[Blog] Instant VirusTotal checks from an air-gapped computer
https://ift.tt/3glcLDB
Submitted June 14, 2021 at 10:40PM by RXCR2
via reddit https://ift.tt/3cIuqTL
https://ift.tt/3glcLDB
Submitted June 14, 2021 at 10:40PM by RXCR2
via reddit https://ift.tt/3cIuqTL
hexatomium.github.io
Instant VirusTotal checks from an air-gapped or offline computer
Grab a copy of Mscan, and launch it on the air-gapped Windows machine. Mscan is a simple VirusTotal lookup tool,
with a pretty unusual feature: it supports malware checks on air-gapped computers, through the use of high-density QR codes.
It requires no…
with a pretty unusual feature: it supports malware checks on air-gapped computers, through the use of high-density QR codes.
It requires no…
Incremental Machine Leaning by Example: Detecting Suspicious Activity with Zeek Data Streams, River, and JA3 Hashes
https://ift.tt/3vsaZEZ
Submitted June 14, 2021 at 11:46PM by digicat
via reddit https://ift.tt/3xizyFW
https://ift.tt/3vsaZEZ
Submitted June 14, 2021 at 11:46PM by digicat
via reddit https://ift.tt/3xizyFW
Nccgroup
Cyber Security Research
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
Celeborn: API Unhooker
https://ift.tt/2RZhwJW
Submitted June 15, 2021 at 12:35AM by DarkGrejuva
via reddit https://ift.tt/2RRPW0W
https://ift.tt/2RZhwJW
Submitted June 15, 2021 at 12:35AM by DarkGrejuva
via reddit https://ift.tt/2RRPW0W
GitHub
frkngksl/Celeborn
Userland API Unhooker Project. Contribute to frkngksl/Celeborn development by creating an account on GitHub.
Intel CET In Action | Offensive Security
https://ift.tt/2PCDsJE
Submitted June 14, 2021 at 08:12PM by vyngvangzoomba
via reddit https://ift.tt/35irx7W
https://ift.tt/2PCDsJE
Submitted June 14, 2021 at 08:12PM by vyngvangzoomba
via reddit https://ift.tt/35irx7W
Offensive-Security
Intel CET In Action | Offensive Security
In this article, we'll examine how effective CET is at mitigating real-world exploits that make use of ROP or stack based buffer overflow vulnerabilities.
Technical denoscriptions of 0days found - EC-CUBE, SoyCMS, BaserCMS
https://ift.tt/3ws0RO7
Submitted June 15, 2021 at 08:53AM by toyojuni
via reddit https://ift.tt/2SCKMGt
https://ift.tt/3ws0RO7
Submitted June 15, 2021 at 08:53AM by toyojuni
via reddit https://ift.tt/2SCKMGt
Flatt Security Blog
Technical denoscriptions of 0days found - EC-CUBE, SoyCMS, BaserCMS - Flatt Security Blog
Hi, I’m stypr (@stereotype32) from Flatt Security Inc. As I mentioned earlier in the previous article「Flatt Securityは“自分のやりたいことが実現できる”場所/セキュリティエンジニア stypr - Fla…
Open-source libraries and tools to perform fully homomorphic encryption (FHE)
https://ift.tt/3toHnY6
Submitted June 15, 2021 at 10:49AM by 0xdea
via reddit https://ift.tt/3vumeNb
https://ift.tt/3toHnY6
Submitted June 15, 2021 at 10:49AM by 0xdea
via reddit https://ift.tt/3vumeNb
GitHub
GitHub - google/fully-homomorphic-encryption: Libraries and tools to perform fully homomorphic encryption operations on an encrypted…
Libraries and tools to perform fully homomorphic encryption operations on an encrypted data set. - GitHub - google/fully-homomorphic-encryption: Libraries and tools to perform fully homomorphic enc...
