A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
https://github.com/secfigo/Awesome-Fuzzing
https://github.com/secfigo/Awesome-Fuzzing
❤5👍1
Forwarded from white2hack 📚
OSED Notes: (Offensive Security Exploit Developer) by Zeyad Azima, 2024
Source
GitHub
Twitter
#pentest #useful #exam #celebrery
Source
GitHub
#pentest #useful #exam #celebrery
👍4❤🔥2
" The architecture of SAST tools: An explainer for developers "
More developers will have to fix security issues in the age of shifting left. Here, we break down how SAST tools can help them find and address vulnerabilities.
https://github.blog/2024-02-12-the-architecture-of-sast-tools-an-explainer-for-developers/
#devops
———
@islemolecule_source
More developers will have to fix security issues in the age of shifting left. Here, we break down how SAST tools can help them find and address vulnerabilities.
+Automate source code scanning.
+Expand vulnerability detection.
+Assist with manual code reviews.
+Software composition analysis (SCA)
+Dynamic application security testing (DAST)
+Interactive application security testing (IAST)
https://github.blog/2024-02-12-the-architecture-of-sast-tools-an-explainer-for-developers/
#devops
———
@islemolecule_source
❤4👍2😁1
Forwarded from Go Casts 🚀
یه مقاله درجه یک درباره container networking
How Container Networking Works: a Docker Bridge Network From Scratch
https://labs.iximiuz.com/tutorials/container-networking-from-scratch
@gocasts
How Container Networking Works: a Docker Bridge Network From Scratch
https://labs.iximiuz.com/tutorials/container-networking-from-scratch
@gocasts
❤2👍2👏1
Tons of trainings out there for implant dev now as of just last year even.
- Pavel has his own
https://training.trainsec.net/malware-analysis-and-development-workshop
- there’s Maldev Academy which is great
- there’s ODT from a Microsoft dude
https://courses.ask-academy.live/courses/offensive-development-and-tradecraft
- SANS has an implant dev course
https://www.sans.org/cyber-security-courses/red-team-operations-developing-custom-tools-windows/
- CodeMachine had some but I don’t think they are public offerings anymore
- Paranoid Ninja BRC4 author had some
#malware_dev
- Pavel has his own
https://training.trainsec.net/malware-analysis-and-development-workshop
- there’s Maldev Academy which is great
- there’s ODT from a Microsoft dude
https://courses.ask-academy.live/courses/offensive-development-and-tradecraft
- SANS has an implant dev course
https://www.sans.org/cyber-security-courses/red-team-operations-developing-custom-tools-windows/
- CodeMachine had some but I don’t think they are public offerings anymore
- Paranoid Ninja BRC4 author had some
#malware_dev
👍4🔥2
DLL Proxying using forwards with absolute paths
https://github.com/mrexodia/perfect-dll-proxy
https://github.com/mrexodia/perfect-dll-proxy
👍3🔥1
Forwarded from CyberSecurityTechnologies (-CST-)
Malware_Techniques_AHU.pdf
62.9 MB
#Malware_analysis
"Exploring Infostealer Malware Techniques on Automotive Head Units", 2024.
"Exploring Infostealer Malware Techniques on Automotive Head Units", 2024.
👍3
" Security is a process, not a product. Nor a language "
Rust can help make software secure – but it's no cure-all
https://www.theregister.com/2024/02/08/rust_software_memory_safety/
Rust can help make software secure – but it's no cure-all
Memory-safety flaws represent the majority of high-severity problems for Google and Microsoft, but they're not necessarily associated with the majority of vulnerabilities that actually get exploited.
So while coding with Rust can help reduce memory safety vulnerabilities, it won't fix everything.
https://www.theregister.com/2024/02/08/rust_software_memory_safety/
👍2
Urgent Security Alert! Hackers Hijacked Notepad++ Plugin
https://gbhackers.com/hackers-hijacked-notepad-plugin-to-execute-malicious-code/
https://gbhackers.com/hackers-hijacked-notepad-plugin-to-execute-malicious-code/
👍4
Forwarded from کانال بایت امن
#Tutorial
Real-world Android Malware Analysis
Part1 - Part2 - Part3 - Part4
تو این آموزش 4 قسمتی، نحوه تحلیل بدافزارهای اندروید رو با نمونه های واقعی یاد میگیرید
🦅 کانال بایت امن | گروه بایت امن
_
Real-world Android Malware Analysis
Part1 - Part2 - Part3 - Part4
تو این آموزش 4 قسمتی، نحوه تحلیل بدافزارهای اندروید رو با نمونه های واقعی یاد میگیرید
_
Please open Telegram to view this post
VIEW IN TELEGRAM
❤4🌭1🍌1💅1
325462-sdm-vol-1-2abcd-3abcd-4.pdf
23.2 MB
“Intel® 64 and IA-32 Architectures
Software Developer’s Manual
Combined Volumes:
1, 2A, 2B, 2C, 2D, 3A, 3B, 3C, 3D, and 4”
Intel manual
Software Developer’s Manual
Combined Volumes:
1, 2A, 2B, 2C, 2D, 3A, 3B, 3C, 3D, and 4”
Intel manual
🤯2🔥1😱1
Forwarded from Reverse Dungeon
❤3
Reverse Dungeon
https://alexaltea.github.io/blog/posts/2016-10-12-xchg-rax-rax-solutions/
Solutions of xchg rax,rax
Forwarded from BlankRoom
Telegram RCE
🆘🆘🆘ATTENTION 🆘🆘🆘
URGENTLY DISABLE AUTOLOADING MEDIA ON ALL DEVICES WHERE THE TELEGRAM DESKTOP IS INSTALLED
🆘🆘NOT A TRAINING ALARM 🆘🆘
Settings - Advanced settings - In personal chats, groups, channels, DISABLE ALL CHECKS IN ALL AUTOLOAD MEDIA ITEMS
Found rce is played through the video player in Telegram. Therefore, the safest solution is to disable auto-downloading of files.
Information about the exploit itself is currently known only in narrow circles
https://vimeo.com/932147196
@Bl4nk_Room
🆘🆘🆘ATTENTION 🆘🆘🆘
URGENTLY DISABLE AUTOLOADING MEDIA ON ALL DEVICES WHERE THE TELEGRAM DESKTOP IS INSTALLED
🆘🆘NOT A TRAINING ALARM 🆘🆘
Settings - Advanced settings - In personal chats, groups, channels, DISABLE ALL CHECKS IN ALL AUTOLOAD MEDIA ITEMS
Found rce is played through the video player in Telegram. Therefore, the safest solution is to disable auto-downloading of files.
Information about the exploit itself is currently known only in narrow circles
https://vimeo.com/932147196
@Bl4nk_Room
Vimeo
telegram rce
This is "telegram rce" by zxc on Vimeo, the home for high quality videos and the people who love them.
🤔2👎1
Forwarded from Hattori Hanzo
ASSESSING AND EXPLOITING CONTROL SYSTEM AND IIOT.7z
477.2 MB
ASSESSING AND EXPLOITING CONTROL SYSTEM AND IIOT (2020)
Blackhat USA 2020
https://www.blackhat.com/us-20/training/schedule/listing.html#assessing-and-exploiting-control-system-and-iiot-19234
Blackhat USA 2020
https://www.blackhat.com/us-20/training/schedule/listing.html#assessing-and-exploiting-control-system-and-iiot-19234
❤5👍2
Forwarded from کانال بایت امن
#Webinar
Malware Development Workshop
Speakers : Uriel Kosayev, Pavel Yosifovich | TrainSec.net
What you will learn in the workshop
1. What is Malware Analysis
2. What is Malware Development
3. The Malware Development Life Cycle
4. Why it's important for Red Teamers and Blue Teamers
5. Practical Malware Reverse Engineering and Development Examples
وبینار توسعه بدافزار با حضور Uriel Kosayev و Pavel Yosifovich در تاریخ 17 آپریل برگزار خواهد شد.
جهت اطلاع بیشتر بر روی لینک عنوان کلیک کنید.
🦅 کانال بایت امن | گروه بایت امن
_
Malware Development Workshop
Speakers : Uriel Kosayev, Pavel Yosifovich | TrainSec.net
What you will learn in the workshop
1. What is Malware Analysis
2. What is Malware Development
3. The Malware Development Life Cycle
4. Why it's important for Red Teamers and Blue Teamers
5. Practical Malware Reverse Engineering and Development Examples
وبینار توسعه بدافزار با حضور Uriel Kosayev و Pavel Yosifovich در تاریخ 17 آپریل برگزار خواهد شد.
جهت اطلاع بیشتر بر روی لینک عنوان کلیک کنید.
_
Please open Telegram to view this post
VIEW IN TELEGRAM
❤4🍌3🌭2💅2🥰1