https://github.com/mxrch/penglab
Penglab
Penglab is a ready-to-install setup on Google Colab for cracking passwords with an incredible power, really useful for CTFs.
#tools #opensource #crack #gpu
Penglab
Penglab is a ready-to-install setup on Google Colab for cracking passwords with an incredible power, really useful for CTFs.
#tools #opensource #crack #gpu
GitHub
GitHub - mxrch/penglab: 🐧 Abuse of Google Colab for cracking hashes.
🐧 Abuse of Google Colab for cracking hashes. Contribute to mxrch/penglab development by creating an account on GitHub.
HashCat added support to crack password-protected RAR 3 archives without header encryption (both compressed and uncompressed).
https://github.com/hashcat/hashcat/pull/2542
https://github.com/hashcat/hashcat/pull/2542
GitHub
Fixes #1334: Added -m 23700/23800 = RAR3-p cracking by philsmd · Pull Request #2542 · hashcat/hashcat
This new pull request adds both uncompressed (-m 23700) and compressed (-m 23800) password-protected RAR3 cracking support (where the headers are not encrypted, RAR3-hp was already supported by -m ...
ARM64 Reversing and Exploitation
Part 1: http://highaltitudehacks.com/2020/09/05/arm64-reversing-and-exploitation-part-1-arm-instruction-set-heap-overflow/
Part 2: http://highaltitudehacks.com/2020/09/06/arm64-reversing-and-exploitation-part-2-use-after-free/
Part 3: http://highaltitudehacks.com/2020/09/06/arm64-reversing-and-exploitation-part-3-a-simple-rop-chain/
Part 1: http://highaltitudehacks.com/2020/09/05/arm64-reversing-and-exploitation-part-1-arm-instruction-set-heap-overflow/
Part 2: http://highaltitudehacks.com/2020/09/06/arm64-reversing-and-exploitation-part-2-use-after-free/
Part 3: http://highaltitudehacks.com/2020/09/06/arm64-reversing-and-exploitation-part-3-a-simple-rop-chain/
Prateekg147
ARM64 Reversing and Exploitation Part 1 - ARM Instruction Set + Simple Heap Overflow
Hi Everyone ! In this blog series, we will be understanding the ARM instruction set and using that to reverse ARM Binaries followed by writing exploits for them. So let’s start with the basics of ARM64.
StreamDivert: Relaying (specific) network connections
The first part of this blog will be the story of how this tool found it’s way into existence, the problems we faced and the thought process followed. The second part will be a more technical deep dive into the tool itself, how to use it, and how it works.
https://research.nccgroup.com/2020/09/10/streamdivert-relaying-specific-network-connections/
#redteaming #windows #tools
The first part of this blog will be the story of how this tool found it’s way into existence, the problems we faced and the thought process followed. The second part will be a more technical deep dive into the tool itself, how to use it, and how it works.
https://research.nccgroup.com/2020/09/10/streamdivert-relaying-specific-network-connections/
#redteaming #windows #tools
Iran denies any involvement in the attack against 2020 US election
https://ift.tt/3ihEQud
https://ift.tt/3ihEQud
Security Affairs
Iran denies any involvement in the attack against 2020 US election
Iranian government denies Microsoft's allegations related to alleged attacks against individuals involved in 2020 US presidential election
Zerologon: Unauthenticated domain controller compromise by subverting Netlogon cryptography (CVE-2020-1472)
https://www.secura.com/pathtoimg.php?id=2055
https://www.secura.com/pathtoimg.php?id=2055
English
404 Page
Unfortunately, this page cannot be found.
The 101 of ELF files on Linux: Understanding and Analysis
https://linux-audit.com/elf-binaries-on-linux-understanding-and-analysis
https://linux-audit.com/elf-binaries-on-linux-understanding-and-analysis
Linux Audit
The 101 of ELF files on Linux: Understanding and Analysis
An step-by-step introduction into ELF files. Learn the structure and format, to understand how binaries and libraries on Linux systems work.
■■■■■ #Microsoft #Exchange server Remote #CodeExecution [#RCE] reported via anonymous researcher.
https://www.thezdi.com/blog/2020/2/24/cve-2020-0688-remote-code-execution-on-microsoft-exchange-server-through-fixed-cryptographic-keys
https://www.thezdi.com/blog/2020/2/24/cve-2020-0688-remote-code-execution-on-microsoft-exchange-server-through-fixed-cryptographic-keys
Zero Day Initiative
Zero Day Initiative — CVE-2020-0688: Remote Code Execution on Microsoft Exchange Server Through Fixed Cryptographic Keys
This most recent Patch Tuesday, Microsoft released an Important-rated patch to address a remote code execution bug in Microsoft Exchange Server. This vulnerability was reported to us by an anonymous researcher and affects all supported versions of Microsoft…
Microsoft open sources its internal fuzzing utility.
OneFuzz: - A self-hosted Fuzzing-As-A-Service platform
https://github.com/microsoft/onefuzz
Further reading: https://www.theregister.com/2020/09/16/microsoft_open_sources_fuzzing_tool/
OneFuzz: - A self-hosted Fuzzing-As-A-Service platform
https://github.com/microsoft/onefuzz
Further reading: https://www.theregister.com/2020/09/16/microsoft_open_sources_fuzzing_tool/
GitHub
GitHub - microsoft/onefuzz: A self-hosted Fuzzing-As-A-Service platform
A self-hosted Fuzzing-As-A-Service platform. Contribute to microsoft/onefuzz development by creating an account on GitHub.
Microsoft made its Project OneFuzz open to the public. This is an open source fuzzing framework for Azure that the tech giant has been using internally for past years to find and patch bugs.
Take a look:
https://github.com/microsoft/onefuzz
Take a look:
https://github.com/microsoft/onefuzz
GitHub
GitHub - microsoft/onefuzz: A self-hosted Fuzzing-As-A-Service platform
A self-hosted Fuzzing-As-A-Service platform. Contribute to microsoft/onefuzz development by creating an account on GitHub.