Android Applications Reversing 101
https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/
https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/
evilsocket
Android Applications Reversing 101
Every day we see a bunch of new Android applications being published on the Google Play Store, from games, to utilities, to IoT devices clients and so forth, almost every single aspect of our life can
FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerable devices and they are showed on the map for analysis. All data updated in Firebase are Realtime.
https://github.com/Warflop/FireShodanMap
https://github.com/Warflop/FireShodanMap
GitHub
GitHub - Warflop/FireShodanMap: FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried…
FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerable devices and they are showed on the map for analysis. All ...
ret2libc without function calls (x86)
https://hovav.net/ucsd/dist/geometry.pdf
https://hovav.net/ucsd/dist/geometry.pdf
Forwarded from Rayanfam (Sina)
Blog post about anti-anti-vm techniques 😊
https://rayanfam.com/topics/defeating-malware-anti-vm-techniques-cpuid-based-instructions/
https://rayanfam.com/topics/defeating-malware-anti-vm-techniques-cpuid-based-instructions/
Rayanfam Blog
Defeating malware’s Anti-VM techniques (CPUID-Based Instructions)
We write about Windows Internals, Hypervisors, Linux, and Networks.
New 'Lazy FP State Restore' Vulnerability Found in All Modern Intel CPUs
https://thehackernews.com/2018/06/intel-processor-vulnerability.html
https://thehackernews.com/2018/06/intel-processor-vulnerability.html
The Hacker News
New 'Lazy FP State Restore' Vulnerability Found in All Modern Intel CPUs
New 'Lazy FP State Restore' vulnerability (CVE-2018-3665) has been discovered in Sandy Bridge and newer Intel processors
Proposed Security Patch: Replacement of use of SHA-1 in the SRP Client Proof with SHA-256
http://tracker.firebirdsql.org/browse/CORE-5788
http://tracker.firebirdsql.org/browse/CORE-5788
Network Firewalls acts as a fortification to keep the internal corporate network secure. Many people often think as it is protecting a device from incoming traffic. Most outbound connections are insecure without egress traffic filtering. If Egress Traffic Filtering failed then attackers bypass firewall to command and control the external network Egress filter out traffic […]
The post EgressBuster – Compromise Victim via Command & Control using Firewall (https://gbhackers.com/bypass-firewall-command-control/) appeared first on GBHackers On Security (https://gbhackers.com/).
The post EgressBuster – Compromise Victim via Command & Control using Firewall (https://gbhackers.com/bypass-firewall-command-control/) appeared first on GBHackers On Security (https://gbhackers.com/).
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Bypass Firewall and permits command and control to the external network
Attackers can use these techniques to bypass Firewall collect and forward sensitive information from your network or to attack or spam other networks.