6945
showing only twitter [see all]
Untitled (http://www.pinkstyle.org/elfcrypt.html)
RT : ELF Code Injection / binary encryption / run time decryption basic tutorial
from twitter
7 hours ago
Twitter
RT : MS Edge - SOP bypass / UXSS - "Tweeting like Charles Darwin" 🤣

One minute video:…
from twitter
2 days ago
SOP bypass / UXSS – Tweeting like Charles Darwin (Edge) – Broken Browser
RT : MS Edge - SOP bypass / UXSS - "Tweeting like Charles Darwin" 🤣

One minute video:…
from twitter
2 days ago
GitHub - trailofbits/manticore: Dynamic binary analysis tool
RT : Nice, has released Manticore, a prototyping tool for dynamic binary analysis:
from twitter
2 days ago
quicksand.io - phishing exploit document analysis
RT : QuickSand.io - a CLI tool in C to scan document streams w/ YARA for exploits/Cryptanalysis attacks :
from twitter
3 days ago
Twitter
RT : Released DocBleachShell, bleach your suspicious documents on Windows fully automated …
from twitter
3 days ago
Twitter
RT : Little script to help with DCOM commands/lateral movement based on
from twitter
4 days ago
Go-SCP · GitBook
Go Language - Web Application Secure Coding Practices - free book
from twitter
4 days ago
Untitled (https://www.youtube.com/watch?v=sYCzu04ftaY)
RT : Recover a RSA private key from multiple bad public keys in order to forge a sig. Quick intro to the math of RSA:
from twitter
5 days ago
Untitled (https://www.youtube.com/watch?v=UmOU3I36T2U)
RT : My talk on BPF tools from USENIX LISA16 (LISA17 CFP in 3 days!)
from twitter
5 days ago
Twitter
RT : Design flaws in Lastpass 2FA implementation :
from twitter
5 days ago
GitHub - python-security/pyt
RT : PyT ( Python Taint ) - Security static analysis tool for Python :
from twitter
5 days ago
Twitter
RT : Abusing Exchange Mailbox Permissions with MailSniper : cc
from twitter
5 days ago
Twitter
RT : Abusing Nvidia Node.js to Bypass AppLocker/Device Guard Whitelisting:
from twitter
6 days ago
SEC Consult: Abusing NVIDIA's node.js to bypass application whitelisting
RT : Abusing Nvidia Node.js to Bypass AppLocker/Device Guard Whitelisting:
from twitter
6 days ago
Firmware-Status von AVM-Routern checken: Kritisches Sicherheitsloch in Fritzbox-Firmware gestopft | heise online
RT : Heap-based buffer overflow in several AVM FRITZ!Box models. Upgrade to latest firmware recommended.
from twitter
7 days ago
GitHub - subTee/Shellcode-Via-HTA: How To Execute Shellcode via HTA
RT : No Blog. Just code ;-)

Shellcode via HTA working example.
No RWX pages, x86,x64 Custom Spawn As
Feedback Welcome.
from twitter
7 days ago
Twitter
RT : Docker releases : A toolkit for building secure, portable and lean operating systems for containers…
LinuxKit  from twitter
7 days ago
Capturing all the flags in BSidesSF CTF by pwning our infrastructure
RT : 0wning a CTF by hacking the infrastructure - Docker/kubernetes shenenigans. - TLDR: don't assume, verify :)
from twitter
8 days ago
I reverse-engineered a $500M Artificial Intelligence company in one week. Here’s the full story.
“I reverse-engineered a $500M Artificial Intelligence company in one week. Here’s the full story.” by
from twitter
9 days ago
Twitter
RT : I spend a lot of time in a terminal, so I wrote tiny-care-terminal, a dashboard that tries to take care of you 💖…
from twitter
9 days ago
Evilginx - MITM Attack Framework [Advanced Phishing With Two-factor Authentication Bypass]
RT : Evilginx - MITM Attack Framework [Advanced Phishing With Two-factor Authentication Bypass]
from twitter
9 days ago
writeups/hitb2017/elbanwp at master · kitctf/writeups · GitHub
RT : Finally solved bin400 from … Custom(?) VM implemented in ROP with 2-stage crackme. ~10hrs holy shit
HITB2017AMS  from twitter
9 days ago
CVE-2017-0199 Practical exploitation ! (PoC)
RT : Someone wrote a proof-of-concept exploit for that Word bug (CVE-2017-0199).
from twitter
9 days ago
Twitter
RT : Someone wrote a proof-of-concept exploit for that Word bug (CVE-2017-0199).
from twitter
9 days ago
(500) https://seahorn.github.io/
RT : SeaHorn - A fully automated analysis framework for LLVM-based languages
from twitter
9 days ago
A quick analysis of the latest Shadow Brokers dump – Nettitude Labs
RT : We've run some quick analysis on the latest Shadow Brokers dump. Weird obfuscation decisions, stolen code and more 🔦
from twitter
9 days ago
Twitter
RT : HOW-TO-HACK LIKE NSA: control new implant with PEDDLECHEAP in DANDERSPRITZ for powerful REMOTE ACCESS TOOL & SHELLS…
from twitter
11 days ago
Intel_Inside/README.md at master · 0rbz/Intel_Inside · GitHub
RT : Intel PROSet Wireless - Persistent SYSTEM Shell Implant (All Versions) (Win 7 - 64bit) --
Exploitation  from twitter
11 days ago
Untitled (http://www.cs.tau.ac.il/~wolf/papers/deepchess.pdf)
RT : DeepChess: End-To-End Deep Neural Network for Automatic Learning in Chess ()
from twitter
11 days ago
Twitter
RT : Cross Browser Local Files Disclosure Writeup! Finally after 8 months since first found. Featuring five bugs:…
from twitter
12 days ago
Twitter
RT : How attack a program and gain code execution with a format string exploit. Using .
from twitter
13 days ago
BinaryStudio
RT : How attack a program and gain code execution with a format string exploit. Using .
from twitter
13 days ago
Untitled (https://www.youtube.com/watch?v=EepaD-BLBr4)
RT : Bug Hunting Part 2: pdfcrack and python memory corruption research
from twitter
13 days ago
Twitter
RT : Exploiting Broadcom’s Wi-Fi Stack (Part 2): , Part 1 :
from twitter
14 days ago
Twitter
RT : Interesting trick to make a persistence key unnoticed by autoruns:
from twitter
15 days ago
GitHub - OALabs/frida-wshook: Script analysis tool based on Frida.re
RT : Just pushed a script using for analyzing malicious js/vbs files by hooking Win APIs.
RE  dfir  from twitter
17 days ago
Twitter
RT : 's Amazing Tool in Action

