Twitter
RT : Our 2nd AlphaGo paper! Zero learns to master the game of Go 'tabula rasa', entirely from self play…
AlphaGo  from twitter
3 hours ago
Twitter
DorkNet - Selenium Powered Python Script To Automate Searching For Vulnerable Web Apps …
from twitter_favs
13 hours ago
Browser security beyond sandboxing – Windows Security blog
RT : New blog with technical details of Chrome exploitation research from Windows OSR team
from twitter
14 hours ago
GitHub - crocs-muni/roca: ROCA: Infineon RSA vulnerability
RT : Test your SSH server keys for infineon RSA exploit using the github tools & public key, SSH MITM & good times ahead
from twitter
yesterday
Infineon TPM fake buggy key generator · GitHub
Now you can generate your very own seemingly vulnerable Infineon TPM RSA keys (for fun and profit):

— mongo (mong…
from twitter_favs
yesterday
Twitter
A set of exploitation & reversing aids for IDA (Context Viewer, Instuction Emulator, Heap Explorer, Trace Dumper)…
from twitter_favs
yesterday
Twitter
RT : "changing our TLS exchange to 4096-bit for https will add .02s of latency!" your shitty calls to…
from twitter
yesterday
Twitter
When you're trying to remember a password
from twitter_favs
yesterday
Untitled (https://www.youtube.com/watch?v=U8_3lCp1nas)
Enumerating DLLs and Symbols with Cheat Engine to Quickly Reverse Methods in .NET-based Video Games
from twitter_favs
2 days ago
Twitter
ROCA: Vulnerable RSA generation (CVE-2017-15361) : , ROCA Vulnerability Test Suite :…
from twitter_favs
2 days ago
ROCA: Vulnerable RSA generation (CVE-2017-15361) [CRoCS wiki]
ROCA: Vulnerable RSA generation (CVE-2017-15361) : , ROCA Vulnerability Test Suite :…
from twitter_favs
2 days ago
call-for-wpa3/README.md at master · d33tah/call-for-wpa3 · GitHub
What's wrong with WPA2 security and how to fix it - WPA3 Proposal :
from twitter_favs
2 days ago
KRACK Attacks: Breaking WPA2
RT : Key Reinstallation Attacks Breaking WPA2 by Forcing Nonce Reuse ()
from twitter
2 days ago
Twitter
RT : Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys (PDF)
crypto  WiFi  from twitter
3 days ago
GitHub - rexdex/recompiler: Xbox360 -> Windows executable converter
Top story: GitHub - rexdex/recompiler: Xbox360 -> Windows executable converter , see more
from twitter_favs
3 days ago
crackmes.cf
RT : 07-12-2016 mirror of crackmes.de
from twitter
4 days ago
Twitter
RT : NTLM relay attack to Exchange Web Services
from twitter
4 days ago
VUsion - VUSec
RT : Our paper on securing memory deduplication against side-channel and Rowhammer attacks is now online:
SOSP17  from twitter
4 days ago
BSides Lisbon
Initial high level schedule is up. We will fill in the blanks in the upcoming weeks :)
from twitter_favs
4 days ago
Twitter
I used to have friends, now I have DDE documents to examine.
from twitter_favs
4 days ago
GitHub - malwareinfosec/EKFiddle: A framework to study Exploit Kits
A framework based on the Fiddler web debugger to study Exploit Kits, malvertising and malicious traffic in general.
from twitter_favs
4 days ago
Twitter
Looked at a house for sale today, is it weird to be super excited by this? 🤓
from twitter_favs
4 days ago
Twitter
How to use Ansible Variables and Vaults
from twitter_favs
5 days ago
Twitter
just uncovered a fantastic container by start it with "docker run -it --rm jess/hollywo…
throwbackfiriday  from twitter_favs
5 days ago
(429) https://twitter.com/i/web/status/918598525792935936
RT : The well known Excel DDE vector can also be manipulated, here is the formula:
=MSEXCEL|'\..\..\..\Windows\System32\…
from twitter
6 days ago
GitHub - maximkulkin/lollipop-hypothesis: Library to generate random test data using Hypothesis based on Lollipop schema
lollipop-hypothesis: library to generate random test data using Hypothesis based on Lollipop schema
from twitter
6 days ago
Project Zero: Over The Air - Vol. 2, Pt. 3: Exploiting The Wi-Fi Stack on Apple Devices
RT : Project Zero blog: "Over The Air - Vol. 2, Pt. 3: Exploiting The Wi-Fi Stack on Apple Devices" by -
from twitter
6 days ago
A Bug Has No Name: Multiple Heap Buffer Overflows In the Windows DNS Client - Bishop Fox
RT : Details of Multiple Heap-based Buffer Overflow Vulnerabilities In the Windows DNS Client:
from twitter
6 days ago
Twitter
RT : Used Outlook's S/MIME feature in the past 6 months? Your mails were probably not sent encrypted:…
from twitter
7 days ago
Twitter
SANS | Blog

