Divide And Bypass: A new Simple Way to Bypass AMSI | x4sh3s
https://x4sh3s.github.io/posts/Divide-and-bypass-amsi/
https://x4sh3s.github.io/posts/Divide-and-bypass-amsi/
x4sh3s
Divide And Bypass: A new Simple Way to Bypass AMSI
This post is about a new simple way to bypass AMSI (Antimalware Scan Interface), that can be applied on small noscripts, specially the popular AMSI bypasses.
GitHub - lucidrains/PaLM-rlhf-pytorch: Implementation of RLHF (Reinforcement Learning with Human Feedback) on top of the PaLM architecture. Basically ChatGPT but with PaLM
https://github.com/lucidrains/PaLM-rlhf-pytorch
https://github.com/lucidrains/PaLM-rlhf-pytorch
GitHub
GitHub - lucidrains/PaLM-rlhf-pytorch: Implementation of RLHF (Reinforcement Learning with Human Feedback) on top of the PaLM architecture.…
Implementation of RLHF (Reinforcement Learning with Human Feedback) on top of the PaLM architecture. Basically ChatGPT but with PaLM - lucidrains/PaLM-rlhf-pytorch
GitHub - onionj/pybotnet: PyBotNet framework, high level remote control
https://github.com/onionj/pybotnet
https://github.com/onionj/pybotnet
GitHub
GitHub - onionj/pybotnet: PyBotNet: A Remote Control Framework for Python with Telegram Integration
PyBotNet: A Remote Control Framework for Python with Telegram Integration - onionj/pybotnet
Turning Google smart speakers into wiretaps for $100k
https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html
https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html
Matt's internet home
Turning Google smart speakers into wiretaps for $100k
I was recently rewarded a total of $107,500 by Google for responsibly disclosing security issues in the Google Home smart speaker that allowed an attacker within wireless proximity to install a "backdoor" account on the device, enabling them to send commands…
Offensive Security Cheatsheet
https://cheatsheet.haax.fr/open-source-intelligence-osint/dorks/google_dorks/
https://cheatsheet.haax.fr/open-source-intelligence-osint/dorks/google_dorks/
GitHub - BeetleChunks/SpoolSploit: A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.
https://github.com/BeetleChunks/SpoolSploit
https://github.com/BeetleChunks/SpoolSploit
GitHub
GitHub - BeetleChunks/SpoolSploit: A collection of Windows print spooler exploits containerized with other utilities for practical…
A collection of Windows print spooler exploits containerized with other utilities for practical exploitation. - BeetleChunks/SpoolSploit
Fuzzing the Shield: CVE-2022–24548 | by S2W | S2W BLOG | Dec, 2022 | Medium
https://medium.com/s2wblog/fuzzing-the-shield-cve-2022-24548-96f568980c0
https://medium.com/s2wblog/fuzzing-the-shield-cve-2022-24548-96f568980c0
Medium
Fuzzing the Shield: CVE-2022–24548
Author: Daejin Lee, Seunghoe Kim, Donguk Kim, Eugene Jang
GitHub - weak1337/Alcatraz: x64 binary obfuscator
https://github.com/weak1337/Alcatraz
https://github.com/weak1337/Alcatraz
GitHub
GitHub - weak1337/Alcatraz: x64 binary obfuscator
x64 binary obfuscator. Contribute to weak1337/Alcatraz development by creating an account on GitHub.