CVE-2019-17240 - Bludit 3.2.9 Auth Bruteforce Bypass in Go lang
https://ift.tt/3gtpDqg
Submitted June 15, 2021 at 12:22PM by spajky_yt
via reddit https://ift.tt/3vknoeg
https://ift.tt/3gtpDqg
Submitted June 15, 2021 at 12:22PM by spajky_yt
via reddit https://ift.tt/3vknoeg
Amit Merchant - Software Engineer
Bludit 3.9.2 - Auth Bruteforce Bypass CVE-2019-17240
When self study for OSCP certification,I stumble upon HTB machine that have CVE-2019-17420 vulnerability. I look for public exploit and there was one written in python. As challenge for me self was to recreate this exploit in golang. So lets get started.
Rediscovering N Days: PAM360 information disclosure
https://ift.tt/3iH5yiR
Submitted June 13, 2021 at 09:06PM by Natural_Decision_446
via reddit https://ift.tt/3cIlWvN
https://ift.tt/3iH5yiR
Submitted June 13, 2021 at 09:06PM by Natural_Decision_446
via reddit https://ift.tt/3cIlWvN
Medium
Rediscovering N Days: PAM360 information disclosure
Penetration testing, one of the great aspects of cybersecurity, working in different projects will increase your contact with large and…
Exploiting outdated Apache Airflow instances
https://ian.sh/airflow
Submitted June 15, 2021 at 02:06PM by albinowax
via reddit https://ift.tt/3gq3OJf
https://ian.sh/airflow
Submitted June 15, 2021 at 02:06PM by albinowax
via reddit https://ift.tt/3gq3OJf
[crypto] Critical Bug Identified in 88mph Awarded with $42,069 Bounty | iosiro
https://ift.tt/3xoEBEU
Submitted June 15, 2021 at 03:07PM by syncikin
via reddit https://ift.tt/3gvJFln
https://ift.tt/3xoEBEU
Submitted June 15, 2021 at 03:07PM by syncikin
via reddit https://ift.tt/3gvJFln
Iosiro
Critical Bug Identified in 88mph Awarded with $42,069 Bounty | iosiro
iosiro identified a critical bug in the fixed-interest-rate lending protocol 88mph. The bug was reported to 88mph through Immunefi for a bounty of $42,069. This blog post details the bug and the disclosure process.
Three investigation Workflows to reduce FALSE POSITIVE ALERTS - AWS; OKTA; CYREN
https://ift.tt/2U8Awq3
Submitted June 15, 2021 at 05:35PM by Sayag_Security
via reddit https://ift.tt/3gEa4MF
https://ift.tt/2U8Awq3
Submitted June 15, 2021 at 05:35PM by Sayag_Security
via reddit https://ift.tt/3gEa4MF
www.hunters.ai
Three Investigation Flows to Reduce Your False-Positive Alerts
Threat investigation methods the SOC can use to deal with stolen AWS credential, Okta SuperHuman activity, phishing attempts and malicious email alerts.
Adversary emulation with Prelude Operator and Elastic Security
https://ift.tt/3xlzZPP
Submitted June 15, 2021 at 06:12PM by sthompsonline
via reddit https://ift.tt/2TvABnh
https://ift.tt/3xlzZPP
Submitted June 15, 2021 at 06:12PM by sthompsonline
via reddit https://ift.tt/2TvABnh
Elastic Blog
Adversary emulation with Prelude Operator and Elastic Security
At Elastic, we’ve been working closely with the team at Prelude to help security teams of all skill levels, arming all analysts and red teams alike. Learn how teams can use Prelude Operator in conjunc...
