Air-Fi: Generating Covert Wi-Fi Signals from Air-Gapped Computers
https://youtu.be/vhNnc0ln63c
https://youtu.be/vhNnc0ln63c
YouTube
Air-Fi: Generating Covert Wi-Fi Signals from Air-Gapped Computers
By Mordechai Guri
paper: http://www.covertchannels.com
https://arxiv.org/abs/2012.06884
paper: http://www.covertchannels.com
https://arxiv.org/abs/2012.06884
df -BG # List the file systems so that their space used/available is shown in gigabytes. This is more consistent than using just -h to show human readable. Good for if you have several and want to compare.
[Reverse Engineering Tips] — IDA Python | by Thomas Roccia | BlackFr0g | Jan, 2021 | Medium
https://medium.com/malware-buddy/reverse-engineering-tips-ida-python-bd0ce64a48ed
https://medium.com/malware-buddy/reverse-engineering-tips-ida-python-bd0ce64a48ed
Medium
[Reverse Engineering Tips] — IDA Python
One of the greatest features of IDA is the ability to use Python directly in the interface to manipulate the disassembly code. IDAPython…
New Linux SUDO flaw lets local users gain root privileges
https://www.bleepingcomputer.com/news/security/new-linux-sudo-flaw-lets-local-users-gain-root-privileges/
https://www.bleepingcomputer.com/news/security/new-linux-sudo-flaw-lets-local-users-gain-root-privileges/
BleepingComputer
New Linux SUDO flaw lets local users gain root privileges
A now-fixed Sudo vulnerability allowed any local user to gain root privileges on Unix-like operating systems without requiring authentication.
PyBeacon is a collection of noscripts for dealing with Cobalt Strike’s encrypted traffic.
It can encrypt/decrypt beacon metadata, as well as parse symmetrically encrypted taskings
https://securityonline.info/pybeacon-dealing-with-cobalt-strike-beacons-in-python/
It can encrypt/decrypt beacon metadata, as well as parse symmetrically encrypted taskings
https://securityonline.info/pybeacon-dealing-with-cobalt-strike-beacons-in-python/
Penetration Testing
pybeacon: dealing with Cobalt Strike beacons in Python
PyBeacon is a collection of noscripts for dealing with Cobalt Strike's encrypted traffic. It can encrypt/decrypt beacon metadata, parse symmetric encrypted taskings