Revisiting Windows Security Hardening Through Kernel Address Protection
RT : Revisiting Windows Security Hardening Through Kernel Address Protection : cc
from twitter_favs
13 hours ago
Twitter
RT : Revisiting Windows Security Hardening Through Kernel Address Protection : cc
from twitter_favs
13 hours ago
j00ru//vx tech blog : A quick insight into the Driver Signature Enforcement
RT : Windows driver signature bypass by derusbi -
Driver Signature Enforcement (by ) -
from twitter
13 hours ago
Windows driver signing bypass by Derusbi ‹ The Cybersecurity & FastForensic Blog
RT : Windows driver signature bypass by derusbi -
Driver Signature Enforcement (by ) -
from twitter
13 hours ago
Finding The Lost Vikings – Reversing a Virtual Machine | ~ryiron
RT : Reversing Engineering Game - "The Lost Vikings" : , TheLostVikingsTools :…
from twitter
13 hours ago
Twitter
RT : Reversing Engineering Game - "The Lost Vikings" : , TheLostVikingsTools :…
from twitter
13 hours ago
GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF
RT : payloadsallthethings - A list of usefull payloads and bypass for Web Application Se...

— Python OSS (oss_py) Febr…
from twitter
yesterday
GitHub - attify/attify-badge: Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.
attify-badge - Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.

— Python OSS (oss_py) February 2…
from twitter_favs
2 days ago
Twitter
Give people an inch of distraction from empirical threats and they'll run a record mile time.
from twitter_favs
2 days ago
GitHub - vagnerpilar/windbgtree: A command tree based on commands and extensions for Windows Kernel Debugging.
RT : If you are passionate in Debugging and would like to have a pretty handy list of commands; take a look at:
WinDBG  from twitter
2 days ago
Twitter
RT : In-depth Analysis of Disttrack Malware :
from twitter
2 days ago
Twitter
Most anti-virus products are snake oil which make computers *less* secure:
from twitter_favs
3 days ago
Twitter
An awesome iTerm2 backend for Matplotlib, so you can plot directly in your terminal.
from twitter_favs
3 days ago
Twitter
Very easy ---> PCI device analysis with WinDbg
from twitter_favs
3 days ago
Twitter
Seriously. All people should be aware of this!
DFIR  from twitter_favs
3 days ago
iancaling — Siklu EtherHaul Unauthenticated Remote Command...
RT : Finding an unauthenticated RCE vulnerability in wireless point-to-point radios
from twitter
4 days ago
Untitled (https://www.csc2.ncsu.edu/faculty/xjiang4/pubs/ARES09.pdf)
RT : Defeating Dynamic Data Kernel Rootkit Attacks via VMM-based Guest-Transparent Monitoring : (pdf)
from twitter
4 days ago
Twitter
WinDbg+Sysmon

Make Sysmon Great Again with WinDbg!
from twitter_favs
4 days ago
Twitter
snuck.me : a service detecting SSL man-in-the-middle :
from twitter_favs
4 days ago
Twitter
Make Your Own Tools!: For Offensive PenTest =>
Python  from twitter_favs
4 days ago
Twitter
shootback : a reverse TCP tunnel let you access target behind NAT or firewall :
from twitter_favs
6 days ago
Objective-See
From Italy With Love? finding hackingteam code in russian malware
from twitter_favs
7 days ago
Twitter
when you hate .DS_Store so much you write a fucking MAC policy to disallow creating it system-wide. 10/10
from twitter_favs
8 days ago
Twitter
Spanish malicious doc with delivers using injector…
Autoit  malware  Remcos  RAT  Powershell  from twitter_favs
8 days ago
Twitter
RT : pysap v0.1.13 released! Auto-generated network packets graphs + niping script + routing on example scripts + [..]…
from twitter
8 days ago
Mathy Vanhoef: Advanced WiFi Attacks Using Commodity Hardware
RT : Advanced WiFi Attacks + Jamming Using Commodity Hardware : , Slides : cc
from twitter
11 days ago
Typically use Python need to use .NET for a job looking for resources and pitfalls : Python
Typically use Python need to use .NET for a job looking for resources and pitfalls
from twitter_favs
12 days ago
FREE Security Workshops
A simple way to think differently and solve complex Security problems.
from twitter_favs
12 days ago
Untitled (http://www.genetic-programming.org/hc2011/05-Farooq/Farooq-Paper.pdf)
ELF-Miner : Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables : (pdf)
from twitter_favs
12 days ago
Twitter
RT : I published a new page: Linux Enhanced BPF (eBPF) Tracing Tools
from twitter
12 days ago
Linux eBPF Tracing Tools
RT : I published a new page: Linux Enhanced BPF (eBPF) Tracing Tools
from twitter
12 days ago
Twitter
RT : Virtualization Based Security - ( Part 1 : The boot process ) :
from twitter
12 days ago
AMOSSYS Security Blog
RT : Virtualization Based Security - ( Part 1 : The boot process ) :
from twitter
12 days ago
Dynamic Wrapper 1.1 · GitHub
RT : Dynamically Define Win32 API Calls in JS backed by CS