Command Line Kung-Fu: Bash - Encrypted Exfil Channel
by &

Read:…
PenTest  from twitter_favs
7 days ago
GitHub - Microsoft/AirSim: Open source simulator based on Unreal Engine for autonomous vehicles from Microsoft AI & Research
AirSim: Open source simulator based on Unreal Engine for autonomous vehicles from Microsoft AI & Research
from twitter
7 days ago
Twitter
This was a pain to track down, Microsoft forgot to check the return code from win32k!GetWOWClass. Sigh. 😞
from twitter_favs
8 days ago
Twitter
Did I post this a while back?
Injection via AppDomain Managers 😀
Executes b4 the .NET app. Much fun to be had. ;-)…
from twitter_favs
8 days ago
Exploit – Page 42966 – Exploits Database
[webapps] Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution
from twitter_favs
9 days ago
GitHub - nvdv/vprof: Visual profiler for Python
vprof: Visual profiler for Python (memory, CPU and code)
from twitter
9 days ago
Tyranid's Lair: Bypassing SACL Auditing on LSASS
RT : New blog post a lament on the uselessness of the LSASS SACL added in Windows 10 for auditing credential scraping.
from twitter
9 days ago
GitHub - advanced-threat-research/firmware-security-training
Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives -
from twitter_favs
9 days ago
GitHub - google/pyringe: Debugger capable of attaching to and injecting code into python processes.
pyringe: Debugger capable of attaching to and injecting code into python processes.
from twitter
10 days ago
F’Awk Yeah! Advanced sed and awk Usage (Parsing for Pentesters 3)
Advanced sed & awk Usage(Parsing for Pentesters 3): ,Parsing for Pentesters: cc
from twitter_favs
10 days ago
Finding Diamonds in the Rough- Parsing for Pentesters
Advanced sed & awk Usage(Parsing for Pentesters 3): ,Parsing for Pentesters: cc
from twitter_favs
10 days ago
Twitter
RT : BLOG: Kernel Exploitation Case Study - "Wild" Pool Overflow on Win10 x64 RS2 (CVE-2016-3309 Reloaded):…
from twitter
11 days ago
Generic PE Loader For .NET · GitHub
PE Loader for .NET
I needed this to deliver some Kernel Exploit Payloads through MSBuild. ;-)

