Introducing ANGRYPUPPY
http://ift.tt/2vzbRgF
Submitted August 04, 2017 at 03:36PM by mdsec
via reddit http://ift.tt/2uqM59s
http://ift.tt/2vzbRgF
Submitted August 04, 2017 at 03:36PM by mdsec
via reddit http://ift.tt/2uqM59s
www.mdsec.co.uk
Introducing ANGRYPUPPY – MDSec
Automating lateral movement with ANGRYPUPPY
Using Hover to Compromise the Confidentiality of User Input on Android
http://ift.tt/2vyMDiB
Submitted August 04, 2017 at 04:43PM by lyinch
via reddit http://ift.tt/2wrBmwJ
http://ift.tt/2vyMDiB
Submitted August 04, 2017 at 04:43PM by lyinch
via reddit http://ift.tt/2wrBmwJ
How to get a Super Stelfy Shell (that AV doesn't pick up) - Tutorials - 0x00sec
http://ift.tt/2vw1c5B
Submitted August 04, 2017 at 05:51PM by maxxori
via reddit http://ift.tt/2vzbJ0M
http://ift.tt/2vw1c5B
Submitted August 04, 2017 at 05:51PM by maxxori
via reddit http://ift.tt/2vzbJ0M
0x00sec - The Home of the Hacker
How to get a Super Stelfy Shell (that AV doesn't pick up)
Getting Stealthy with Stelf Hello 0x00'ers! In this tutorial, I am going to be giving away some content that has been sought after for a long time. Everybody knows that most prebuilt tools such as Metasploit don't work, payloads generated by them, or…
Steganography in contemporary cyberattacks
http://ift.tt/2hqFn1O
Submitted August 04, 2017 at 04:12AM by stevewatson301
via reddit http://ift.tt/2v3m9UL
http://ift.tt/2hqFn1O
Submitted August 04, 2017 at 04:12AM by stevewatson301
via reddit http://ift.tt/2v3m9UL
Securelist
Steganography in contemporary cyberattacks
Today, a dangerous new trend is emerging: steganography is increasingly being used by actors creating malware and cyber-espionage tools. Most modern anti-malware solutions provide little, if any, protection from steganography, while any carrier in which a…
Turning XSS into RCE in all Electron-based apps (Slack, Atom, Visual Studio Code, WordPress Desktop, Basecamp3, Mattermost, ..)
http://ift.tt/2vAp7l8
Submitted August 04, 2017 at 10:42PM by nibblesec
via reddit http://ift.tt/2wsFXyI
http://ift.tt/2vAp7l8
Submitted August 04, 2017 at 10:42PM by nibblesec
via reddit http://ift.tt/2wsFXyI
Doyensec
Modern Alchemy: Turning XSS into RCE · Doyensec's Blog
Doyensec's Blog :: Doyensec is an independent security research and development company focused on vulnerability discovery and remediation.
A zebra in sheep’s clothing: How a Microsoft icon-display bug in Windows allows attackers to masquerade PE files with special icons
http://ift.tt/2uoQ46f
Submitted August 04, 2017 at 09:40PM by another_philip
via reddit http://ift.tt/2vzPVC9
http://ift.tt/2uoQ46f
Submitted August 04, 2017 at 09:40PM by another_philip
via reddit http://ift.tt/2vzPVC9
Keybase Browser Extension Insecure
http://ift.tt/2v6sAX8
Submitted August 05, 2017 at 04:41PM by mickeyc
via reddit http://ift.tt/2fh8RPh
http://ift.tt/2v6sAX8
Submitted August 05, 2017 at 04:41PM by mickeyc
via reddit http://ift.tt/2fh8RPh
reddit
Keybase Browser Extension Insecure • r/netsec
3 points and 0 comments so far on reddit
Automobile Hacking, Part 1: The CAN Protocol | hackers-arise
http://ift.tt/2vy7mCd
Submitted August 05, 2017 at 07:51PM by maxxori
via reddit http://ift.tt/2hxrP4H
http://ift.tt/2vy7mCd
Submitted August 05, 2017 at 07:51PM by maxxori
via reddit http://ift.tt/2hxrP4H
hackers-arise
Automobile Hacking, Part 1: The CAN Protocol | hackers-arise
Automobile hacking is one of the leading edge areas of our hacking discipline. As our automobiles have become smarter and smarter, they include more and more el...
setattrlist() iOS Kernel Vulnerability Explained
http://ift.tt/2wsaJIf
Submitted August 05, 2017 at 08:53PM by maxxori
via reddit http://ift.tt/2wheS2g
http://ift.tt/2wsaJIf
Submitted August 05, 2017 at 08:53PM by maxxori
via reddit http://ift.tt/2wheS2g
reddit
setattrlist() iOS Kernel Vulnerability Explained • r/netsec
1 points and 2 comments so far on reddit
Java Deserialization Exploit Resulting RCE on Thick Client Application
http://ift.tt/2ue5yyM
Submitted August 05, 2017 at 11:00PM by sandeep1337
via reddit http://ift.tt/2ubZNxw
http://ift.tt/2ue5yyM
Submitted August 05, 2017 at 11:00PM by sandeep1337
via reddit http://ift.tt/2ubZNxw
SecureLayer7
JavaDeserialization Exploit Resulting RCE on Thick Client Penetration Testing
Rebooting Public Sector Cybersecurity
http://ift.tt/2fayjG3
Submitted August 06, 2017 at 02:03AM by Synesthesia108
via reddit http://ift.tt/2firCll
http://ift.tt/2fayjG3
Submitted August 06, 2017 at 02:03AM by Synesthesia108
via reddit http://ift.tt/2firCll
Accenture
Rebooting Public Sector Cybersecurity | Accenture
Read Accenture's report about how US government agencies are confident in their overall cybersecurity strategies.
