Emulating Exynos 4210 BootROM in QEMU
http://ift.tt/2tBuS1U
Submitted March 11, 2018 at 12:52AM by PapouDesCarpates
via reddit http://ift.tt/2Get2qt
http://ift.tt/2tBuS1U
Submitted March 11, 2018 at 12:52AM by PapouDesCarpates
via reddit http://ift.tt/2Get2qt
fred's notes
Emulating Exynos 4210 BootROM in QEMU
QEMU has support for the SMDKC210 machine, an ARM board based on Exynos 4210 SoC. Peripherals implemented in QEMU for this machine are UART, SDHCI, FIMD, I2C, Interrupt Combiner, GIC, Clock, PMU, RNG, MCT, PWM, RTC. Samsung Galaxy S2 phone is also based on…
How To Secure The Network Edge
http://ift.tt/2FPvfIy
Submitted March 11, 2018 at 01:12AM by speckz
via reddit http://ift.tt/2p47e8J
http://ift.tt/2FPvfIy
Submitted March 11, 2018 at 01:12AM by speckz
via reddit http://ift.tt/2p47e8J
Semiconductor Engineering
How To Secure The Network Edge
The risk of breaches is growing, and so is the potential damage.
Rootstealer, Program to detect when linux user opens terminal with root and inject intrusive commands in terminal
http://ift.tt/2oYroBJ
Submitted March 11, 2018 at 01:13AM by al-maisan
via reddit http://ift.tt/2FrdVNb
http://ift.tt/2oYroBJ
Submitted March 11, 2018 at 01:13AM by al-maisan
via reddit http://ift.tt/2FrdVNb
GitHub
CoolerVoid/rootstealer
rootstealer - X11 trick to inject commands on root terminal.
How do companies protect against a security breach?
http://ift.tt/2IhOyuZ
Submitted March 11, 2018 at 03:27AM by AmazinBlasianRaisin
via reddit http://ift.tt/2p36CjK
http://ift.tt/2IhOyuZ
Submitted March 11, 2018 at 03:27AM by AmazinBlasianRaisin
via reddit http://ift.tt/2p36CjK
Internet Security Central
How do companies protect against a security breach? - Internet Security Central
It is no secret that any criminal will have his eyes on the biggest piece of cake he can acquire....
Rop-Tool - A Tool To Help You Write Binary Exploits [Full Sources - See Comment]
http://ift.tt/2DfV9T5
Submitted March 11, 2018 at 04:36AM by TechLord2
via reddit http://ift.tt/2FDNPpD
http://ift.tt/2DfV9T5
Submitted March 11, 2018 at 04:36AM by TechLord2
via reddit http://ift.tt/2FDNPpD
GitHub
t00sh/rop-tool
rop-tool - A tool to help you write binary exploits
Leveraging INF Files Fetch & Execute Techniques to Bypass Application Whitelisting, Deter Host-Based Security Products, and Achieve ‘hidden’ Persistence (Part 2)
http://ift.tt/2IjU9AO
Submitted March 11, 2018 at 04:32AM by TechLord2
via reddit http://ift.tt/2twTkkZ
http://ift.tt/2IjU9AO
Submitted March 11, 2018 at 04:32AM by TechLord2
via reddit http://ift.tt/2twTkkZ
| bohops |
Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2)
Introduction Two weeks ago, I blogged about several “pass-thru” techniques that leveraged the use of INF files (‘.inf’) to “fetch and execute” remote noscript comp…
XBruteForcer - CRM Brute Force Tool (WP, Joomla, DruPal, OpenCart, Magento)
http://ift.tt/2p4lezj
Submitted March 11, 2018 at 04:45AM by TechLord2
via reddit http://ift.tt/2HpTb4V
http://ift.tt/2p4lezj
Submitted March 11, 2018 at 04:45AM by TechLord2
via reddit http://ift.tt/2HpTb4V
GitHub
Moham3dRiahi/XBruteForcer
XBruteForcer - Brute Force Tool 🔓 WordPress , Joomla , DruPal , OpenCart , Magento
Robots can be hacked with ransomware & curse at customers
http://ift.tt/2p41VpP
Submitted March 11, 2018 at 05:45AM by ga-vu
via reddit http://ift.tt/2oYzhXM
http://ift.tt/2p41VpP
Submitted March 11, 2018 at 05:45AM by ga-vu
via reddit http://ift.tt/2oYzhXM
HackRead
Robots can be hacked with ransomware & curse at customers
Hackers can infect Softbank’s NAO and Pepper Robots with ransomware by exploiting an unpatched vulnerability leading to devastating consequences.
Free Ethical Hacking Course - Practice 5 - System Hacking with Examples
http://ift.tt/2IiIDWH
Submitted March 11, 2018 at 06:19AM by gburu
via reddit http://ift.tt/2FGtC2b
http://ift.tt/2IiIDWH
Submitted March 11, 2018 at 06:19AM by gburu
via reddit http://ift.tt/2FGtC2b
en.gburu.net: Blog about technology, free courses, ethical hacking and more!
Practice 5 - System Hacking with Examples - Ethical Hacking Course - en.gburu.net
In this new practice of the free course of ethical hacking, we will see different ways of attacking an objective system, obtaining remote access.
Practice 5 - System Hacking with Examples - Free Ethical Hacking Course
http://ift.tt/2IiIDWH
Submitted March 11, 2018 at 06:10AM by gburu
via reddit http://ift.tt/2Gflfsj
http://ift.tt/2IiIDWH
Submitted March 11, 2018 at 06:10AM by gburu
via reddit http://ift.tt/2Gflfsj
en.gburu.net: Blog about technology, free courses, ethical hacking and more!
