Understanding Processor Architectures: CISC vs RISC
https://pcsite.co.uk/understanding-processor-architectures-cisc-vs-risc/?feed_id=15806
https://pcsite.co.uk/understanding-processor-architectures-cisc-vs-risc/?feed_id=15806
🔥5
Source Byte pinned «Understanding Processor Architectures: CISC vs RISC https://pcsite.co.uk/understanding-processor-architectures-cisc-vs-risc/?feed_id=15806»
Understanding_a_Payloads_Life.pdf
4.7 MB
Understanding a Payload's Life
Agenda
1. Needing an Advanced Payload
2. About Terminology
3. Payload Generation
4. Payload Executables
5. Payload Staging
6. Reflective Loading
👍9
Simulate the behavior of AV/EDR for malware development training
https://github.com/Helixo32/CrimsonEDR
https://github.com/Helixo32/CrimsonEDR
❤5👍3
Windows admin to kernel
LPE from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.
https://hakaisecurity.io/cve-2024-21338-from-admin-to-kernel-through-token-manipulation-and-windows-kernel-exploitation/research-blog/
LPE from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.
https://hakaisecurity.io/cve-2024-21338-from-admin-to-kernel-through-token-manipulation-and-windows-kernel-exploitation/research-blog/
👍4🔥2🤡2
PuTTY vulnerability vuln-p521-bias
https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-p521-bias.html
https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-p521-bias.html
👍3🔥2
Anything you want you can search and ippsec show how
https://ippsec.rocks/?#
https://ippsec.rocks/?#
👍2🔥2
👍3🔥2🥱1
Forwarded from Source Chat (GOJO)
Please open Telegram to view this post
VIEW IN TELEGRAM
Keylogging in the Windows kernel with undocumented data structures
https://eversinc33.com/posts/kernel-mode-keylogging/
https://eversinc33.com/posts/kernel-mode-keylogging/
👍2🔥2
A technique of hiding malicious shellcode via Shannon encoding.
https://github.com/kleiton0x00/Shelltropy.git
https://github.com/kleiton0x00/Shelltropy.git
👍2🔥2
Little AV/EDR bypassing lab for training & learning purposes
https://github.com/Xacone/BestEdrOfTheMarket
https://github.com/Xacone/BestEdrOfTheMarket
👍2🔥2
Name: Serious Cryptography
Requirements: Nothing
Level: Basics and Basis
Author: Jean-Phillippe Aumassen
“
Chapters:
1 - Encryption
2 - Randomness
3 - Cryptography Security
4 - Block Ciphers
5 - Stream Ciphers
6 - Hash Functions
7 - Keyed Hashing
8 - Authenticated Encryption
9 - Hard Problems
10 - RSA
11 - Diffie-Hellman
12 - Elliptic Curves
13 - TLS
14 - Quantum and Post-Quantom”
Requirements: Nothing
Level: Basics and Basis
Author: Jean-Phillippe Aumassen
“
Chapters:
1 - Encryption
2 - Randomness
3 - Cryptography Security
4 - Block Ciphers
5 - Stream Ciphers
6 - Hash Functions
7 - Keyed Hashing
8 - Authenticated Encryption
9 - Hard Problems
10 - RSA
11 - Diffie-Hellman
12 - Elliptic Curves
13 - TLS
14 - Quantum and Post-Quantom”
👍3
Vulnerability Management Goes Much Deeper Than Patching
https://www.kolide.com/blog/vulnerability-management-goes-much-deeper-than-patching
What Is Vulnerability Management?
Vulnerability Management For Compliance
Elements of Vulnerability Management
Improving Vulnerability Management With Zero Trust
Vulnerability Management Is a Journey, Not a Destination
https://www.kolide.com/blog/vulnerability-management-goes-much-deeper-than-patching
❤5👍2
Hack.lu 2023: Malware Av evasion tricks by cocmelonc
https://youtu.be/0Xa4E4ZpX2E?si=xbfueQY-gmEYS6lx
His book:
https://news.1rj.ru/str/source_chat/923
https://youtu.be/0Xa4E4ZpX2E?si=xbfueQY-gmEYS6lx
His book:
https://news.1rj.ru/str/source_chat/923
❤7👍1