Hacking a custom architecture at DEF CON CTF
http://ift.tt/2vE0G6y
Submitted August 06, 2017 at 04:24PM by dhlanm
via reddit http://ift.tt/2v94YBu
http://ift.tt/2vE0G6y
Submitted August 06, 2017 at 04:24PM by dhlanm
via reddit http://ift.tt/2v94YBu
dttw.tech
Down to the Wire
Down to the Wire is a collaborative project hosted by a group of students across the country. Topics range from hardware to software to security.
Radare2 vs. GDB-PEDA
http://ift.tt/2vDmj68
Submitted August 07, 2017 at 04:14AM by _____WINTERMUTE_____
via reddit http://ift.tt/2wxGSy8
http://ift.tt/2vDmj68
Submitted August 07, 2017 at 04:14AM by _____WINTERMUTE_____
via reddit http://ift.tt/2wxGSy8
Hack with Github: Hacking Lists Index
http://ift.tt/2frLQHm
Submitted August 07, 2017 at 06:41AM by mathmare
via reddit http://ift.tt/2vDIUj4
http://ift.tt/2frLQHm
Submitted August 07, 2017 at 06:41AM by mathmare
via reddit http://ift.tt/2vDIUj4
GitHub
Hack-with-Github/Awesome-Hacking
Awesome-Hacking - A collection of various awesome lists for hackers, pentesters and security researchers
WSH Injection: A Case Study
http://ift.tt/2v0u59u
Submitted August 07, 2017 at 04:51PM by maxxori
via reddit http://ift.tt/2vHub7z
http://ift.tt/2v0u59u
Submitted August 07, 2017 at 04:51PM by maxxori
via reddit http://ift.tt/2vHub7z
Posts By SpecterOps Team Members
WSH Injection: A Case Study
At BSides Nashville 2017, Casey Smith (@SubTee) and I gave a talk noscriptd Windows Operating System Archaeology. At this talk, we released a…
New Variants of Agent.BTZ Found: The Threat That Hit The Pentagon Still Evolving Part 1/2
http://ift.tt/2vFjiCs
Submitted August 07, 2017 at 06:02PM by 0xbaadf00dsec
via reddit http://ift.tt/2uitiCc
http://ift.tt/2vFjiCs
Submitted August 07, 2017 at 06:02PM by 0xbaadf00dsec
via reddit http://ift.tt/2uitiCc
reddit
New Variants of Agent.BTZ Found: The Threat That Hit... • r/netsec
6 points and 0 comments so far on reddit
Riscure HackMe 3 Hardware CTF
http://ift.tt/2toOdmt
Submitted August 07, 2017 at 05:12PM by alegen
via reddit http://ift.tt/2fma1c2
http://ift.tt/2toOdmt
Submitted August 07, 2017 at 05:12PM by alegen
via reddit http://ift.tt/2fma1c2
Riscure
News - RHme3
Welcome to RHme3, the world’s first automotive CTF
Abusing GDI objects for ring0 primitives revolution
http://ift.tt/2vV7bPo
Submitted August 07, 2017 at 05:06PM by maxxori
via reddit http://ift.tt/2hBY9Ue
http://ift.tt/2vV7bPo
Submitted August 07, 2017 at 05:06PM by maxxori
via reddit http://ift.tt/2hBY9Ue
Sensepost
SensePost | Abusing gdi objects for ring0 primitives revolution
Leaders in Information Security
Horus Scenario – Exploiting a weak spot in the power grid
http://ift.tt/2u7GWDP
Submitted August 07, 2017 at 05:00PM by campuscodi
via reddit http://ift.tt/2flt5r8
http://ift.tt/2u7GWDP
Submitted August 07, 2017 at 05:00PM by campuscodi
via reddit http://ift.tt/2flt5r8
reddit
Horus Scenario – Exploiting a weak spot in the power grid • r/netsec
1 points and 0 comments so far on reddit
Shellcode: Windows API hashing with block ciphers (Maru Hash)
http://ift.tt/2va62VJ
Submitted August 07, 2017 at 09:52PM by maxxori
via reddit http://ift.tt/2vcaZx4
http://ift.tt/2va62VJ
Submitted August 07, 2017 at 09:52PM by maxxori
via reddit http://ift.tt/2vcaZx4
modexp
Shellcode: Windows API hashing with block ciphers ( Maru Hash )
Introduction String/Pattern Matching Algorithms are by far the most popular and easy way to detect a shellcode. The principle is simple: all codes have unique characteristics that can be used as si…