7494: Remote root exploit for the SAMBA CVE-2017-7494 vulnerability
I have written a remote root exploit for CVE-2017-7494, the is_known_pipename Samba's bug.
from twitter_favs
20 days ago
Twitter
for those who'd prefer to synchronize NETWORK trace and CPU trace, we should also meet during :)
from twitter_favs
20 days ago
Twitter
RT : An Inside Look at CVE-2017-0199 – HTA and Scriptlet File Handler Vulnerability
CyberCrime  from twitter
20 days ago
« earlier      
#blog #fr #hacking #homepage #js #security 00 01 02 03 05 06 0day 159460 2009 31c3 32c3 44con academic activedirectory adfsl ai alabama analysis androguard android anonym8 anonymous antisandbox antisec apple apps appsec architecture arm arp arpy art ashley aslr asm audit auditingtool awesome aws b2b backdoor backdoors backtrack backup bash belgrade beroot bheu bhusa bigdata binwalk birmingham bitlocker bittorrent blackhat blackhateu blackhole blind_sqli blog blogpost blueteam bluetooth bm book books boot boot2root bootkit bro_ids browser browsers brucon bruteforce bruteforcer bsideschallenge bsideslisbon bsideslondon bugbounty burp bypass campc canvas capstone capstoneinside captcha capture centos charliehebdo chart cheatsheet checkitout checklist chisel chrome cisco ciscotalos civ climber cloud cms cocoa code codebits codebits2011 codetainer coding colorado comedy comic conf confoo connections crack crackme crawler cronjob crossplatformdisassembler crosssitescripting crowbar crypto cryptohaven cryptoparty cryptowall csp csrf css ctf cuckoo curiosity cyber cyber_warfare cybercrime cybersecurity dahboo7 dailywtf data dataexfiltrationtoolkit datascience db dbgkit dc4420 deal deals debugger debugging decompiler deeplearning defcon defense derbycon design det detection dev devel devops dfir dfirsummit dfrws dirtycow disassembler discover diy dl dll dns doc docker dockersecurity dominator dos dropbox duqu earth eclipse elasticsearch electronics elf elixirlang emacs emet empire encryption equationgroup erlang escalating ettercap event exploit exploitation exploitkit fail fb firefox flame forensic forensics foss fr framework free freebsd fridayreads fun funny future fuzzer fuzzing game gamedev games gaming gdb geek geographyofpoverty git github gnome gnu golang google googleplay graph graphs grrcon gtd gui hack hack2learn hacker hackerone hackers hackersonlineclub hacking hackingteam hacklu hackpra hardening hardware hash hashcat heartbleed hitb2016ams hitb2017ams hitbgsec homepage honeypot howto html html5 https humor hunter icloud icon icons ida ids ie ie6 ie9 infosec infrastructure injection ioc ios iphone ipv6 ipython iso it italy itsec j2ee j2eescan jaff java javaone javascript jesuischarlie jobs jquery js jsrat jvm kali kalilinux katoolin kekeo kernel keylogger kibana lab learn leopard lfi libsigrokdecode links linux live locky lowpower lynis mac macbook machinelearning macos macosx mail maltego malware malwareanalysis malwaremustdie manager manual map math mbr metasploit microsoft mimikatz mitm mobile model modeling money monitoring moon movies movp mq msf mysql nasa neo4j netbook netsec network networking neutrinobot news nginx nginxday nmap nodejs noriben notsosecure nsa nsm ntp numpy ohm2013 oldschool oldschoolbackdoors oleoutlook ollydbg opensource openssl oprahssl oracle os oss osx owasp pacsec pandas paper password patch pdf pe penetrationtest pentest pentesters pentesting pentestlab perceptual persistence personal pestudio pgp phishing php pki plot poc poc2014 portable portugal postgresql powershell privacy privilegeescalation processexplorer productivity programming proxy pshitt pwn2own python qt quotes ransomware raspberrypi raspberrypi2 rce re realtime recipes recon14 reconmtl regex rehints rekall remcos remwa repy2exe retrogaming reverse reverse_engineering reverseengineering reversing rkt rodeoide root rop ror rowhammer ruby ructfe samba sandbox sans sanspentestblog scada scanner screencast screencasts sdo search sec14 security securitymanager seo serbia shadowbrokers shellcode shellcoding shellter slides sniffer snippet snmp snowleopard social software source sp17 space splunk sqli sqlilab sqlinjection ss7map ssh ssl starttls startups stat stats stuxnet sun suricata svg sync sysadmin syslog tbt tech terminal testbed thn threat threathunting tip tips tool tools toolswatch tor tr16 tricks trojan truestory tutorial tv tweak ubuntu ue4 uefi ui unix url usa usb usenix vault7 video videos vietnam virginia virtualization viz vm voip volatility vpn vulnerability vulnhub waf wearables web web-dev web2py webapp webdev websec websecurity webvulscan wii wikileaks win windbg windows windows8 wordpress worldphotographyday wpa wpscan writeup wxpython x64dbg xslt xss xxe yara zeronighs zeronights

Copy this bookmark:



description:


tags: