WAF Bypass Tool
WAF bypass Tool is an open source tool to analyze the security of any WAF for False Positives and False Negatives using predefined and customizable payloads:
— https://github.com/nemesida-waf/waf-bypass
WAF bypass Tool is an open source tool to analyze the security of any WAF for False Positives and False Negatives using predefined and customizable payloads:
— https://github.com/nemesida-waf/waf-bypass
GitHub
GitHub - nemesida-waf/waf-bypass: Check your WAF before an attacker does
Check your WAF before an attacker does. Contribute to nemesida-waf/waf-bypass development by creating an account on GitHub.
Linux System Checker Script Tool
Linux System Checker Tool Script it is a bash noscript which can show system info, system load info, test disk speed I/O, show free space and more... System Checker can checks and shows Linux system info like as:
▫️ System Information
▫️ CPU and Memory Information
▫️ Boot Information
▫️ Mount and HDD IO Info
▫️ Top 5 memory and CPU usage processes
▫️ Speedtest
▫️ Defined Systemd Units Services State
▫️ Logged/Process users info
▫️ Listen ports
▫️ Running systemd units as list/tree
▫️ Unowned files
- [en]: Linux System Checker
- [ru]: Скрипт проверки Linux
Linux System Checker Tool Script it is a bash noscript which can show system info, system load info, test disk speed I/O, show free space and more... System Checker can checks and shows Linux system info like as:
▫️ System Information
▫️ CPU and Memory Information
▫️ Boot Information
▫️ Mount and HDD IO Info
▫️ Top 5 memory and CPU usage processes
▫️ Speedtest
▫️ Defined Systemd Units Services State
▫️ Logged/Process users info
▫️ Listen ports
▫️ Running systemd units as list/tree
▫️ Unowned files
- [en]: Linux System Checker
- [ru]: Скрипт проверки Linux
Azure AD Incident Response PowerShell Module
— https://github.com/AzureAD/Azure-AD-Incident-Response-PowerShell-Module
— https://github.com/AzureAD/Azure-AD-Incident-Response-PowerShell-Module
GitHub
GitHub - AzureAD/Azure-AD-Incident-Response-PowerShell-Module: The Azure Active Directory Incident Response PowerShell module provides…
The Azure Active Directory Incident Response PowerShell module provides a number of tools, developed by the Azure Active Directory Product Group in conjunction with the Microsoft Detection and Resp...
Decider - web application that assists network defenders, analysts, and researcher in the process of mapping adversary behaviors to the MITRE ATT&CK® framework..
— https://github.com/cisagov/decider
— https://github.com/cisagov/decider
GitHub
GitHub - cisagov/decider: A web application that assists network defenders, analysts, and researchers in the process of mapping…
A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&CK® framework. - cisagov/decider
Creating a Dynamic Malware Analysis Virtual Machine
https://thelastcitadel.eu/2023/02/18/creating-a-dynamic-malware-analysis-virtual-machine/
https://thelastcitadel.eu/2023/02/18/creating-a-dynamic-malware-analysis-virtual-machine/
Как можно быстро обновить зависимости NPM,https://sys-adm.in/systadm/1000-kak-mozhno-bystro-obnovit-zavisimosti-npm.html
sys-adm.in
Как можно быстро обновить зависимости NPM - Для сисадминов и не только
Sys-Adm.in - Сайт для сисадминов и не только. Здесь собраны различные материалы основанные на личной практике. Блог Евгения Гончарова.
FiXS the new ATM Malware in LATAM
…ATMs are a core part of the financial system, providing users access to their money anytime at different physical locations… Detailed technical review:
— https://www.metabaseq.com/fixs-atms-malware/
…ATMs are a core part of the financial system, providing users access to their money anytime at different physical locations… Detailed technical review:
— https://www.metabaseq.com/fixs-atms-malware/
Metabase Q
FiXS the new ATM Malware in LATAM - Metabase Q
FiXs is a new ATM malware that steals data from ATMs and infects computers. This is a detailed beginner's guide.
/ Two major vulnerabilities found in the TPM2.0 that could affect billions of devices
https://content.quarkslab.com/major-vulnerabilities-tpm20
https://content.quarkslab.com/major-vulnerabilities-tpm20
Quarkslab
Two major vulnerabilities found in the TPM2.0 that could affect billion of devices
Protecting Android clipboard content from unintended exposure
https://www.microsoft.com/en-us/security/blog/2023/03/06/protecting-android-clipboard-content-from-unintended-exposure/
https://www.microsoft.com/en-us/security/blog/2023/03/06/protecting-android-clipboard-content-from-unintended-exposure/
Microsoft News
Protecting Android clipboard content from unintended exposure
An old version of the SHEIN Android app periodically read the contents of the Android device clipboard & sent the contents to a remote server.
В инфраструктуре государственных организаций выявлены иностранные кибершпионы
ГТС КЗ:
— https://sts.kz/2023/03/07/v-infrastrukture-gosudarstvennyh-organizacij-vyyavleny-inostrannye-kibershpiony/
ГТС КЗ:
— https://sts.kz/2023/03/07/v-infrastrukture-gosudarstvennyh-organizacij-vyyavleny-inostrannye-kibershpiony/
Rust for n00bs. Free price.
This course provides an overview of the Rust syntax and teaches the basics of reading and writing Rust code. It assumes no prior knowledge of Rust and covers everything you need to get started with your learning journey:
— https://training.zeropointsecurity.co.uk/courses/rust-for-n00bs
This course provides an overview of the Rust syntax and teaches the basics of reading and writing Rust code. It assumes no prior knowledge of Rust and covers everything you need to get started with your learning journey:
— https://training.zeropointsecurity.co.uk/courses/rust-for-n00bs
Zero-Point Security
Rust for n00bs
An introduction to Rust fundamentals.
Установка Rust в macOS + Fish Shell
— https://sys-adm.in/systadm/1001-ustanovka-rust-v-macos-fish-shell.html
— https://sys-adm.in/systadm/1001-ustanovka-rust-v-macos-fish-shell.html
sys-adm.in
Установка Rust в macOS + Fish Shell - Для сисадминов и не только
Sys-Adm.in - Сайт для сисадминов и не только. Здесь собраны различные материалы основанные на личной практике. Блог Евгения Гончарова.
CVE-2023-21768 Local Privilege Escalation POC
For demonstration purposes only. Complete exploit works on vulnerable Windows 11 22H2 systems. Write primitive works on all vulnerable systems:
https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768
For demonstration purposes only. Complete exploit works on vulnerable Windows 11 22H2 systems. Write primitive works on all vulnerable systems:
https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768
GitHub
GitHub - chompie1337/Windows_LPE_AFD_CVE-2023-21768: LPE exploit for CVE-2023-21768
LPE exploit for CVE-2023-21768. Contribute to chompie1337/Windows_LPE_AFD_CVE-2023-21768 development by creating an account on GitHub.