A repository of telemetry domains and URLs used by mobile location tracking and analytics libraries.
https://github.com/craiu/mobiletrackers
https://github.com/craiu/mobiletrackers
GitHub
GitHub - craiu/mobiletrackers: A repository of telemetry domains and URLs used by mobile location tracking, user profiling, targeted…
A repository of telemetry domains and URLs used by mobile location tracking, user profiling, targeted marketing and aggressive ads libraries. - craiu/mobiletrackers
Attacking the Android kernel using the Qualcomm TrustZone
https://tamirzb.com/attacking-android-kernel-using-qualcomm-trustzone
https://tamirzb.com/attacking-android-kernel-using-qualcomm-trustzone
Tamir Zahavi-Brunner’s Blog
Attacking the Android kernel using the Qualcomm TrustZone
In this post I describe a somewhat unique Android kernel exploit, which utilizes the TrustZone in order to compromise the kernel.
Introducing a new service that allows you to test your Yara rules on a subset of samples uploaded and identified on MalwareBazaar. Users can upload their Yara rules, have them run against a collection of over 77’736 malicious files (and growing) and get a scanning results within minutes.
https://vulnerability.ch/2021/01/introducing-yara-scan-service-test-your-yara-rules-online/
https://riskmitigation.ch/yara-scan/
https://vulnerability.ch/2021/01/introducing-yara-scan-service-test-your-yara-rules-online/
https://riskmitigation.ch/yara-scan/
vulnerability
Introducing “Yara Scan Service” – Test Your Yara Rules Online
Did it happen to you that you wanted to quickly test a Yara rule you created, but you are missing a large enough data set to test your rule against? This is exactly what Yara Scan is designed for. …
Advanced Frida Usage Part 1 – iOS Encryption Libraries
https://8ksec.io/advanced-frida-usage-part-1-ios-encryption-libraries-8ksec-blogs/?noamp=available
https://8ksec.io/advanced-frida-usage-part-1-ios-encryption-libraries-8ksec-blogs/?noamp=available
8kSec - 8kSec is a cybersecurity research & training company. We provide high-quality training & consulting services.
Advanced Frida Usage Part 1 – iOS Encryption Libraries | 8kSec Blogs
In Advanced Frida Usage Part 1 - Explore how to decrypt EncryptedStore, interact with encrypted databases and perform AES encryption / decryption.
Order of Six Angles
Silver Fox campaign targeting chinese gov and financial sector Link1 Link2
Скачать образцы из статьи (спасибо vxug)
Telegram
Files
A Deep Dive into the OceanLotus Adversary Emulation for macOS & Linux
https://medium.com/mitre-engenuity/a-deep-dive-into-the-oceanlotus-adversary-emulation-for-macos-linux-26e521502866
https://medium.com/mitre-engenuity/a-deep-dive-into-the-oceanlotus-adversary-emulation-for-macos-linux-26e521502866
Medium
A Deep Dive into the OceanLotus Adversary Emulation for macOS & Linux
Written by L. Piper and Cat Self.
Beginners Guide to Building a Hardware Hacking Lab
https://voidstarsec.com/hw-hacking-lab/vss-lab-guide
https://voidstarsec.com/hw-hacking-lab/vss-lab-guide
VoidStar Security Wiki
VSS Hardware Hacking Wiki and Blog Entries
“EtherHiding” — Hiding Web2 Malicious Code in Web3 Smart Contracts
https://labs.guard.io/etherhiding-hiding-web2-malicious-code-in-web3-smart-contracts-65ea78efad16?gi=9da8f59fe944
https://labs.guard.io/etherhiding-hiding-web2-malicious-code-in-web3-smart-contracts-65ea78efad16?gi=9da8f59fe944
guard.io
“EtherHiding” — Hiding Web2 Malicious Code in Web3 Smart Contracts
Order of Six Angles
Photo
а то бля заебало про одно байтоёбство читать 😂