Getting closer. Have to define a few…
from twitter_favs
12 days ago
Twitter
RT : Dynamically Define Win32 API Calls in JS backed by CS

Getting closer. Have to define a few…
from twitter_favs
12 days ago
Twitter
RT : VT Checker 0.5 script features "tags"
> harmless, microsoft software, revoked/expired signature
Virustotal  from twitter
12 days ago
GitHub - manwhoami/Bella: A pure python, post-exploitation, data mining tool and remote administration tool for macOS.
RT : Bella : A pure python, post-exploitation, data mining tool and remote administration tool for macOS :
from twitter
12 days ago
Papers We Love
RT : Papers we love - repository of academic computer science papers : ,research-in-production :
from twitter
12 days ago
Twitter
RT : Hardening Windows 10 With Zero Day Exploit Mitigations Under The Microscope :
from twitter
15 days ago
Type Juggling and PHP Object Injection, and SQLi, Oh My!
RT : New blogpost by on abusing Type Juggling and PHP Object Injection to gain SQLi
from twitter
17 days ago
Twitter
RT : TPLmap - a server-side template injection {SSTI} testing tool:
from twitter
17 days ago
« earlier      
#blog #fr #hacking #homepage #js #security 00 01 02 03 05 06 0day 2009 31c3 32c3 44con academic activedirectory adfsl ai alabama analysis androguard android anonym8 anonymous antisandbox antisec apple apps appsec architecture arm arp arpy art ashley aslr asm audit auditingtool awesome aws b2b backdoor backdoors backtrack backup bash belgrade bheu bhusa bigdata binwalk birmingham bitlocker bittorrent blackhat blackhateu blackhole blind_sqli blog blogpost bluetooth bm book books boot boot2root bootkit browser brucon bruteforce bruteforcer bsideschallenge bsideslondon bugbounty burp bypass canvas capstone captcha capture centos charliehebdo chart cheatsheet checkitout checklist chrome cisco ciscotalos civ climber cloud cms cocoa code codebits codebits2011 codetainer coding colorado comedy comic conf crack crawler cronjob crossplatformdisassembler crosssitescripting cryptohaven cryptoparty cryptowall csp csrf css ctf cuckoo curiosity cyber_warfare cybercrime cybersecurity dahboo7 dailywtf dataexfiltrationtoolkit db dbgkit dc4420 deal deals debugger decompiler defcon defense derbycon design det dev devel devops dfir dfirsummit dfrws dirtycow disassembler discover diy dll dns doc docker dockersecurity dominator dos dropbox duqu earth eclipse elasticsearch electronics elf elixirlang emacs emet empire encryption erlang escalating ettercap event exploit exploitkit fail fb firefox flame forensic forensics foss fr framework free freebsd fridayreads fun funny fuzzer fuzzing game gamedev games gaming gdb geek geographyofpoverty git gnome gnu google googleplay graph graphs grrcon gtd gui hack hack2learn hacker hackers hackersonlineclub hacking hackingteam hacklu hackpra hardening hardware hash hashcat heartbleed hitb2016ams hitbgsec homepage honeypot howto html html5 https humor hunter icloud icon icons ida ids ie ie6 ie9 infosec injection ioc ios iphone ipv6 ipython iso it italy itsec j2ee j2eescan java javaone javascript jesuischarlie jobs jquery js jsrat jvm kali kalilinux katoolin kernel keylogger kibana lab learn leopard lfi libsigrokdecode links linux live locky lowpower lynis mac macbook machinelearning mail maltego malware malwareanalysis malwaremustdie manager manual map math mbr metasploit microsoft mimikatz mitm mobile model modeling money monitoring moon movies movp mq msf mysql nasa neo4j netbook netsec network networking news nginx nginxday nmap nodejs noriben notsosecure nsa nsm ntp numpy ohm2013 oldschool oldschoolbackdoors oleoutlook ollydbg opensource openssl oprahssl oracle os oss osx owasp pacsec pandas paper password patch pdf pentest pentesters pentesting pentestlab perceptual persistence personal pestudio pgp phishing php pki plot poc poc2014 portable portugal postgresql powershell privacy processexplorer productivity programming proxy pshitt pwn2own python qt quotes raspberrypi raspberrypi2 rce re realtime recipes recon14 reconmtl regex rehints rekall remwa retrogaming reverse reverse_engineering reverseengineering reversing rodeoide root rop ror rowhammer ruby ructfe sandbox sans sanspentestblog scada scanner screencast screencasts sdo search sec14 security securitymanager seo serbia shellcode shellcoding shellter slides sniffer snippet snmp snowleopard social software source space sqli sqlilab sqlinjection ss7map ssh ssl starttls startups stat stats stuxnet sun suricata svg sync sysadmin syslog tech terminal testbed thn threat tip tips tool tools toolswatch tor tr16 tricks trojan truestory tutorial tv tweak ubuntu ue4 ui unix url usa usb usenix video videos virginia virtualization viz vm voip volatility vpn vulnerability waf web web-dev web2py webapp webdev websec websecurity webvulscan wii win windbg windows windows8 wordpress worldphotographyday wpa writeup wxpython x64dbg xslt xss xxe yara zeronighs zeronights

Copy this bookmark:



description:


tags: