7317
showing only twitter [see all]
os01 by tuhdo
RT : Operating Systems : From 0 to 1 : Pdf: (A must read for budding hackers & Reverse engineers)
from twitter
3 hours ago
Vale: Verifying High-Performance Cryptographic Assembly Code | USENIX
RT : Vale: Verifying High-Performance Cryptographic Assembly Code
Paper:
Code:

Very cool stuff!
from twitter
11 hours ago
GitHub - project-everest/vale: Verified Assembly Language for Everest
RT : Vale: Verifying High-Performance Cryptographic Assembly Code
Paper:
Code:

Very cool stuff!
from twitter
11 hours ago
Visualizing Activity from Metadata - Obsidian Forensics
RT : ICYMI: Visualizing activity from an encrypted iPhone backup using only metadata
|
DFIR  from twitter
16 hours ago
Twitter
RT : ICYMI: Visualizing activity from an encrypted iPhone backup using only metadata
|
DFIR  from twitter
16 hours ago
Twitter
RT : POTUS : Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection : (pdf)
from twitter
16 hours ago
Twitter
RT : Exploitations of Uninitialized Uses on macOS Sierra : (pdf) 👍
from twitter
16 hours ago
GitHub - junxzm1990/pomp
RT : Code for POMP, which helps do root-cause diagnosis on crashdumps with the help of Intel PT:
usesec17  from twitter
yesterday
Exploring Windows virtual memory management
RT : :: Exploring Windows virtual memory management , see more
security  from twitter
3 days ago
Untitled (http://tweetedtimes.com/seclabor)
RT : :: Exploring Windows virtual memory management , see more
security  from twitter
3 days ago
Nicole Orchard
RT : An Intro to Compilers (LLVM) :
from twitter
3 days ago
Attacking Java Deserialization | NickstaDB
RT : RT : I did a blog on exploiting Java deserialization vulnerabilities:
from twitter
3 days ago
Twitter
RT : Malware Can Hide, But it Must Run get the NEW Poster FREE here!
DFIR  MemoryForensics  from twitter
4 days ago
Kebechet!
RT : Our code challenge winners wrote about the challenge.
python  coding  bsidesaugusta  JWT  from twitter
5 days ago
Twitter
RT : PyREBox - Python scriptable Reverse Engineering Sandbox
Forensics  Analysis  Debugging  from twitter
5 days ago
Twitter
RT : abootool - simple tool to dynamically discover hidden fastboot OEM commands based on static knowledge
woot17  from twitter
5 days ago
Twitter
RT : NEW! plugin to make plugins fully compatible with , now they can be used seamlessly in both…
OllyDbg  x64dbg  from twitter
5 days ago
Twitter
RT : Phinn is a new experimental tool that detects phishing pages with neural networks by…
from twitter
6 days ago
Twitter
RT : RE102 is live now: An introduction to reversing Delphi RTL, shellcode extraction, encryption, unpacking, and evasio…
from twitter
6 days ago
The Go Playground
RT : How to execute shellcode in Go
from twitter
6 days ago
Twitter
RT : Linux Storage Stack Diagram (Kernel 4.10 based) :
from twitter
7 days ago
Twitter
RT : The wait is over. Introducing SC2LE - an RL environment based on StarCraft II from DeepMind and
from twitter
8 days ago
OverTheWire: Wargames
RT : Walkthrough for the first 16 challenges in the Natas series
WarGames  Hacking  CTF  from twitter
8 days ago
GitHub - vtky/Swizzler2: Swizzler2 - Hacking iOS applications
RT : Swizzler 2 was built as a tool to help analyze MDM/EMS iOS applications, with Frida scripts
from twitter
10 days ago
Memory Instructions: Load and Store (Part 4) | Azeria Labs
RT : How the memory instructions Load and Store (LDR and STR) work on ARM (32-bit):
from twitter
10 days ago
Twitter
RT : How the memory instructions Load and Store (LDR and STR) work on ARM (32-bit):
from twitter
10 days ago
Modern Alchemy: Turning XSS into RCE · Doyensec's Blog
RT : Modern Alchemy: Turning XSS into RCE · Doyensec's Blog
from twitter
10 days ago
Untitled (https://www.youtube.com/watch?v=mzjRNvv69M8&sns)
RT : (video) iOS 10.3.2 XPC Userland Jailbreak Exploit Tutorial - CVE-2017-7047 --
from twitter
12 days ago
Java Deserialization Exploit Resulting RCE on Thick Client Penetration Testing
RT : Java Deserialization Exploit Resulting RCE on Thick Client Application
from twitter
12 days ago
Tyranid's Lair: DG on Windows 10 S: Abusing InstallUtil
RT : Final post on Win10S. Thought I'd drop a similar but different DG bypass using an old friend, InstallUtil.
from twitter
14 days ago
GitHub - p3nt4/Piper: Creates a local or remote port forwarding through named pipes.
RT : Powershell script to do local and remote port forwarding through named pipes.
from twitter
15 days ago
Twitter
RT : Learn how to exploit a **stack overflow** in kernel-land on this ARM machine.
from twitter
15 days ago
How to use a single download to remotely steal proprietary files from MacOS
RT : Do not open local html files in Safari! They can send your SSH keys to the remote server. Hunting the Files!
from twitter
15 days ago
Untitled (https://www.youtube.com/watch?v=s5gOW-N9AAo)
RT : Today's stream by on Windows Kernel Debugging setup was awesome!
It's already archived btw:
from twitter
15 days ago
Twitter
RT : This is really ridiculous,
So basic... no external tools required...
from twitter
15 days ago
GitHub - airbus-seclab/crashos
RT : CrashOS - Attempts to identify vulnerabilities in hypervisors by creating unusual system configurations.
from twitter
16 days ago
Hyper-V Internals: Hyper-V debugging for beginners
RT : [2015] Hyper-V debugging for beginners

Good Read There.
from twitter
16 days ago
Volatility, my own cheatsheet (Part 6): Windows Registry
RT : Volatility Cheatsheets (1-6) Part 6: , Part 5 : , Part 4 : cc
from twitter
16 days ago
GitHub - luctalpe/WMIMon: Tool to monitor WMI activity on Windows
RT : WMIMon - Tool to monitor WMI activity on Windows - seems interesting but need to test it with some framework/malware
from twitter
17 days ago
wsh with ARM · endrazine/wcc Wiki · GitHub
RT : Debugging ARM binaries on x86_64 without a VM thanks to qemu user mode emulation + wsh
defcon  witchcraft  from twitter
17 days ago
Twitter
RT : Our researchers analyzed a patch of a virtual machine escape on VMware. Our findings. via…
from twitter
18 days ago
Analyzing a Patch of a Virtual Machine Escape on VMware | McAfee Blogs
RT : Our researchers analyzed a patch of a virtual machine escape on VMware. Our findings. via…
from twitter
18 days ago
« earlier      
#blog #fr #hacking #homepage #js #security 00 01 02 03 05 06 0day 159460 2009 31c3 32c3 44con academic activedirectory adfsl ai alabama analysis androguard android anonym8 anonymous antisandbox antisec apple apps appsec architecture arm arp arpy art ashley aslr asm audit auditingtool awesome aws b2b backdoor backdoors backtrack backup bash belgrade beroot bheu bhusa bigdata binwalk birmingham bitlocker bittorrent blackhat blackhateu blackhole blind_sqli blog blogpost blueteam bluetooth bm book books boot boot2root bootkit bro_ids browser browsers brucon bruteforce bruteforcer bsideschallenge bsideslisbon bsideslondon bugbounty burp bypass campc canvas capstone capstoneinside captcha capture centos charliehebdo chart cheatsheet checkitout checklist chisel chrome cisco ciscotalos civ climber cloud cms cocoa code codebits codebits2011 codetainer coding colorado comedy comic conf confoo connections crack crackme crawler cronjob crossplatformdisassembler crosssitescripting crowbar crypto cryptohaven cryptoparty cryptowall csp csrf css ctf cuckoo curiosity cyber cyber_warfare cybercrime cybersecurity dahboo7 dailywtf data dataexfiltrationtoolkit datascience db dbgkit dc4420 deal deals debugger debugging decompiler deeplearning defcon defense derbycon design det detection dev devel devops dfir dfirsummit dfrws dirtycow disassembler discover diy dl dll dns doc docker dockersecurity dominator dos dropbox duqu earth eclipse elasticsearch electronics elf elixirlang emacs emet empire encryption equationgroup erlang escalating ettercap event exploit exploitation exploitkit fail fb firefox flame forensic forensics foss fr framework free freebsd fridayreads fun funny future fuzzer fuzzing game gamedev games gaming gdb geek geographyofpoverty git github gnome gnu golang google googleplay graph graphs grrcon gtd gui hack hack2learn hacker hackerone hackers hackersonlineclub hacking hackingteam hacklu hackpra hardening hardware hash hashcat heartbleed hitb2016ams hitb2017ams hitbgsec homepage honeypot howto html html5 https humor hunter icloud icon icons ida ids ie ie6 ie9 infosec infrastructure injection ioc ios iphone ipv6 ipython iso it italy itsec j2ee j2eescan jaff java javaone javascript jesuischarlie jobs jquery js jsrat jvm kali kalilinux katoolin kekeo kernel keylogger kibana lab learn leopard lfi libsigrokdecode links linux live locky lowpower lynis mac macbook machinelearning macos macosx mail maltego malware malwareanalysis malwaremustdie manager manual map math mbr metasploit microsoft mimikatz mitm mobile model modeling money monitoring moon movies movp mq msf mysql nasa neo4j netbook netsec network networking neutrinobot news nginx nginxday nmap nodejs noriben notsosecure nsa nsm ntp numpy ohm2013 oldschool oldschoolbackdoors oleoutlook ollydbg opensource openssl oprahssl oracle os oss osx owasp pacsec pandas paper password patch pdf pe penetrationtest pentest pentesters pentesting pentestlab perceptual persistence personal pestudio pgp phishing php pki plot poc poc2014 portable portugal postgresql powershell privacy privilegeescalation processexplorer productivity programming proxy pshitt pwn2own python qt quotes ransomware raspberrypi raspberrypi2 rce re realtime recipes recon14 reconmtl regex rehints rekall remcos remwa repy2exe retrogaming reverse reverse_engineering reverseengineering reversing rkt rodeoide root rop ror rowhammer ruby ructfe samba sandbox sans sanspentestblog scada scanner screencast screencasts sdo search sec14 security securitymanager seo serbia shadowbrokers shellcode shellcoding shellter slides sniffer snippet snmp snowleopard social software source sp17 space splunk sqli sqlilab sqlinjection ss7map ssh ssl starttls startups stat stats stuxnet sun suricata svg sync sysadmin syslog tbt tech terminal testbed thn threat threathunting tip tips tool tools toolswatch tor tr16 tricks trojan truestory tutorial tv tweak ubuntu ue4 uefi ui unix url usa usb usenix vault7 video videos vietnam virginia virtualization viz vm voip volatility vpn vulnerability vulnhub waf wearables web web-dev web2py webapp webdev websec websecurity webvulscan wii wikileaks win windbg windows windows8 wordpress worldphotographyday wpa wpscan writeup wxpython x64dbg xslt xss xxe yara zeronighs zeronights

Copy this bookmark:



description:


tags: