Windows rootkit development for red teaming part 2
https://idov31.github.io/2022/08/04/lord-of-the-ring0-p2.html
https://idov31.github.io/2022/08/04/lord-of-the-ring0-p2.html
Windows rootkit development for red teaming part 3
https://idov31.github.io/2022/10/30/lord-of-the-ring0-p3.html
https://idov31.github.io/2022/10/30/lord-of-the-ring0-p3.html
Windows rootkit development for red teaming Part4
https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html
https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html
Windows rootkit development for red teaming part 5
https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html
https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html
👍2
Reverse engineering of AES protected USB flash drives
Excellent research by @matthiasdeeg
https://blog.syss.com/posts/hacking-usb-flash-drives-part-1/
Excellent research by @matthiasdeeg
https://blog.syss.com/posts/hacking-usb-flash-drives-part-1/
SySS Tech Blog
Hacking Some More Secure USB Flash Drives (Part I)
During a research project in the beginning of 2022, SySS IT security expert Matthias Deeg found several security vulnerabilities in different tested USB flash drives with AES hardware encryption.
ByteShield
Reverse engineering of AES protected USB flash drives Excellent research by @matthiasdeeg https://blog.syss.com/posts/hacking-usb-flash-drives-part-1/
SySS Tech Blog
Hacking Some More Secure USB Flash Drives (Part II)
In the second article of this series, SySS IT security expert Matthias Deeg presents security vulnerabilities found in another crypto USB flash drive with AES hardware encryption.
We aren’t aware of the darkness and pain we are living in. When Mahdi and Jesus return, then will we know the true meaning of light and life. It is then that we will be feel great regret as to why we had delayed our prayers for their return.
#ThePromisedSaviour
#ThePromisedSaviour
👍8
Forwarded from ITShield
Media is too big
VIEW IN TELEGRAM
جلسه بیست و دوم دوره اسمبلی
فراخوانی های سیستمی برای کار کردن با فایلها و ...
https://t.iss.one/itshieldassembly
#ASM
فراخوانی های سیستمی برای کار کردن با فایلها و ...
https://t.iss.one/itshieldassembly
#ASM
👍1
ARM64 Reversing And Exploitation Part 1
https://8ksec.io/arm64-reversing-and-exploitation-part-1-arm-instruction-set-simple-heap-overflow/
https://8ksec.io/arm64-reversing-and-exploitation-part-1-arm-instruction-set-simple-heap-overflow/
8kSec - 8kSec is a cybersecurity research & training company. We provide high-quality training & consulting services.
ARM64 Reversing And Exploitation Part 1 – ARM Instruction Set + Simple Heap Overflow | 8kSec Blogs
ARM64 Reversing and Exploitation Part 1 blog series - Learn ARM64 instruction set and how to use it to reverse engineer ARM binaries.
ARM64 Reversing And Exploitation Part 2
https://8ksec.io/arm64-reversing-and-exploitation-part-2-use-after-free/
https://8ksec.io/arm64-reversing-and-exploitation-part-2-use-after-free/
ARM64 Reversing And Exploitation Part 3
https://8ksec.io/arm64-reversing-and-exploitation-part-3-a-simple-rop-chain/
https://8ksec.io/arm64-reversing-and-exploitation-part-3-a-simple-rop-chain/
ARM64 Reversing And Exploitation Part 4
https://8ksec.io/arm64-reversing-and-exploitation-part-4-using-mprotect-to-bypass-nx-protection-8ksec-blogs/
https://8ksec.io/arm64-reversing-and-exploitation-part-4-using-mprotect-to-bypass-nx-protection-8ksec-blogs/
8kSec - 8kSec is a cybersecurity research & training company. We provide high-quality training & consulting services.
ARM64 Reversing And Exploitation Part 4 – Using Mprotect() To Bypass NX Protection | 8kSec Blogs
In ARM64 Reversing and Exploitation Part 4, find out how to utilize mprotect() to get around NX on ARM64 and execute your shellcode. Read to find out more!
ARM64 Reversing And Exploitation Part 5
https://8ksec.io/arm64-reversing-and-exploitation-part-5-writing-shellcode-8ksec-blogs/
https://8ksec.io/arm64-reversing-and-exploitation-part-5-writing-shellcode-8ksec-blogs/
ARM64 Reversing And Exploitation Part 6
https://8ksec.io/arm64-reversing-and-exploitation-part-6-exploiting-an-uninitialized-stack-variable-vulnerability/
https://8ksec.io/arm64-reversing-and-exploitation-part-6-exploiting-an-uninitialized-stack-variable-vulnerability/
ARM64 Reversing And Exploitation Part 7
https://8ksec.io/arm64-reversing-and-exploitation-part-7-bypassing-aslr-and-nx/
https://8ksec.io/arm64-reversing-and-exploitation-part-7-bypassing-aslr-and-nx/
8kSec - 8kSec is a cybersecurity research & training company. We provide high-quality training & consulting services.
ARM64 Reversing And Exploitation Part 7 – Bypassing ASLR and NX
Learn ARM64 Binary Exploitation and get around ASLR and NX constraints in our Part 7 of the ARM64 Reversing and Exploitation Series. Read more !
ARM64 Reversing And Exploitation Part 8
https://8ksec.io/arm64-reversing-and-exploitation-part-8-exploiting-an-integer-overflow-vulnerability/
https://8ksec.io/arm64-reversing-and-exploitation-part-8-exploiting-an-integer-overflow-vulnerability/