Reference Library
26.5K subscribers
1K photos
122 videos
343K files
10.3K links
کتابخانه مرجع
مرجع تخصصی کتاب

لینک چنل آرشیو کتب:
@BOOKzMA
Download Telegram
Cloud_Analytics_Dev.pdf
1.5 MB
#Cloud_Security
"Cloud Analytic Development Blueprint", 2022.

📰
📚
win10_vs_win11.pdf
281.9 KB
#Whitepaper
"Windows 10 vs. Windows 11 (Security Features), What Has Changed?", 2022.

📰
📚
Leaked_Twitter_API_Keys.pdf
398.1 KB
#Whitepaper
"How Leaked Twitter API Keys Can be Used to Build a Bot Army", 2022.

📰
📚
Attacks_neural_net.pdf
5.7 MB
#Research
"Attacks On Image Processing Neural Networks", 2022.
]-> Repo: https://github.com/oreganko/Attacks-On-Image-Processing-Neural-Networks

📰
📚
SIDH_Key_Recovery.pdf
429 KB
#cryptography
"An Efficient Key Recovery Attack on Supersingular Isogeny Diffie-Hellman (SIDH) Protocol (Preliminary Version)", 2022.

📰
📚
stealthy_quasar_evolving.pdf
11.2 MB
#Whitepaper
#Malware_analysis
"Stealthy Quasar Evolving to Lead the RAT Race: Technical Analysis of a Quasar RAT Campaign", 22.07.2022.

📰
📚
Attack_Surface_Enumerating_Auth_Methods.pdf
2.8 MB
#Research
"Exploring Azure Active Directory Attack Surface: Enumerating Authentication Methods with Open-Source Intelligence Tools", 2022.

📰
📚
DUCKTAIL.pdf
7.7 MB
#Malware_analysis
"DUCKTAIL: An infostealer targeting Facebook business accounts", 2022.

📰
📚
Ramnit_worm.pdf
912.4 KB
#Malware_analysis
"Malware analysis with IDA/Radare2 - Multiple unpacking (Ramnit worm)", 2022.

📰
📚
Active Directory Exploitation Cheat Sheet by S1ckB0y1337.pdf
591.1 KB
Active Directory Exploitation Cheat Sheet

#RedTeam

📰
📚
unit42_threat_research_report.pdf
5.1 MB
#Analytics
"2022 Unit 42 Network Threat Trends Research Report".

📰
📚
Deoptfuscator_Android.pdf
1.1 MB
#Malware_analysis
"Deoptfuscator: Defeating Advanced Control-Flow Obfuscation Using Android Runtime (ART)", 2022.

]-> Deobfuscator for Android Application:
https://github.com/Gyoonus/deoptfuscator

📰
📚
KMSPico_V5.pdf
969.3 KB
#Whitepaper
"KMSPico with extra spice".

📰
📚
SATAn.pdf
10 MB
#Research
"SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables", 2022.

📰
📚
Directing_greybox_fuzzing.pdf
1.3 MB
#Research
"Directing greybox fuzzing to discover bugs in hardware and software", 2022.

📰
📚
industrial_espionage_operation.pdf
10 MB
#Whitepaper
#Threat_Research
"Anatomy of an industrial espionage operation", 2022.

📰
📚
Lockbit_3.0.pdf
1.1 MB
#Malware_analysis
"Lockbit 3.0 AKA Lockbit Black is here, with a new icon, new ransom note, new wallpaper, but less evasiveness?".
]-> https://blog.cyble.com/2022/07/05/lockbit-3-0-ransomware-group-launches-new-version

📰
📚
Log4Shell_Exploitation.pdf
4.8 MB
#Whitepaper
"The Long Tail of #Log4Shell Exploitation", 2022.

📰
📚
NIST_IR_8323_r1.pdf
1.7 MB
#Infosec_Standards
NISTIR 8323 Rev. 1 (Draft):
"Foundational PNT Profile: Applying the Cybersecurity Framework for the Responsible Use of Positioning, Navigation, and Timing (PNT) Services", 2022.

📰
📚
Detection_as_Code_Innovation_Report_2021.pdf
13.1 MB
#Analytics
"Detection as Code Innovation Report", 2021.

📰
📚