Forwarded from OutLaw
Dorks for OSINT Cheat sheet.pdf
111.1 KB
https://github.com/shadawck/awesome-anti-forensic
Awesome Anti-Forensic
Hiding process
Encryption/Obfuscation
Steganography
Data Destruction
Data tampering
Awesome Anti-Forensic
Hiding process
Encryption/Obfuscation
Steganography
Data Destruction
Data tampering
GitHub
GitHub - shadawck/awesome-anti-forensic: Tools and packages that are used for countering forensic activities, including encryption…
Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attributes. This all includes tools to work with anything in gener...
Forwarded from Cyber Guardians
Writing a Debugger
Part 1 - Attaching to a Process
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-1
Part 2 - Register State and Stepping
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-2
Part 3 - Reading Memory
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-3
Part 4 - Exports and Private Symbols
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-4
Part 5 - Breakpoints
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-5
Part 6 - Stacks
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-6
@IRCyberGuardians
Part 1 - Attaching to a Process
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-1
Part 2 - Register State and Stepping
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-2
Part 3 - Reading Memory
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-3
Part 4 - Exports and Private Symbols
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-4
Part 5 - Breakpoints
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-5
Part 6 - Stacks
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-6
@IRCyberGuardians
TimDbg
Writing a Debugger From Scratch - DbgRs Part 1 - Attaching to a Process
I’ve left the Microsoft Debugger Platform team twice, and each time I’ve started writing my own debugger. I must really like debuggers or something. This time, I have two reasons for writing a new debugger. The first is because I want to learn Rust better…
Forwarded from Cyber Guardians
Chaining Vulnerabilities to Achieve RCE on Outlook
https://www.akamai.com/blog/security-research/chaining-vulnerabilities-to-achieve-rce-part-one
@IRCyberGuardians
https://www.akamai.com/blog/security-research/chaining-vulnerabilities-to-achieve-rce-part-one
@IRCyberGuardians
Akamai
Mute the Sound: Chaining Vulnerabilities to Achieve RCE on Outlook: Pt 1 | Akamai
In part 1 of this two-part series, Akamai researchers explore two new Windows vulnerabilities that could lead to remote code execution against Outlook clients.
Fuck Israel and all the people of Israel and everyone who supports Israel, Israel is a terrorist state
👏8👎4❤2👍2
Linux Kernel Exploitation
https://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x1-smashing.html?m=1
https://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x1-smashing.html?m=1
K3170Makan
[Linux Kernel Exploitation 0x1] Smashing Stack Overflows in the Kernel
Hacking,Information Security,Penetration Testing,Google Hacking,Google Dorking,Keith Makan,Black Hat,Security Research,InfoSec,Web Site Security