@gambegam_darsi.pdf
17.1 MB
#گام_به_گام حسابداری حقوق و دستمزد
#یازدهم_حسابداری
از ابتدا تا انتهای کتاب
کانال رسمی گام به گام فنی🛠
🆔
#یازدهم_حسابداری
از ابتدا تا انتهای کتاب
کانال رسمی گام به گام فنی🛠
🆔
4_5987805746362845068.pdf
20.2 MB
گام به گام حقوق و دستمزد
یازدهم حسابداری
یازدهم حسابداری
4_5902214654540646231.pdf
17.1 MB
گام به گام حقوق و دستمزد
یازدهم حسابداری
یازدهم حسابداری
UbSym.pdf
978.5 KB
"A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes", 2022.
Memory corruption vulnerabilities are prevalent and detrimental software weaknesses, which potentially occur when programming with low-level languages (usually C and C++).
]-> Tool: https://github.com/SoftwareSecurityLab/UbSym
📚 t.iss.one/Library_Sec
Memory corruption vulnerabilities are prevalent and detrimental software weaknesses, which potentially occur when programming with low-level languages (usually C and C++).
]-> Tool: https://github.com/SoftwareSecurityLab/UbSym
📚 t.iss.one/Library_Sec
L2Fuzz.pdf
3.3 MB
#Fuzzing
"L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing", 2022.
Bluetooth is a wireless communication technology that allows users to exchange various data in a short range, including Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) and
Bluetooth Low Energy (BLE). Owing to their convenience, billions of devices have adopted Bluetooth technologies .
]-> A stateful fuzzer to detect vulnerabilities in Bluetooth BR/EDR LLC/L2CAP:
https://github.com/haramel/l2fuzz
📚
"L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing", 2022.
Bluetooth is a wireless communication technology that allows users to exchange various data in a short range, including Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) and
Bluetooth Low Energy (BLE). Owing to their convenience, billions of devices have adopted Bluetooth technologies .
]-> A stateful fuzzer to detect vulnerabilities in Bluetooth BR/EDR LLC/L2CAP:
https://github.com/haramel/l2fuzz
📚
LibDB.pdf
1 MB
#Sec_code_review
"LibDB: An Effective and Efficient Framework for Detecting Third-Party Libraries in Binaries", 2022.
Third-party libraries (TPLs) are important components of modern
software systems. They are reused frequently during software de velopment . Open-source repository platforms and package management systems are the major sources of third-party libraries.
However, security issues of the third-party code continue to arise.
Vulnerabilities in well-known third-party libraries, such as the
Heartbleed bug, could bring security threats to millions of devices. In addition, non-compliant reuse, which is a violation of legal software licenses, could lead to costly commercial disputes. Unfortunately, many developers do not pay sufficient attention to the code that is imported from third-party libraries.
]-> Datasets and source code:
https://github.com/DeepSoftwareAnalytics/LibDB
📚
"LibDB: An Effective and Efficient Framework for Detecting Third-Party Libraries in Binaries", 2022.
Third-party libraries (TPLs) are important components of modern
software systems. They are reused frequently during software de velopment . Open-source repository platforms and package management systems are the major sources of third-party libraries.
However, security issues of the third-party code continue to arise.
Vulnerabilities in well-known third-party libraries, such as the
Heartbleed bug, could bring security threats to millions of devices. In addition, non-compliant reuse, which is a violation of legal software licenses, could lead to costly commercial disputes. Unfortunately, many developers do not pay sufficient attention to the code that is imported from third-party libraries.
]-> Datasets and source code:
https://github.com/DeepSoftwareAnalytics/LibDB
📚
Exploits_GitHub.pdf
978 KB
"How security professionals are being attacked: A study of malicious CVE proof of concept exploits in GitHub", 2022.
CVE, which stands for Common Vulnerabilities and Exposures1, is a list of publicly disclosed security flaws in software or systems, which have been assigned individual CVE IDs.
]-> Tool: https://github.com/SoftwareSecurityLab/UbSym
📚
CVE, which stands for Common Vulnerabilities and Exposures1, is a list of publicly disclosed security flaws in software or systems, which have been assigned individual CVE IDs.
]-> Tool: https://github.com/SoftwareSecurityLab/UbSym
📚
Widevine.pdf
386 KB
#tools
#Offensive_security
"Exploring Widevine for Fun and Profit", 2022.
]-> Widevine Key Ladder Script (Python3):
https://github.com/Avalonswanderer/widevine_key_ladder
]-> A tool to trace Widevine execution in Android and dump buffers: https://github.com/Avalonswanderer/wideXtractor
Nowadays, people prefer media consumption on over-thetop platforms (OTT), such as Netflix and Amazon Prime, that distribute multimedia content over the Internet, allowing users to play them whenever they wish. Such ease of viewing the same videos across devices creates challenges for content producers and owners.
#Offensive_security
"Exploring Widevine for Fun and Profit", 2022.
]-> Widevine Key Ladder Script (Python3):
https://github.com/Avalonswanderer/widevine_key_ladder
]-> A tool to trace Widevine execution in Android and dump buffers: https://github.com/Avalonswanderer/wideXtractor
Nowadays, people prefer media consumption on over-thetop platforms (OTT), such as Netflix and Amazon Prime, that distribute multimedia content over the Internet, allowing users to play them whenever they wish. Such ease of viewing the same videos across devices creates challenges for content producers and owners.
FlowDroid.pdf
1.2 MB
#Mobile_Security
#Sec_code_review
"Demystifying Hidden Sensitive Operations in Android apps", 2022.
]-> FlowDroid Static Data Flow Analysis Tool:
https://github.com/secure-software-engineering/FlowDroid
Android is the most adopted mobile operating systems in terms of users, applications and developers . However, its popularity means that legitimate developers must co-exist with malware writers.
#Sec_code_review
"Demystifying Hidden Sensitive Operations in Android apps", 2022.
]-> FlowDroid Static Data Flow Analysis Tool:
https://github.com/secure-software-engineering/FlowDroid
Android is the most adopted mobile operating systems in terms of users, applications and developers . However, its popularity means that legitimate developers must co-exist with malware writers.