Avoiding_Memory_Scanners.pdf
529.9 KB
Avoiding Memory Scanners
Customizing Malware to Evade YARA, PE-sieve, and More.
📰
📚
Customizing Malware to Evade YARA, PE-sieve, and More.
📰
📚
Password spraying and MFA bypasses .pdf
1.5 MB
spraying Password ٍbypasses MFA در چشم انداز امنیتی مدرن
By : TryHackBox
Language : Persian
📰
📚
By : TryHackBox
Language : Persian
📰
📚
iwlwifi_Edition.pdf
273.9 KB
#WLAN_Security
"Ghost in the Wireless, iwlwifi edition"
]-> Tool: https://github.com/Ledger-Donjon/intel-wifi-research-tools
📰
📚
"Ghost in the Wireless, iwlwifi edition"
]-> Tool: https://github.com/Ledger-Donjon/intel-wifi-research-tools
📰
📚
Escaped_Silo.pdf
1.5 MB
#Cloud_Security
BlackHat USA 2022:
" COW (Container On Windows) Who Escaped the Silo: Isolations are made to be broken"
]-> Tools for analyzing Windows containers and break container's isolation:
https://github.com/SafeBreach-Labs/CoWTools
📰
📚
BlackHat USA 2022:
" COW (Container On Windows) Who Escaped the Silo: Isolations are made to be broken"
]-> Tools for analyzing Windows containers and break container's isolation:
https://github.com/SafeBreach-Labs/CoWTools
📰
📚
Malware_Classification_with_ML.pdf
538.9 KB
#Research
"Quo Vadis: Hybrid Machine Learning Meta-Model based on Contextual and Behavioral Malware Representations", 2022.
]-> Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation:
https://github.com/dtrizna/quo.vadis
📰
📚 t.iss.one/Library_Sec
"Quo Vadis: Hybrid Machine Learning Meta-Model based on Contextual and Behavioral Malware Representations", 2022.
]-> Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation:
https://github.com/dtrizna/quo.vadis
📰
📚 t.iss.one/Library_Sec
UWB_Real_Time_Locating_Systems.pdf
15.6 MB
#Research
#WLAN_Security
"UWB Real Time Locating Systems: How Secure Radio Communications May Fail in Practice", 2022.
]-> Tools to dissect the UWB RTLS communication, focusing on the anchors-server packets:
https://github.com/NozomiNetworks/blackhat22-uwb-rtls
📰
📚
#WLAN_Security
"UWB Real Time Locating Systems: How Secure Radio Communications May Fail in Practice", 2022.
]-> Tools to dissect the UWB RTLS communication, focusing on the anchors-server packets:
https://github.com/NozomiNetworks/blackhat22-uwb-rtls
📰
📚
secure_email_transmission_protocols.pdf
3 MB
#Whitepaper
"Secure Email Transmission Protocols - A New Architecture Design", 2022.
📚 t.iss.one/Library_Sec
"Secure Email Transmission Protocols - A New Architecture Design", 2022.
📚 t.iss.one/Library_Sec
DirtyCred.pdf
14.3 MB
#exploit
BlackHat USA 2022:
"Cautious! A New Exploitation Method! No Pipe but as Nasty as Dirty Pipe"
]-> https://github.com/markakd/DirtyCred
]-> Defense: https://github.com/Markakd/DirtyCred/tree/master/defense
📰
📚
BlackHat USA 2022:
"Cautious! A New Exploitation Method! No Pipe but as Nasty as Dirty Pipe"
]-> https://github.com/markakd/DirtyCred
]-> Defense: https://github.com/Markakd/DirtyCred/tree/master/defense
📰
📚
iPhone_Lightning_hacking.pdf
10.2 MB
#reversing
"The hitchhacker’s guide to iPhone Lightning & JTAG hacking", DEF CON 30.
]-> https://github.com/stacksmashing/tamarin-firmware
📰
📚
"The hitchhacker’s guide to iPhone Lightning & JTAG hacking", DEF CON 30.
]-> https://github.com/stacksmashing/tamarin-firmware
📰
📚