Finding Privilege Escalation Vulnerabilities in Windows using Process Monitor
https://ift.tt/2SoWYKP
Submitted June 15, 2021 at 10:45PM by sanitybit
via reddit https://ift.tt/3zvR5ME
https://ift.tt/2SoWYKP
Submitted June 15, 2021 at 10:45PM by sanitybit
via reddit https://ift.tt/3zvR5ME
RetroArch for Windows - Versions 1.9.0 - 1.9.4 (High-Risk Vuln)
https://ift.tt/3gF7fuN
Submitted June 15, 2021 at 11:03PM by breach_house
via reddit https://ift.tt/2S1Etw2
https://ift.tt/3gF7fuN
Submitted June 15, 2021 at 11:03PM by breach_house
via reddit https://ift.tt/2S1Etw2
I’m putting a WiFi router into a wall charger (Part 1)
https://ift.tt/3cK9bRq
Submitted June 16, 2021 at 04:07AM by Machinehum
via reddit https://ift.tt/3zE04vB
https://ift.tt/3cK9bRq
Submitted June 16, 2021 at 04:07AM by Machinehum
via reddit https://ift.tt/3zE04vB
Medium
I’m putting a WiFi router into a wall charger (Part 1)
This is the second part of a blog about putting a WiFi router into a phone charger; please see part zero here and feel free to join our…
Handy guide to a new Fivehands ransomware variant: notes from incident response cases..
https://ift.tt/3pW27qc
Submitted June 16, 2021 at 12:10PM by digicat
via reddit https://ift.tt/3xpYBa9
https://ift.tt/3pW27qc
Submitted June 16, 2021 at 12:10PM by digicat
via reddit https://ift.tt/3xpYBa9
Nccgroup
Cyber Security Research
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
Rescue Your Amazon Dash Buttons (By Exploiting Them)
https://ift.tt/2EMrCDF
Submitted June 16, 2021 at 01:43PM by 0xdea
via reddit https://ift.tt/3gvzRI1
https://ift.tt/2EMrCDF
Submitted June 16, 2021 at 01:43PM by 0xdea
via reddit https://ift.tt/3gvzRI1
reddit
Rescue Your Amazon Dash Buttons (By Exploiting Them)
Posted in r/netsec by u/0xdea • 1 point and 0 comments
Unauthenticated Gitlab SSRF through CI Lint API
https://ift.tt/2S0qfeJ
Submitted June 16, 2021 at 02:51PM by root_at_remote_host
via reddit https://ift.tt/2SGKPky
https://ift.tt/2S0qfeJ
Submitted June 16, 2021 at 02:51PM by root_at_remote_host
via reddit https://ift.tt/2SGKPky
reddit
Unauthenticated Gitlab SSRF through CI Lint API
Posted in r/netsec by u/root_at_remote_host • 1 point and 0 comments
Microsoft ADCS – Abusing PKI in Active Directory Environment
https://ift.tt/3cKpAFr
Submitted June 16, 2021 at 07:09PM by pheedrus
via reddit https://ift.tt/3iLxDWn
https://ift.tt/3cKpAFr
Submitted June 16, 2021 at 07:09PM by pheedrus
via reddit https://ift.tt/3iLxDWn
RiskInsight
Microsoft ADCS – Abusing PKI in Active Directory Environment - RiskInsight
Active Directory Certificate Services (ADCS) have never really been under security scrutiny until a few years ago (by C. Falta and later Q&D Security). We will therefore focus today on how similar techniques can be used to gain Domain Admins privileges.
Network Tracking using Wireshark and Google Maps
https://ift.tt/3eRFcsd
Submitted June 17, 2021 at 12:58AM by burdin271
via reddit https://ift.tt/3wwQacV
https://ift.tt/3eRFcsd
Submitted June 17, 2021 at 12:58AM by burdin271
via reddit https://ift.tt/3wwQacV
Medium
Python Cybersecurity— Network Tracking using Wireshark and Google Maps
In this article we will dive into Network Traffic visualization using the Python programming language, Wireshark and Google Maps. This…
Using Monday.com's project manager as a command & control server
https://ift.tt/35vQ0GQ
Submitted June 17, 2021 at 10:37AM by TorchedXorph
via reddit https://ift.tt/3zInnEu
https://ift.tt/35vQ0GQ
Submitted June 17, 2021 at 10:37AM by TorchedXorph
via reddit https://ift.tt/3zInnEu
GitHub
publications/README.md at main · 1d8/publications
CVE/Research Publications. Contribute to 1d8/publications development by creating an account on GitHub.