Great tutorial on Linux kernel exploitation using CVE-2017-11176 as example
Credits Nicolas Fabretti
Part 1: blog.lexfo.fr/cve-2017-11176…
Part 2: blog.lexfo.fr/cve-2017-11176…
Part 3: blog.lexfo.fr/cve-2017-11176…
Part 4: blog.lexfo.fr/cve-2017-11176…
Credits Nicolas Fabretti
Part 1: blog.lexfo.fr/cve-2017-11176…
Part 2: blog.lexfo.fr/cve-2017-11176…
Part 3: blog.lexfo.fr/cve-2017-11176…
Part 4: blog.lexfo.fr/cve-2017-11176…
RT @irina_tech_tips: Your Social Media Fingerprint
Old and simple online tool that shows which sites you are currently authorised on.
robinlinus.github.io/socialm…
Old and simple online tool that shows which sites you are currently authorised on.
robinlinus.github.io/socialm…
Collection of guides/resources/tutorials about (linux server) security
Worth a reading!
github.com/imthenachoman/How…
Worth a reading!
github.com/imthenachoman/How…
Unmasking AsyncRAT New Infection Chain mcafee.com/blogs/other-blogs…
❤🔥1
🎃2
Evading EDR (Early Access 2023) (Matt Hand).pdf
4.9 MB
Evading EDR : A Comprehensive Guide to Defeating Endpoint Detection Systems by Matt Hand, 2023
👍1
Jonathan Reiter is the Authors of sans SEC670 (Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control)
so don't miss this one !
https://www.sans.org/webcasts/intro-c-windows-devs/
--> LINK
@islemolecule_SOURCE
so don't miss this one !
https://www.sans.org/webcasts/intro-c-windows-devs/
--> LINK
@islemolecule_SOURCE
👍3🤓2
Use the free Microsoft bing's gpt with ida pro, to perform free analyzes!
https://github.com/p1ay8y3ar/idaBingGPTPlugin
#tools #reverse #idapro #ai
https://github.com/p1ay8y3ar/idaBingGPTPlugin
#tools #reverse #idapro #ai
🎃3
امیدوارم استفاده از blake3 به جای SHA256 بیشتر شود نه به خاطر اینکه به شدت امن است یا SHA256 که پایه آن SHA1 ضعیف است یاحتی توسط NSA ساخته شده، بلکه به این دلیل که مشترکا توسط مهندسین نرمافزار و رمزنگارها طراحی شده که Performance شدیدا بهتری دارد.
peergos.org/posts/blake3
VAHID NAMENI✍
peergos.org/posts/blake3
VAHID NAMENI✍