Win_Exploitation_Attacking.pdf
1.4 MB
#Threat_Research
Black Hat Asia 2022:
"The Next Generation of Windows Exploitation: Attacking the Common Log File System", 2022.
📰
📚
Black Hat Asia 2022:
"The Next Generation of Windows Exploitation: Attacking the Common Log File System", 2022.
📰
📚
Evasion_Tactics.pdf
5.8 MB
#Red_Team_Tactics
"Modern Initial Access and Evasion Tactics"
]-> https://mgeeky.tech/warcon-2022-modern-initial-access-and-evasion-tactics
📰
📚
"Modern Initial Access and Evasion Tactics"
]-> https://mgeeky.tech/warcon-2022-modern-initial-access-and-evasion-tactics
📰
📚
Sponge_Examples.pdf
3 MB
#Research
"Sponge Examples: Energy Latency Attacks on Neural Networks", 2021.
]-> Repo: https://github.com/iliaishacked/sponge_examples
📰
📚
"Sponge Examples: Energy Latency Attacks on Neural Networks", 2021.
]-> Repo: https://github.com/iliaishacked/sponge_examples
📰
📚
DevOps_Handbook.pdf
10.6 MB
#Tech_book
"The DevOps Career Handbook:
The ultimate guide to pursuing a successful career in DevOps", 2022.
📰
📚
"The DevOps Career Handbook:
The ultimate guide to pursuing a successful career in DevOps", 2022.
📰
📚
Static_C_Code_Analyzers.pdf
811.3 KB
#Threat_Research
#Sec_code_review
"An Empirical Study on the Effectiveness of Static C Code Analyzers for Vulnerability Detection", 2022.
📰
📚
#Sec_code_review
"An Empirical Study on the Effectiveness of Static C Code Analyzers for Vulnerability Detection", 2022.
📰
📚
Bypass_EDRs.pdf
1.3 MB
#Offensive_security
"Bypass EDR’s memory protection, introduction to hooking", 2020.
]-> AndrewSpecial, dumping lsass' memory stealthily and bypassing "Cilence":
https://github.com/hoangprod/AndrewSpecial/tree/master
📰
📚
"Bypass EDR’s memory protection, introduction to hooking", 2020.
]-> AndrewSpecial, dumping lsass' memory stealthily and bypassing "Cilence":
https://github.com/hoangprod/AndrewSpecial/tree/master
📰
📚
OT_ICEFALL.pdf
3.3 MB
#Analytics
#Threat_Research
"The legacy of "insecure by design" and its implications for certifications and risk management", 2022.
// Forescout Vedere Labs Discovers 56 OT Vulnerabilities
📰
📚
#Threat_Research
"The legacy of "insecure by design" and its implications for certifications and risk management", 2022.
// Forescout Vedere Labs Discovers 56 OT Vulnerabilities
📰
📚
Jailbreaking_RouterOS.pdf
10.7 MB
#reversing
"Pulling MikroTik into the Limelight:
Demystifying and Jailbreaking RouterOS", REcon 2022.
]-> https://margin.re/blog/pulling-mikrotik-into-the-limelight.aspx
📰
📚
"Pulling MikroTik into the Limelight:
Demystifying and Jailbreaking RouterOS", REcon 2022.
]-> https://margin.re/blog/pulling-mikrotik-into-the-limelight.aspx
📰
📚
fuzzorigin.pdf
2.3 MB
#Threat_Research
"FUZZORIGIN: Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing", 2022.
📰
📚
"FUZZORIGIN: Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing", 2022.
📰
📚
shellcode.pdf
1.3 MB
#Whitepaper
"From a C project, through assembly, to shellcode", v.1.2, 2020.
]-> Dll injection through code page id modification in registry:
https://github.com/NtQuerySystemInformation/NlsCodeInjectionThroughRegistry
📰
📚
"From a C project, through assembly, to shellcode", v.1.2, 2020.
]-> Dll injection through code page id modification in registry:
https://github.com/NtQuerySystemInformation/NlsCodeInjectionThroughRegistry
📰
📚
SVCReady_malware.pdf
199.7 KB
#Malware_analysis
"New SVCReady malware loads from Word doc properties - Detection & Response", 2022.
📰
📚
"New SVCReady malware loads from Word doc properties - Detection & Response", 2022.
📰
📚