Practice 5 - System Hacking with Examples - Ethical Hacking Course - en.gburu.net
In this new practice of the free course of ethical hacking, we will see different ways of attacking an objective system, obtaining remote access.
Major Version Release 1.0 Of Amass, The Subdomain Enumeration Tool Written In Go. Shown To Be More Effective Than Sublist3r.
http://ift.tt/2FyO7uz
Submitted March 11, 2018 at 07:20AM by jeff_foley
via reddit http://ift.tt/2IjrlZi
http://ift.tt/2FyO7uz
Submitted March 11, 2018 at 07:20AM by jeff_foley
via reddit http://ift.tt/2IjrlZi
GitHub
caffix/amass
amass - Subdomain Enumeration in Go
Visualize VPC Flow Logs
http://ift.tt/2IjXiRu
Submitted March 11, 2018 at 09:08AM by veermanhastc
via reddit http://ift.tt/2p002LK
http://ift.tt/2IjXiRu
Submitted March 11, 2018 at 09:08AM by veermanhastc
via reddit http://ift.tt/2p002LK
Visual VPC Flow Logs | TotalCloud
Sign-up for TotalCloud closed beta to visualize AWS VPC flow logs
Analysis of Slingshot malware
http://ift.tt/2p5dEEK
Submitted March 11, 2018 at 09:36AM by Alchemist2121
via reddit http://ift.tt/2IhRurn
http://ift.tt/2p5dEEK
Submitted March 11, 2018 at 09:36AM by Alchemist2121
via reddit http://ift.tt/2IhRurn
Psono's new security report checks 5 billion passwords
http://ift.tt/2p5AA6K
Submitted March 11, 2018 at 12:34PM by chickahoona
via reddit http://ift.tt/2Gf7euB
http://ift.tt/2p5AA6K
Submitted March 11, 2018 at 12:34PM by chickahoona
via reddit http://ift.tt/2Gf7euB
Psono
New Security Report
Adding haveibeenpwned.com API to Psono
China has no security flaws. Honest.
http://ift.tt/2IdjufP
Submitted March 11, 2018 at 10:51AM by Alan976
via reddit http://ift.tt/2HocOdP
http://ift.tt/2IdjufP
Submitted March 11, 2018 at 10:51AM by Alan976
via reddit http://ift.tt/2HocOdP
BleepingComputer
Chinese Intelligence Agencies Are Doctoring the Country's Vulnerability Database
Chinese intelligence agencies are doctoring the Chinese National Vulnerabilities Database (CNNVD) to hide security flaws that government hackers might have an interest in, according to a report released on Friday by US threat intelligence firm Recorded Future.
New IoT security rules: Stop using default passwords and allow software updates
http://zd.net/2tmj4jX
Submitted March 11, 2018 at 02:44PM by Iot_Security
via reddit http://ift.tt/2p2Oqra
http://zd.net/2tmj4jX
Submitted March 11, 2018 at 02:44PM by Iot_Security
via reddit http://ift.tt/2p2Oqra
ZDNet
New IoT security rules: Stop using default passwords and allow software updates | ZDNet
New rules set out best practice for IoT devices, but are the makers going to listen?
Various Docker Images for Pentesting
http://ift.tt/2HngNHj
Submitted March 11, 2018 at 04:40PM by ZephrX112
via reddit http://ift.tt/2FLAFHf
http://ift.tt/2HngNHj
Submitted March 11, 2018 at 04:40PM by ZephrX112
via reddit http://ift.tt/2FLAFHf
GitHub
ZephrFish/DockerAttack
DockerAttack - Various Tools and Docker Images
Defeating WordPress Security Plugins (file integrity)
http://ift.tt/2FwU1fK
Submitted March 11, 2018 at 04:28PM by gid0rah
via reddit http://ift.tt/2FKdDjG
http://ift.tt/2FwU1fK
Submitted March 11, 2018 at 04:28PM by gid0rah
via reddit http://ift.tt/2FKdDjG
x-c3ll.github.io
Defeating WordPress Security Plugins (Revisited) ::
DoomsDay Vault
DoomsDay Vault
Article about how to subvert file integrity checks made by most popular WordPress Plugins
Docker for Hackers, a pen tester’s guide
http://ift.tt/2IgI7bB
Submitted March 11, 2018 at 04:19PM by m0rv4i
via reddit http://ift.tt/2p6omL5
http://ift.tt/2IgI7bB
Submitted March 11, 2018 at 04:19PM by m0rv4i
via reddit http://ift.tt/2p6omL5
Pentestpartners
Docker for Hackers? A pen tester's guide | Pen Test Partners
I recently started using Docker as my main platform for penetration testing and exploring the advantages it can provide. If you're interested in running self-contained, lightweight environments that take seconds to start, then read on. I guess the first question…
PyREBox - a Python noscriptable Reverse Engineering sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU [With Full Sources - See Comment]
http://ift.tt/2FHHEkh
Submitted March 11, 2018 at 05:49PM by TechLord2
via reddit http://ift.tt/2FyJxfU
http://ift.tt/2FHHEkh
Submitted March 11, 2018 at 05:49PM by TechLord2
via reddit http://ift.tt/2FyJxfU
My solution to Imagination crackme by kratorius
http://ift.tt/2p0wQ7k
Submitted March 11, 2018 at 05:21PM by khasaia
via reddit http://ift.tt/2tvqiSE
http://ift.tt/2p0wQ7k
Submitted March 11, 2018 at 05:21PM by khasaia
via reddit http://ift.tt/2tvqiSE
secrary[dot]com
Imagination by kratorius
This blog is about malware analysis and reverse engineering. I’m Lasha Khasaia