6841
showing only twitter [see all]
Twitter
RT : Attacking RDP - How to Eavesdrop on Poorly Secured RDP Connections : (pdf)
from twitter
yesterday
Untitled (https://www.exploit-db.com/docs/41621.pdf)
RT : Attacking RDP - How to Eavesdrop on Poorly Secured RDP Connections : (pdf)
from twitter
yesterday
RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an…
“RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an…” by Kevin Beaumont
from twitter
2 days ago
Moodle – Remote Code Execution – 0-Days And Life
RT : CVE-2017-2641: Moodle Object Injection & SQLi causing Remote Code Execution
vulnerability  PHP  moodle  appsec  from twitter
2 days ago
Scaling Consensus? This Turing Winner Thinks He's Found a Way
RT : Scaling Consensus? This Turing Winner Thinks He's Found a Way via +1
from twitter
3 days ago
Twitter
RT : Encrypted models and ~predictions~ for deep learning, a new blog post from , written to be understood 👏…
from twitter
5 days ago
eBPF – IO Visor Project
eBPF – IO Visor Project - samples for Linux kernel probes
from twitter
6 days ago
Twitter
RT : WhatsApp, Telegram Flaw Allows Takeover for Millions of Accounts
Wearables  Cyber  from twitter
7 days ago
Untitled (https://www.youtube.com/watch?v=xkdPjbaLngE&feature=youtu.be)
RT : What do Nintendo Switch and iOS 9.3 have in common? CVE-2016-4657 walk-t...
from twitter
9 days ago
Twitter
RT : Critical vulnerability in JSON Web Encryption () - RFC 7516 Invalid Curve Attack
crypto  JWE  ec  from twitter
9 days ago
Twitter
RT : Malsub
A Python RESTful API framework for online malware and URL analysis services
by
from twitter
9 days ago
Spark/Scala MOOC + Capstone Project Now Live on Coursera! | The Scala Programming Language
RT : Excited to announce that our "Big Data Analysis with Scala and Spark" course is now LIVE on Coursera! +Capstone too!
from twitter
9 days ago
(500) https://sizzop.github.io/2016/09/13/kernel-hacking-with-hevd-part-5.html
RT : Finally finished a short update to my Kernel Hacking series. Includes SMEP bypass on Win8.1: /cc
from twitter
9 days ago
MaMaDroid: Detecting Android malware by building Markov chains of behavorial models | the morning paper
RT : Detecting Android malware by extracting a static call graph and applying ML (impressive how high-level the CFG is)
from twitter
10 days ago
snippets/wmi-process-watcher at master · DimitriFourny/snippets · GitHub
RT : WMI Process Watcher (C++): Technique to asynchronously detect when a process is created using WMI: cc
from twitter
10 days ago
Airbnb – When Bypassing JSON Encoding, XSS Filter, WAF, CSP, and Auditor turns into Eight Vulnerabilities | Brett Buerhaus
RT : Airbnb – When Bypassing JSON Encoding, XSS Filter, WAF, CSP, and Auditor turns into Eight Vulnerabilities --
from twitter
10 days ago
BrowserGather Part 1: Fileless Chrome Credential Extraction with PowerShell – sekirkity
RT : BrowserGather Part 1: In-Memory Chrome Credential Extraction for Red Teamers
from twitter
10 days ago
Send Email Without Prompt In Outlook · GitHub
RT : Experimenting with Outlook.Application COM Objects
from twitter
10 days ago
UEFI gets AMD Secure Encrypted Virtualization (SEV) support | Firmware Security
RT : UEFI gets AMD Secure Encrypted Virtualization (SEV) support via Firmware Security
from twitter
11 days ago
Twitter
RT : Done with the Linux tracing talk at - slides: << really love this talk for the bcc…
confoo  from twitter
11 days ago
Untitled (https://www.dropbox.com/s/5wa1zn1xqywzprv/Modern-Linux-tracing.pptx?dl=0)
RT : Done with the Linux tracing talk at - slides: << really love this talk for the bcc…
confoo  from twitter
11 days ago
panda/run_on_32bitlinux.py at master · panda-re/panda · GitHub
RT : Want to use PANDA to record a Linux binary, but don't want to set up a VM? Try this:
from twitter
12 days ago
Twitter
RT : How I found a $5,000 Google Maps XSS (by fiddling with Protobuf):
from twitter
12 days ago
How I found a $5,000 Google Maps XSS (by fiddling with Protobuf)
RT : How I found a $5,000 Google Maps XSS (by fiddling with Protobuf):
from twitter
12 days ago
Twitter
RT : Getting Physical With USB Type-C - WINDOWS 10 RAM Forensics & UEFI Attacks : (Slides) cc…
from twitter
12 days ago
Untitled (http://alex-ionescu.com/publications/Recon/recon2017-bru.pdf)
RT : Getting Physical With USB Type-C - WINDOWS 10 RAM Forensics & UEFI Attacks : (Slides) cc…
from twitter
12 days ago
(500) https://bcicen.github.io/ctop/
RT : ctop – concise commandline monitoring for containers :
from twitter
12 days ago
Twitter
RT : ctop – concise commandline monitoring for containers :
from twitter
12 days ago
InfoCon Collection: Hacking Conference Audio and Video Archive
RT : (outstanding -- all videos from all conferences) InfoCon: Hacking Conference Audio and Video Archive --
Security  from twitter
13 days ago
Drupal 7.x Services module unserialize() to RCE
RT : Ambionics Security team found critical RCE vulnerability in Drupal Services module. Details and exploit:
from twitter
13 days ago
Twitter
RT : PoC to show why HttpOnly flag isn't a complete protection against session hijacking via XSS.…
from twitter
13 days ago
Twitter
RT : Multiple vulnerabilities in Wireless IP Camera (P2P) WIFICAM cameras and in GoAhead (pre-auth RCE as root):…
from twitter
13 days ago
Art of Anti Detection 3 – Shellcode Alchemy – Pentest Blog
RT : Art of Anti Detection 3 – ,Part 2 (PE Backdoor Manufacturing): ,P1…
from twitter
13 days ago
Art of Anti Detection 2 – PE Backdoor Manufacturing – Pentest Blog
RT : Art of Anti Detection 3 – ,Part 2 (PE Backdoor Manufacturing): ,P1…
from twitter
13 days ago
Twitter
RT : Art of Anti Detection 3 – ,Part 2 (PE Backdoor Manufacturing): ,P1…
from twitter
13 days ago
Twitter
RT : Excellent article about exploiting Cypress PSoC4 (ARM) - reading system ROM, modifying low-level config, creating r…
from twitter
14 days ago
Twitter
RT : Local Privilege Escalation for macOS 10.12.2 via mach_voucher and XNU port Feng Shui …
from twitter
15 days ago
Local Privilege Escalation for macOS 10.12.2 and XNU port Feng Shui-阿里聚安全
RT : Local Privilege Escalation for macOS 10.12.2 via mach_voucher and XNU port Feng Shui …
from twitter
15 days ago
Abusing of Protocols to Load Local Files, bypass the HTML5 Sandbox, Open Popups and more – Broken Browser
RT : Abusing of Protocols to Load Local Files, bypass the HTML5 Sandbox, Open Popups and more - Broken Browser
from twitter
15 days ago
Twitter
RT : maclook4ref is a new tool to recover & analyze C++ vtable functions in MacOS KEXT binary.
CapstoneInside  from twitter
21 days ago
Machine Learning from scratch: Bare bones implementations in Python | Hacker News
RT : Machine Learning from scratch: Bare bones implementations in Python | Hacker News
from twitter
21 days ago
Twitter
RT : Hacking Slack using postMessage and WebSocket-reconnect to steal your precious token : cc…
from twitter
21 days ago
Hacking Slack using postMessage and WebSocket-reconnect to steal your precious token
RT : Hacking Slack using postMessage and WebSocket-reconnect to steal your precious token : cc…
from twitter
21 days ago
XPN Security — ROP Primer - Walkthrough of Level 1
RT : ROP Primer - Walkthrough of Level 0: , Lvl - 1 : , Lvl 2: cc
from twitter
22 days ago
XPN Security — ROP Primer - Walkthrough of Level 2
RT : ROP Primer - Walkthrough of Level 0: , Lvl - 1 : , Lvl 2: cc
from twitter
22 days ago
Mitigating PHP's long standing issue with OPCache leaking sensitive data
RT : So PHP has quietly fixed an issue that allows indirect root-like privilege escalations via its OPCache ...
from twitter
22 days ago
Learning from the field : Active Directory Recon and Administrative shells — tech.bitvijays.com
RT : A primer on "Windows active directory recon and Authenticated remote code execution techniques" : cc
from twitter
22 days ago
GitHub - Professor-plum/Reflective-Driver-Loader
RT : Reflective Kernel Driver injection is a injection technique base off Reflective DLL injection by Stephen Fewer --
from twitter
22 days ago
Twitter
RT : "the compiler [...] re-ordered the code such that the unsafe memory access takes place before the condition is chec…
from twitter
23 days ago
j00ru//vx tech blog : A quick insight into the Driver Signature Enforcement
RT : Windows driver signature bypass by derusbi -
Driver Signature Enforcement (by ) -
from twitter
25 days ago
Windows driver signing bypass by Derusbi ‹ The Cybersecurity & FastForensic Blog
RT : Windows driver signature bypass by derusbi -
Driver Signature Enforcement (by ) -
from twitter
25 days ago
Finding The Lost Vikings – Reversing a Virtual Machine | ~ryiron
RT : Reversing Engineering Game - "The Lost Vikings" : , TheLostVikingsTools :…
from twitter
25 days ago
Twitter
RT : Reversing Engineering Game - "The Lost Vikings" : , TheLostVikingsTools :…
from twitter
25 days ago
GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF
RT : payloadsallthethings - A list of usefull payloads and bypass for Web Application Se...

— Python OSS (oss_py) Febr…
from twitter
27 days ago
GitHub - vagnerpilar/windbgtree: A command tree based on commands and extensions for Windows Kernel Debugging.
RT : If you are passionate in Debugging and would like to have a pretty handy list of commands; take a look at:
WinDBG  from twitter
27 days ago
Twitter
RT : In-depth Analysis of Disttrack Malware :
from twitter
27 days ago
iancaling — Siklu EtherHaul Unauthenticated Remote Command...
RT : Finding an unauthenticated RCE vulnerability in wireless point-to-point radios
from twitter
29 days ago
« earlier      
#blog #fr #hacking #homepage #js #security 00 01 02 03 05 06 0day 2009 31c3 32c3 44con academic activedirectory adfsl ai alabama analysis androguard android anonym8 anonymous antisandbox antisec apple apps appsec architecture arm arp arpy art ashley aslr asm audit auditingtool awesome aws b2b backdoor backdoors backtrack backup bash belgrade bheu bhusa bigdata binwalk birmingham bitlocker bittorrent blackhat blackhateu blackhole blind_sqli blog blogpost bluetooth bm book books boot boot2root bootkit browser brucon bruteforce bruteforcer bsideschallenge bsideslondon bugbounty burp bypass canvas capstone captcha capture centos charliehebdo chart cheatsheet checkitout checklist chrome cisco ciscotalos civ climber cloud cms cocoa code codebits codebits2011 codetainer coding colorado comedy comic conf crack crawler cronjob crossplatformdisassembler crosssitescripting cryptohaven cryptoparty cryptowall csp csrf css ctf cuckoo curiosity cyber_warfare cybercrime cybersecurity dahboo7 dailywtf dataexfiltrationtoolkit db dbgkit dc4420 deal deals debugger decompiler defcon defense derbycon design det dev devel devops dfir dfirsummit dfrws dirtycow disassembler discover diy dll dns doc docker dockersecurity dominator dos dropbox duqu earth eclipse elasticsearch electronics elf elixirlang emacs emet empire encryption erlang escalating ettercap event exploit exploitkit fail fb firefox flame forensic forensics foss fr framework free freebsd fridayreads fun funny fuzzer fuzzing game gamedev games gaming gdb geek geographyofpoverty git gnome gnu google googleplay graph graphs grrcon gtd gui hack hack2learn hacker hackers hackersonlineclub hacking hackingteam hacklu hackpra hardening hardware hash hashcat heartbleed hitb2016ams hitbgsec homepage honeypot howto html html5 https humor hunter icloud icon icons ida ids ie ie6 ie9 infosec injection ioc ios iphone ipv6 ipython iso it italy itsec j2ee j2eescan java javaone javascript jesuischarlie jobs jquery js jsrat jvm kali kalilinux katoolin kernel keylogger kibana lab learn leopard lfi libsigrokdecode links linux live locky lowpower lynis mac macbook machinelearning mail maltego malware malwareanalysis malwaremustdie manager manual map math mbr metasploit microsoft mimikatz mitm mobile model modeling money monitoring moon movies movp mq msf mysql nasa neo4j netbook netsec network networking news nginx nginxday nmap nodejs noriben notsosecure nsa nsm ntp numpy ohm2013 oldschool oldschoolbackdoors oleoutlook ollydbg opensource openssl oprahssl oracle os oss osx owasp pacsec pandas paper password patch pdf pentest pentesters pentesting pentestlab perceptual persistence personal pestudio pgp phishing php pki plot poc poc2014 portable portugal postgresql powershell privacy processexplorer productivity programming proxy pshitt pwn2own python qt quotes raspberrypi raspberrypi2 rce re realtime recipes recon14 reconmtl regex rehints rekall remwa retrogaming reverse reverse_engineering reverseengineering reversing rodeoide root rop ror rowhammer ruby ructfe sandbox sans sanspentestblog scada scanner screencast screencasts sdo search sec14 security securitymanager seo serbia shellcode shellcoding shellter slides sniffer snippet snmp snowleopard social software source space sqli sqlilab sqlinjection ss7map ssh ssl starttls startups stat stats stuxnet sun suricata svg sync sysadmin syslog tech terminal testbed thn threat tip tips tool tools toolswatch tor tr16 tricks trojan truestory tutorial tv tweak ubuntu ue4 ui unix url usa usb usenix video videos virginia virtualization viz vm voip volatility vpn vulnerability waf web web-dev web2py webapp webdev websec websecurity webvulscan wii win windbg windows windows8 wordpress worldphotographyday wpa writeup wxpython x64dbg xslt xss xxe yara zeronighs zeronights

Copy this bookmark:



description:


tags: