http://www.blackstormsecurity.com/docs/DEFCON2018.pdf
Ring0/-2 Rootkits Defcon 2018
Ring0/-2 Rootkits Defcon 2018
The most complex exploit of the century 😐
https://www.exploit-db.com/exploits/45186/
https://www.exploit-db.com/exploits/45186/
Archery is an opensource vulnerability assessment and management tool which helps developers and pentesters to perform scans and manage vulnerabilities. Archery uses popular opensource tools to perform comprehensive scanning for web application and network. It also performs web application dynamic authenticated scanning and covers the whole applications by using selenium. The developers can also utilize the tool for implementation of their DevOps CI/CD environment.
https://github.com/archerysec/archerysec
https://github.com/archerysec/archerysec
GitHub
GitHub - archerysec/archerysec: ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.
ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec. - archerysec/archerysec
Researchers Disclose New Foreshadow (L1TF) Vulnerabilities Affecting Intel CPUs
https://www.bleepingcomputer.com/news/security/researchers-disclose-new-foreshadow-l1tf-vulnerabilities-affecting-intel-cpus/
Academics and private sector researchers have revealed details today about three new vulnerabilities affecting Intel CPUs. [...]
https://www.bleepingcomputer.com/news/security/researchers-disclose-new-foreshadow-l1tf-vulnerabilities-affecting-intel-cpus/
Academics and private sector researchers have revealed details today about three new vulnerabilities affecting Intel CPUs. [...]
BleepingComputer
Researchers Disclose New Foreshadow (L1TF) Vulnerabilities Affecting Intel CPUs
Academics and private sector researchers have revealed details today about three new vulnerabilities affecting Intel CPUs.
Exploring, Exploiting Active Directory Admin Flaws
https://www.darkreading.com/vulnerabilities---threats/exploring-exploiting-active-directory-admin-flaws/d/d-id/1332593?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
Common methods AD administrators use to protect their environments can easily be exploited. Here's how.
https://www.darkreading.com/vulnerabilities---threats/exploring-exploiting-active-directory-admin-flaws/d/d-id/1332593?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
Common methods AD administrators use to protect their environments can easily be exploited. Here's how.
Dark Reading
Exploring, Exploiting Active Directory Admin Flaws
Common methods AD administrators use to protect their environments can easily be exploited. Here's how.