how to detect android malware using Random Forest Classifier and explain it use linearsvc
https://github.com/liansecurityOS/android-malware-detection
https://github.com/liansecurityOS/android-malware-detection
GitHub
GitHub - liansecurityOS/android-malware-detection: This is a opensource repo about how to detect android malware using Random Forest…
This is a opensource repo about how to detect android malware using Random Forest Classifier and explain it use linearsvc. - liansecurityOS/android-malware-detection
Time Travel Debugging - Overview
https://learn.microsoft.com/en-us/windows-hardware/drivers/debuggercmds/time-travel-debugging-overview
https://learn.microsoft.com/en-us/windows-hardware/drivers/debuggercmds/time-travel-debugging-overview
Docs
Time Travel Debugging Overview - Windows drivers
Learn how Time Travel Debugging (TTD) captures process execution to replay and debug issues by rewinding your debugger session forwards and backwards.
Две критичных CVE (Integer Overflow) найденных фаззингом
https://securityonline.info/cve-2024-22860-cve-2024-22862-critical-ffmpeg-remote-code-execution-flaws/
https://securityonline.info/cve-2024-22860-cve-2024-22862-critical-ffmpeg-remote-code-execution-flaws/
This media is not supported in your browser
VIEW IN TELEGRAM
Чистка снэпшотов в Virtualbox
Inside the LogoFAIL PoC: From Integer Overflow to Arbitrary Code Execution
https://binarly.io/posts/inside_the_logofail_poc_from_integer_overflow_to_arbitrary_code_execution/index.html
https://binarly.io/posts/inside_the_logofail_poc_from_integer_overflow_to_arbitrary_code_execution/index.html
www.binarly.io
Inside the LogoFAIL PoC: From Integer Overflow to Arbitrary Code Execution
BINARLY LogoFAIL: Learn how a firmware parser flaw can jeopardize device security.
from Windows drivers to an almost fully working EDR
https://sensepost.com/blog/2024/sensecon-23-from-windows-drivers-to-an-almost-fully-working-edr/
https://sensepost.com/blog/2024/sensecon-23-from-windows-drivers-to-an-almost-fully-working-edr/
This framework generates fuzz targets for real-world C/C++ projects with various Large Language Models (LLM) and benchmarks them via the OSS-Fuzz platform.
https://github.com/google/oss-fuzz-gen
https://github.com/google/oss-fuzz-gen
GitHub
GitHub - google/oss-fuzz-gen: LLM powered fuzzing via OSS-Fuzz.
LLM powered fuzzing via OSS-Fuzz. Contribute to google/oss-fuzz-gen development by creating an account on GitHub.
Creating FLIRT Signatures in IDA Pro for CTF's, Malware, etc...
https://www.youtube.com/watch?v=TqIUsLQ-HjE
https://www.youtube.com/watch?v=TqIUsLQ-HjE
YouTube
Creating FLIRT Signatures in IDA Pro for CTF's, Malware, etc...
MOST VIDEOS ARE UNDER THE LIVE SECTION!
Often times during Capture the Flag (CTF) challenges, you are given a binary that is not only stripped of symbols, but also includes statically compiled library code. This can make reverse engineering more challenging…
Often times during Capture the Flag (CTF) challenges, you are given a binary that is not only stripped of symbols, but also includes statically compiled library code. This can make reverse engineering more challenging…
Escaping the sandbox: A bug that speaks for itself
https://microsoftedge.github.io/edgevr/posts/Escaping-the-sandbox-A-bug-that-speaks-for-itself/
https://microsoftedge.github.io/edgevr/posts/Escaping-the-sandbox-A-bug-that-speaks-for-itself/
Microsoft Browser Vulnerability Research
Escaping the sandbox: A bug that speaks for itself
Introduction
Панишер
https://github.com/ginger51011/pandoras_pot
Inspired by HellPot, pandoras_pot aims to bring even more misery on unruly web crawlers that don't respect your robots.txt.
The goal with pandoras_pot is to have maximum data output, while not using up all the resources of your webserver that probably could be doing better things with its time.
https://github.com/ginger51011/pandoras_pot
GitHub
GitHub - ginger51011/pandoras_pot: HTTP honeypot to punish and educate unruly web crawlers, written in Rust (🚀)
HTTP honeypot to punish and educate unruly web crawlers, written in Rust (🚀) - ginger51011/pandoras_pot
Xworm Loader Analysis - Unravelling Multi-stage Loaders with CyberChef and DnSpy
https://www.youtube.com/watch?v=tenNFzM-MM0
https://www.youtube.com/watch?v=tenNFzM-MM0
YouTube
Defeating Multi-stage Malware with CyberChef and DnSpy (Xworm)
Investigating and Decoding an Xworm Loader noscript. Leveraging CyberChef and Dnspy to perform AES Decryption and C2 Extraction.
SHA256:e5dac6f6d2ab4c479c5c3e91064f335de141c8399bd93f8267e13f134c578c0f
SHA256:e5dac6f6d2ab4c479c5c3e91064f335de141c8399bd93f8267e13f134c578c0f