There it is... working in memory, in JScript…
Mimikatz  from twitter
18 days ago
Untitled (https://www.youtube.com/watch?v=O8IvJAIvGJo)
RT : If you're interested in Homomorphic Encryption, this (sparsely watched) youtube video from Brakerski is a gem.
from twitter
19 days ago
Twitter
RT : Exploiting the Xen hypervisor :
from twitter
19 days ago
« earlier      
#blog #fr #hacking #homepage #js #security 00 01 02 03 05 06 0day 2009 31c3 32c3 44con academic activedirectory adfsl ai alabama analysis androguard android anonym8 anonymous antisandbox antisec apple apps appsec architecture arm arp arpy art ashley aslr asm audit auditingtool awesome aws b2b backdoor backdoors backtrack backup bash belgrade bheu bhusa bigdata binwalk birmingham bitlocker bittorrent blackhat blackhateu blackhole blind_sqli blog blogpost bluetooth bm book books boot boot2root bootkit browser brucon bruteforce bruteforcer bsideschallenge bsideslondon bugbounty burp bypass canvas capstone captcha capture centos charliehebdo chart cheatsheet checkitout checklist chrome cisco ciscotalos civ climber cloud cms cocoa code codebits codebits2011 codetainer coding colorado comedy comic conf crack crawler cronjob crossplatformdisassembler crosssitescripting cryptohaven cryptoparty cryptowall csp csrf css ctf cuckoo curiosity cyber_warfare cybercrime cybersecurity dahboo7 dailywtf dataexfiltrationtoolkit db dbgkit dc4420 deal deals debugger decompiler defcon defense derbycon design det dev devel devops dfir dfirsummit dfrws dirtycow disassembler discover diy dll dns doc docker dockersecurity dominator dos dropbox duqu earth eclipse elasticsearch electronics elf elixirlang emacs emet empire encryption erlang escalating ettercap event exploit exploitkit fail fb firefox flame forensic forensics foss fr framework free freebsd fridayreads fun funny fuzzer fuzzing game gamedev games gaming gdb geek geographyofpoverty git gnome gnu google googleplay graph graphs grrcon gtd gui hack hack2learn hacker hackers hackersonlineclub hacking hackingteam hacklu hackpra hardening hardware hash hashcat heartbleed hitb2016ams hitbgsec homepage honeypot howto html html5 https humor hunter icloud icon icons ida ids ie ie6 ie9 infosec injection ioc ios iphone ipv6 ipython iso it italy itsec j2ee j2eescan java javaone javascript jesuischarlie jobs jquery js jsrat jvm kali kalilinux katoolin kernel keylogger kibana lab learn leopard lfi libsigrokdecode links linux live locky lowpower lynis mac macbook machinelearning mail maltego malware malwareanalysis malwaremustdie manager manual map math mbr metasploit microsoft mimikatz mitm mobile model modeling money monitoring moon movies movp mq msf mysql nasa neo4j netbook netsec network networking news nginx nginxday nmap nodejs noriben notsosecure nsa nsm ntp numpy ohm2013 oldschool oldschoolbackdoors oleoutlook ollydbg opensource openssl oprahssl oracle os oss osx owasp pacsec pandas paper password patch pdf pentest pentesters pentesting pentestlab perceptual persistence personal pestudio pgp phishing php pki plot poc poc2014 portable portugal postgresql powershell privacy processexplorer productivity programming proxy pshitt pwn2own python qt quotes raspberrypi raspberrypi2 rce re realtime recipes recon14 reconmtl regex rehints rekall remwa retrogaming reverse reverse_engineering reverseengineering reversing rodeoide root rop ror rowhammer ruby ructfe sandbox sans sanspentestblog scada scanner screencast screencasts sdo search sec14 security securitymanager seo serbia shellcode shellcoding shellter slides sniffer snippet snmp snowleopard social software source space sqli sqlilab sqlinjection ss7map ssh ssl starttls startups stat stats stuxnet sun suricata svg sync sysadmin syslog tech terminal testbed thn threat tip tips tool tools toolswatch tor tr16 tricks trojan truestory tutorial tv tweak ubuntu ue4 ui unix url usa usb usenix video videos virginia virtualization viz vm voip volatility vpn vulnerability waf web web-dev web2py webapp webdev websec websecurity webvulscan wii win windbg windows windows8 wordpress worldphotographyday wpa writeup wxpython x64dbg xslt xss xxe yara zeronighs zeronights

Copy this bookmark:



description:


tags: