Reference Library
26.5K subscribers
1K photos
122 videos
343K files
10.3K links
کتابخانه مرجع
مرجع تخصصی کتاب

لینک چنل آرشیو کتب:
@BOOKzMA
Download Telegram
DeepAID.pdf
3.4 MB
#Research
"DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications", 2021.

]-> Repo: https://github.com/dongtsi/DeepAID

📰
📚
Cyber_Hawkes.pdf
881.3 KB
#Research
"Multivariate Hawkes process for cyber insurance", 2020.

📰
📚
practical_attacks_ml.pdf
990.6 KB
#Whitepaper
#Threat_Research
"Practical Attacks on Machine Learning Systems", 2022.

📰
📚
Lockbit_3.0.pdf
2.5 MB
#Malware_analysis
"Lockbit Black 3.0 Ransomware", 2022.


📰
📚
ENISA_CTL_Methodology.pdf
1.5 MB
#Infosec_Standards
"ENISA Cybersecurity Threat Landscape Methodology, July 2022.

📰
📚
poor_man's_obfuscator.pdf
5.7 MB
#Whitepaper
"The Poor Man's Obfuscator:
Pass The Salt 2022".
https://www.romainthomas.fr/publication/22-pst-the-poor-mans-obfuscator
// This paper is to present ELF/Mach-O transformations which impact or hinder disassemblers like IDA, BinaryNinja, Ghidra, Radare2

]-> Binary/scripts:
https://github.com/romainthomas/the-poor-mans-obfuscator

📰
📚
unorthodox_lateral_movement.pdf
3.5 MB
#Red_Team
"Unorthodox Lateral Movement: Stepping Away From Standard Tradecraft", 2022.

📰
📚
Maui_Ransomware.pdf
342.4 KB
#Malware_analysis
"Maui ransomware", 06/07/2022.

📰
📚
Machine_learning-based_ransomware_detect.pdf
1 MB
#Research
"Machine Learning-based Ransomware Detection Using Low-level Memory Access Patterns Obtained From Live-forensic Hypervisor", 2022.

📰
📚
ebpf_offensive_rootkit.pdf
5.4 MB
#Research
#Malware_analysis
"An analysis of offensive capabilities of eBPF and implementation of a rootkit", 2022.

]-> A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities:
https://github.com/h3xduck/TripleCross

📰
📚
cdn_judo.pdf
3.7 MB
#Threat_Research
"CDN Judo: Breaking the CDN DoS Protection with Itself", NDSS 2020.

📰
📚
AMSI_Bypass.pdf
1.3 MB
#Offensive_security
Black Hat Asia 2022:
"AMSI Unchained: Review of Known AMSI Bypass Techniques and Introducing a New One".

📰
📚
Evilnum.pdf
2 MB
#Whitepaper
"Return of the Evilnum #APT with updated TTPs and new targets", 2022.

📰
📚
esc_virtualized_containers.pdf
2.9 MB
#Offensive_security
Black Hat USA 2020:
"Escaping Virtualized Containers".

📰
📚
DKIM.pdf
1.5 MB
#Research
"A Large-scale and Longitudinal Measurement Study of DKIM Deployment", ВUSENIX Security, 2022.

📰
📚
TG1021 - Praying Mantis Threat Actor (2021).pdf
797.2 KB
#Research
"HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP Implementations", IEEE/IFIP 2022.
]-> Repo: https://github.com/mo-xiaoxi/HDiff

📰
📚