Windows rootkit development for red teaming
https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html
https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html
Windows rootkit development for red teaming part 2
https://idov31.github.io/2022/08/04/lord-of-the-ring0-p2.html
https://idov31.github.io/2022/08/04/lord-of-the-ring0-p2.html
Windows rootkit development for red teaming part 3
https://idov31.github.io/2022/10/30/lord-of-the-ring0-p3.html
https://idov31.github.io/2022/10/30/lord-of-the-ring0-p3.html
Windows rootkit development for red teaming Part4
https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html
https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html
Windows rootkit development for red teaming part 5
https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html
https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html
👍2
Reverse engineering of AES protected USB flash drives
Excellent research by @matthiasdeeg
https://blog.syss.com/posts/hacking-usb-flash-drives-part-1/
Excellent research by @matthiasdeeg
https://blog.syss.com/posts/hacking-usb-flash-drives-part-1/
SySS Tech Blog
Hacking Some More Secure USB Flash Drives (Part I)
During a research project in the beginning of 2022, SySS IT security expert Matthias Deeg found several security vulnerabilities in different tested USB flash drives with AES hardware encryption.
ByteShield
Reverse engineering of AES protected USB flash drives Excellent research by @matthiasdeeg https://blog.syss.com/posts/hacking-usb-flash-drives-part-1/
SySS Tech Blog
Hacking Some More Secure USB Flash Drives (Part II)
In the second article of this series, SySS IT security expert Matthias Deeg presents security vulnerabilities found in another crypto USB flash drive with AES hardware encryption.
We aren’t aware of the darkness and pain we are living in. When Mahdi and Jesus return, then will we know the true meaning of light and life. It is then that we will be feel great regret as to why we had delayed our prayers for their return.
#ThePromisedSaviour
#ThePromisedSaviour
👍8
Forwarded from ITShield
Media is too big
VIEW IN TELEGRAM
جلسه بیست و دوم دوره اسمبلی
فراخوانی های سیستمی برای کار کردن با فایلها و ...
https://t.iss.one/itshieldassembly
#ASM
فراخوانی های سیستمی برای کار کردن با فایلها و ...
https://t.iss.one/itshieldassembly
#ASM
👍1
ARM64 Reversing And Exploitation Part 1
https://8ksec.io/arm64-reversing-and-exploitation-part-1-arm-instruction-set-simple-heap-overflow/
https://8ksec.io/arm64-reversing-and-exploitation-part-1-arm-instruction-set-simple-heap-overflow/
8kSec - 8kSec is a cybersecurity research & training company. We provide high-quality training & consulting services.
ARM64 Reversing And Exploitation Part 1 – ARM Instruction Set + Simple Heap Overflow | 8kSec Blogs
ARM64 Reversing and Exploitation Part 1 blog series - Learn ARM64 instruction set and how to use it to reverse engineer ARM binaries.