Linux Hardening Guide.
• Choosing the right Linux distribution;
• Kernel hardening;
• Mandatory access control;
• Sandboxing;
• Hardened memory allocator;
• Hardened compilation flags;
• Memory safe languages;
• The root account;
• Firewalls;
• Identifiers;
• File permissions;
• Core dumps;
• Swap;
• PAM;
• Microcode updates;
• IPv6 privacy extensions;
• Partitioning and mount options;
• Entropy;
• Editing files as root;
• Distribution-specific hardening;
• Physical security;
• Best practices.
https://madaidans-insecurities.github.io
#Linux
• Choosing the right Linux distribution;
• Kernel hardening;
• Mandatory access control;
• Sandboxing;
• Hardened memory allocator;
• Hardened compilation flags;
• Memory safe languages;
• The root account;
• Firewalls;
• Identifiers;
• File permissions;
• Core dumps;
• Swap;
• PAM;
• Microcode updates;
• IPv6 privacy extensions;
• Partitioning and mount options;
• Entropy;
• Editing files as root;
• Distribution-specific hardening;
• Physical security;
• Best practices.
https://madaidans-insecurities.github.io
#Linux
❤1👍1👎1
Malware Development - Evading Diaries.
• NTFS Files Attributes;
• FuncIn;
• Code Cave;
• Stolen Certificate;
• Redirect Antivirus Website Evading Techniques;
• Shortcut Hiding;
• Disabling Antivirus;
• Adding Antivirus Exception;
• Fake Signature;
• Mark-Of-The-Web (MOTW) Bypass;
• Return Address Spoofing;
• Runtime Function Decryption;
• DLL Unhooking;
- How DLL Unhooking Works;
- Unhooking Strategies;
• Evasion Using Direct Syscalls;
- Key Aspects of This Technique;
- Operational Mechanism;
- Featured Windows APIs;
• Unloading Module With FreeLibrary;
- Operational Overview;
- Key Aspects of This Technique;
- Featured Windows APIs;
• References.
#Malware
• NTFS Files Attributes;
• FuncIn;
• Code Cave;
• Stolen Certificate;
• Redirect Antivirus Website Evading Techniques;
• Shortcut Hiding;
• Disabling Antivirus;
• Adding Antivirus Exception;
• Fake Signature;
• Mark-Of-The-Web (MOTW) Bypass;
• Return Address Spoofing;
• Runtime Function Decryption;
• DLL Unhooking;
- How DLL Unhooking Works;
- Unhooking Strategies;
• Evasion Using Direct Syscalls;
- Key Aspects of This Technique;
- Operational Mechanism;
- Featured Windows APIs;
• Unloading Module With FreeLibrary;
- Operational Overview;
- Key Aspects of This Technique;
- Featured Windows APIs;
• References.
#Malware
ExpiredDomains.com
redteamrecipe.com is for sale! Check it out on ExpiredDomains.com
Buy redteamrecipe.com for 195 on GoDaddy via ExpiredDomains.com. This premium expired .com domain is ideal for establishing a strong online identity.
👍1
Forwarded from CyberSecurityTechnologies (-CST-)
exploits_2024.tgz
167.6 MB
Telegram DataBase 2019 - 2023 150m
https://drive.google.com/file/d/1Ks9irnhv_0Yo_uHIp0K5VCRZAWLWe1fA/view?ts=677a5aab
https://drive.google.com/file/d/1Ks9irnhv_0Yo_uHIp0K5VCRZAWLWe1fA/view?ts=677a5aab
Daily OS Explorations | Exploring Operating Systems
https://mohitmishra786.github.io/exploring-os/src/
https://mohitmishra786.github.io/exploring-os/src/
Forwarded from The Bug Bounty Hunter
Stealing HttpOnly cookies with the cookie sandwich technique
https://portswigger.net/research/stealing-httponly-cookies-with-the-cookie-sandwich-technique
https://portswigger.net/research/stealing-httponly-cookies-with-the-cookie-sandwich-technique
👍1
Forwarded from AVN COMMUNITY 🪬
🔖 Windows API Function Cheatsheets
0. Process Enumeration Code
1. DLL Injection
2. PE Injection
3. Reflective Injection
4. APC Injection
5. Process Hollowing (Process Replacement)
6. AtomBombing
7. Process Doppelgänging
8. Process Herpaderping
9. Hooking Injection
10. Extra Windows Memory Injection
11. Propagate Injection
12. Heap Spray
13. Thread Execution Hijacking
14. Module Stomping
15. IAT Hooking
16. Inline Hooking
17. Debugger Injection
18. COM Hijacking
19. Phantom DLL Hollowing
20. PROPagate
21. Early Bird Injection
22. Shim-based Injection
23. Mapping Injection
24. KnownDlls Cache Poisoning
----->
Github: Link
#Cheatsheets
0. Process Enumeration Code
1. DLL Injection
2. PE Injection
3. Reflective Injection
4. APC Injection
5. Process Hollowing (Process Replacement)
6. AtomBombing
7. Process Doppelgänging
8. Process Herpaderping
9. Hooking Injection
10. Extra Windows Memory Injection
11. Propagate Injection
12. Heap Spray
13. Thread Execution Hijacking
14. Module Stomping
15. IAT Hooking
16. Inline Hooking
17. Debugger Injection
18. COM Hijacking
19. Phantom DLL Hollowing
20. PROPagate
21. Early Bird Injection
22. Shim-based Injection
23. Mapping Injection
24. KnownDlls Cache Poisoning
----->
Github: Link
#Cheatsheets
GitHub
GitHub - 7etsuo/windows-api-function-cheatsheets: A reference of Windows API function calls, including functions for file operations…
A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization,...
🔥1
Forwarded from /mdre/
Guys if you like my posts, please don't mind to share them, it will help channel grow :)