Forwarded from Cafe Security (Mohammad)
Problems_Python_Excel.pdf
2.7 MB
Black Hat Asia 2025:
"The Problems of Embedded Python in Excel"
https://github.com/shalomc/bhasia2025
#red_team
#offensive_security
@cafe_security
"The Problems of Embedded Python in Excel"
https://github.com/shalomc/bhasia2025
#red_team
#offensive_security
@cafe_security
👍4👎2
Notes for Analysing Malicious PDF Documents
The purpose of this post is to cover steps & tools for analysing malicious PDF documents. I will be using both the FlareVM and REMnux for analysis purposes.
The purpose of this post is to cover steps & tools for analysing malicious PDF documents. I will be using both the FlareVM and REMnux for analysis purposes.
PRATIK PATEL
Notes for Analysing Malicious PDF Documents
Purpose
👍7❤4
Forwarded from Threathunting (Pouyan Zamani)
❤2👍1
Forwarded from /mdre/
Notes from the recent OnlyMalware event on "Sryxen Stealer" source code analysis are available on GitHub.
We explore how they steal info for:
- browser cookies, autofill, bookmarks, passwords, history
- socials
- games
- VPNs, wallets, and more.
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3
Cisco IOS XE CVE-2023-20198 and CVE-2023-20273: WebUI Internals, Patch Diffs, and Theory Crafting
https://web.archive.org/web/20231102055645/https://www.horizon3.ai/cisco-ios-xe-cve-2023-20198-theory-crafting/
Cisco IOS XE CVE-2023-20198: Deep Dive and POC
https://web.archive.org/web/20231104121118/https://horizon3.ai/cisco-ios-xe-cve-2023-20198-deep-dive-and-poc/
https://web.archive.org/web/20231102055645/https://www.horizon3.ai/cisco-ios-xe-cve-2023-20198-theory-crafting/
Cisco IOS XE CVE-2023-20198: Deep Dive and POC
https://web.archive.org/web/20231104121118/https://horizon3.ai/cisco-ios-xe-cve-2023-20198-deep-dive-and-poc/
🔥2
Unity of Hacktivist Fronts: Iranian Cyber-Enabled IO Targeting Israel
https://m.youtube.com/watch?v=jQKEYyVB8Pk#
https://m.youtube.com/watch?v=jQKEYyVB8Pk#
👾4❤2👍2
Exploring dsreg Part 1
(I have no idea what i’m doing)
Hello! In this posts series you will join me in my very random research, where I’ll try to RE dsreg.dll and learn its functionalities (:
https://sapirxfed.com/2025/04/28/exploring-dsreg-part-1/
(I have no idea what i’m doing)
Hello! In this posts series you will join me in my very random research, where I’ll try to RE dsreg.dll and learn its functionalities (:
https://sapirxfed.com/2025/04/28/exploring-dsreg-part-1/
👍2
APTSimulator: A powerful APT simulation attack tool
A toolset to make a system look as if it was the victim of an APT attack
A toolset to make a system look as if it was the victim of an APT attack
👍5
Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware
😁6😱2
Forwarded from Infosec Fortress
YouTube
Windows Heap-backed Pool: The Good, the Bad, and the Encoded
For decades, the Windows kernel pool remained the same, using simple structures that were easy to read, parse and search for, but recently this all changed, with a new and complex design that breaks assumptions and exploits, and of course, tools and debugger…
Windows Heap-backed Pool: The Good, the Bad, and the Encoded
📹 Video
#windows
#heap
#conference
———
🆔 @Infosec_Fortress
📹 Video
#windows
#heap
#conference
———
🆔 @Infosec_Fortress
❤3👍1