Rough Draft. works. 😀
from twitter_favs
11 days ago
« earlier      
#blog #fr #hacking #homepage #js #security 00 01 02 03 05 06 0day 159460 2009 31c3 32c3 44con academic activedirectory adfsl ai alabama analysis androguard android anonym8 anonymous antisandbox antisec apple apps appsec architecture arm arp arpy art ashley aslr asm audit auditingtool awesome aws b2b backdoor backdoors backtrack backup bash belgrade beroot bheu bhusa bigdata binwalk birmingham bitlocker bittorrent blackhat blackhateu blackhole blind_sqli blog blogpost blueteam bluetooth bm book books boot boot2root bootkit bro_ids browser browsers brucon bruteforce bruteforcer bsideschallenge bsideslisbon bsideslondon bugbounty burp bypass campc canvas capstone capstoneinside captcha capture centos charliehebdo chart cheatsheet checkitout checklist chisel chrome cisco ciscotalos civ climber cloud cms cocoa code codebits codebits2011 codetainer coding colorado comedy comic conf confoo connections crack crackme crawler cronjob crossplatformdisassembler crosssitescripting crowbar crypto cryptohaven cryptoparty cryptowall csp csrf css ctf cuckoo curiosity cyber cyber_warfare cybercrime cybersecurity dahboo7 dailywtf data dataexfiltrationtoolkit datascience db dbgkit dc4420 deal deals debugger debugging decompiler deeplearning defcon defense derbycon design det detection dev devel devops dfir dfirsummit dfrws dirtycow disassembler discover diy dl dll dns doc docker dockersecurity dominator dos dropbox duqu earth eclipse elasticsearch electronics elf elixirlang emacs emet empire encryption equationgroup erlang escalating ettercap event exploit exploitation exploitkit fail fb firefox flame forensic forensics foss fr framework free freebsd fridayreads fun funny future fuzzer fuzzing game gamedev games gaming gdb geek geographyofpoverty git github gnome gnu golang google googleplay graph graphs grrcon gtd gui hack hack2learn hacker hackerone hackers hackersonlineclub hacking hackingteam hacklu hackpra hardening hardware hash hashcat heartbleed hitb2016ams hitb2017ams hitbgsec homepage honeypot howto html html5 https humor hunter icloud icon icons ida ids ie ie6 ie9 infosec infrastructure injection ioc ios iphone ipv6 ipython iso it italy itsec j2ee j2eescan jaff java javaone javascript jesuischarlie jobs jquery js jsrat jvm kali kalilinux katoolin kekeo kernel keylogger kibana lab learn leopard lfi libsigrokdecode links linux live locky lowpower lynis mac macbook machinelearning macos macosx mail maltego malware malwareanalysis malwaremustdie manager manual map math mbr metasploit microsoft mimikatz mitm mobile model modeling money monitoring moon movies movp mq msf mysql nasa neo4j netbook netsec network networking neutrinobot news nginx nginxday nmap nodejs noriben notsosecure nsa nsm ntp numpy ohm2013 oldschool oldschoolbackdoors oleoutlook ollydbg opensource openssl oprahssl oracle os oss osx owasp pacsec pandas paper password patch pdf pe penetrationtest pentest pentesters pentesting pentestlab perceptual persistence personal pestudio pgp phishing php pki plot poc poc2014 portable portugal postgresql powershell privacy privilegeescalation processexplorer productivity programming proxy pshitt pwn2own python qt quotes ransomware raspberrypi raspberrypi2 rce re realtime recipes recon14 reconmtl regex rehints rekall remcos remwa repy2exe retrogaming reverse reverse_engineering reverseengineering reversing rkt rodeoide root rop ror rowhammer ruby ructfe samba sandbox sans sanspentestblog scada scanner screencast screencasts sdo search sec14 security securitymanager seo serbia shadowbrokers shellcode shellcoding shellter slides sniffer snippet snmp snowleopard social software source sp17 space splunk sqli sqlilab sqlinjection ss7map ssh ssl starttls startups stat stats stuxnet sun suricata svg sync sysadmin syslog tbt tech terminal testbed thn threat threathunting tip tips tool tools toolswatch tor tr16 tricks trojan truestory tutorial tv tweak ubuntu ue4 uefi ui unix url usa usb usenix vault7 video videos vietnam virginia virtualization viz vm voip volatility vpn vulnerability vulnhub waf wearables web web-dev web2py webapp webdev websec websecurity webvulscan wii wikileaks win windbg windows windows8 wordpress worldphotographyday wpa wpscan writeup wxpython x64dbg xslt xss xxe yara zeronighs zeronights

Copy this bookmark:



description:


tags: