4568
showing only twitter [see all]
Ken Shirriff's blog: Why the Z-80's data pins are scrambled
RT : Great concise silicon reversing article even for software folks
from twitter
4 days ago
» Tools Vicente Aguilera Diaz
RT : Handy tool: tinfoleak – get detailed information about a Twitter user's activity:
from twitter
5 days ago
Errata Security: Bash 'shellshock' scan of the Internet
Bash Code Injection Vulnerability via Specially Crafted Environment Variables (CVE-2014-6271)
from twitter
6 days ago
Yelp/osxcollector · GitHub
RT : RT : Analyzing Mac malware -add this one to your collection: OSXCollector
from twitter
6 days ago
Raspberry Pi Projects
Raspberry Pi Projects from instructables
from twitter
7 days ago
jQuery
malware attack puts privileged enterprise it accounts at risk
from twitter
7 days ago
Under the hood of the new Azure Portal // Justin Beckwith
RT : Iframe sandbox ftw "rt : Cool look under the hood of the implementation of the Azure portal "
from twitter
7 days ago
[Part2] I was asked to crack a program in a job interview !
[Part2] I was asked to crack a program in a job interview
re  from twitter
8 days ago
I was just asked to crack a program in a job interview !
I was just asked to crack a program in a job interview
re  from twitter
13 days ago
jipegit/OSXAuditor · GitHub
RT : OS X Auditor - a free Mac OS X computer forensics tool.
from twitter
14 days ago
Metasploit: Major Android Bug is a Privacy Disa... | SecurityStreet
Major Android Bug is a Privacy Disaster (CVE-2014-6041) ( bypass)
sop  from twitter
15 days ago
Untitled (https://eprint.iacr.org/2014/248.pdf)
Fine grain Cross-VM Attacks (against AES keys) on Xen and VMware are possible!
from twitter
15 days ago
ida sploiter | projects | sprawl
IDA Sploiter - plugin for Hex-Ray's IDA Pro disassembler for exploit development and vulnerability research
rop  re  from twitter
15 days ago
Rpcsniffer by AdiKo
RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process
python  from twitter
16 days ago
Untitled (http://cryptome.org/2014/09/vulcan-cryptanalysis.pdf)
RT : Neat RE and cryptanalysis of a cipher used in 1st generation Motorola encrypted radios. via
from twitter
17 days ago
Untitled (http://jessekornblum.com/presentations/dodcc11-2.pdf)
RT : Windows Memory Forensics and
Direct Kernel Object Manipulation:
from twitter
19 days ago
Live Raizo - Network Simulator | SourceForge.net
Live Raizo - Network Simulator:
Live USB/DVD to simulate networks and system administration experiment
lab  from twitter
20 days ago
Project Flashbang - Cure53
RT : new(ish) swf decompiler that will automagically give you the files exposed flashVars (so you can xss, etc) -
from twitter
21 days ago
36 resources and articles from data science and big data bloggers - Data Science Central
36 Resources And Articles From Data Science And Big Data Bloggers (R, data science, Python, machine learning)
from twitter
23 days ago
WebEdition 6.3.8-s1 Captcha Remote Code Execution Vulnerability | SektionEins GmbH
RT : WebEdition CMS Captcha Gone Wrong or How To Execute PHP Code Through Your Captcha
from twitter
25 days ago
Hacking Facebook’s Legacy API, Part 2: Stealing User Sessions
Hacking Facebook’s Legacy API, Part 2: Stealing User Sessions
from twitter
28 days ago
Memory Forensics: Recommending Reading - A new resource for those looking to learn
RT : I have created a new page that centralizes all of my book recommendations across , reversing, , etc.:
dfir  infosec  from twitter
4 weeks ago
Untitled (http://www.ing.unibs.it/~salga/pub/2009-tunnel.pdf)
RT : Tunnel Hunter: Detecting Application-Layer Tunnels with Statistical Fingerprinting
from twitter
4 weeks ago
PlotDevice: a Python-based graphics environment for the Mac
PlotDevice: a Python-based graphics environment for the Mac
from twitter
4 weeks ago
Attachment 930687 Details for Bug 1119128
RT : You can download our glibc exploit for Fedora 20 here
from twitter
5 weeks ago
Untitled (https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-egele.pdf)
RT : Using runtime (dynamic) features to match functions ala BinDiff (but more accurate):
from twitter
5 weeks ago
Hexacorn | Blog
RT : Protecting VMWare from CPUID hypervisor detection
malware  DFIR  from twitter
5 weeks ago
Hardening Framework
MT : Automatic Server Hardening Framework
from twitter
5 weeks ago
Index of /DEF CON 22/DEF CON 22 ics village
RT : More 22 goodies - all the pcaps from are available to download! Pass it on!
defcon  from twitter
5 weeks ago
« earlier      
#blog #fr #hacking #homepage #js #security 00 01 02 03 05 06 0day 2009 academic ai analysis android anonymous antisec apple apps aslr asm aws backdoor backdoors backtrack backup bash bitlocker blackhat blackhateu blackhole blind_sqli blog bluetooth bm book books boot boot2root bootkit browser brucon bsideschallenge bsideslondon burp canvas captcha chart cheatsheet checkitout checklist chrome cloud cms cocoa code codebits codebits2011 coding comedy comic conf crack crawler cryptoparty csp csrf css ctf cyber_warfare db dc4420 deal deals defcon design dev dfir dfirsummit diy dns doc dominator dropbox duqu electronics emet encryption erlang escalating ettercap event exploit fail fb firefox flame forensic forensics fr framework free fuzzer fuzzing game games gaming gdb geek gnome google googleplay graph graphs gtd gui hack hacking hackingteam hardware hashcat heartbleed homepage honeypot howto html html5 icon icons ida ids ie ie6 ie9 infosec injection ios iphone ipv6 iso itsec java javascript jobs jquery js jvm kernel kibana lab learn leopard lfi links linux live lowpower mac mail malware malwareanalysis manager manual map mbr metasploit mimikatz mitm mobile model modeling money monitoring movies movp mq msf mysql netbook netsec network news nginx nginxday nmap notsosecure ohm2013 ollydbg opensource openssl oracle os oss osx owasp paper password patch pdf pentest pentestlab personal pgp php pki plot portable powershell privacy productivity programming proxy pshitt pwn2own python qt raspberrypi rce re recipes recon14 reverse_engineering reverseengineering reversing ror ruby sandbox sans scada scanner screencast screencasts search security securitymanager seo shellcode slides sniffer snippet snmp snowleopard social software source sqli sqlinjection ssh ssl startups stat stats stuxnet suricata svg sync sysadmin syslog tech terminal testbed thn threat tip tips tool tools toolswatch tor tricks trojan truestory tutorial tv tweak ui url usb video videos virtualization viz vm voip volatility vpn vulnerability waf web web-dev web2py webdev webvulscan wii win windbg windows windows8 wordpress wpa writeup wxpython xss xxe zeronights

Copy this bookmark:



description:


tags: