Reference Library
26.5K subscribers
1K photos
122 videos
343K files
10.3K links
کتابخانه مرجع
مرجع تخصصی کتاب

لینک چنل آرشیو کتب:
@BOOKzMA
Download Telegram
jcp_02_00020.pdf
1.9 MB
#Research
#Blue_Team
"Improved Detection and Response via Optimized Alerts: Usability Study", 2022.

📰
📚
fuzzing_ms_rdp_client.pdf
1.3 MB
#Research
"Fuzzing Microsoft’s RDP Client using Virtual Channels", 2022.

]-> wtf - distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer for attacking user and / or kernel-mode targets running on MS Windows:
https://github.com/0vercl0k/wtf

📰
📚
NIST_SP_800_160_v1_r1.pdf
5.2 MB
#Infosec_Standards
NIST SP 800-160 Vol.1, Rev.1:
"Engineering Trustworthy Secure Systems", June 2022.

📰
📚
Intel_wifi.pdf
273.9 KB
#reversing
#WLAN_Security
"Ghost in the Wireless, iwlwifi edition", 2022.

📰
📚
MacOS_Browser_Hijacking.pdf
905.3 KB
#Malware_analysis
"How CrowdStrike Uncovered a New MacOS Browser Hijacking Campaign", 2022.

📰
📚
Hunting in memory.pdf
1.3 MB
Hunting in memory

📰
📚
Azure Sentinel Best Practices.pdf
625.4 KB
#Azure
Azure Sentinel Best Practices

📰
📚
Penetration Testing of Web Applications Bug Bounty Program.pdf
2.7 MB
Penetration Testing of Web Applications Bug Bounty Program

📰
📚
AZURE AZ-104 MATERIAL.pdf
1.9 MB
#Azure
AZURE AZ-104 MATERIAL

📰
📚
Cybersecurity_Solutions.pdf
5.1 MB
#Analytics
"Cybersecurity Solutions for a Riskier World:
How business and government can protect themselves in the emerging risk landscape", 2022.

📰
📚
SideWinder_Analysis.pdf
10.2 MB
#Malware_analysis
SideWinder.AntiBot.Script - Analysis of SideWinder's new infrastructure and tool
Investigating 🔎 WMI Attacks .pdf
5.2 MB
#WMI
Investigating 🔎 WMI Attacks

📰
📚
SOC.pdf
440.5 KB
Creating and Maintaining
a SOC : The details behind successful security operations centers.

📰
📚
cve_2022_27438.pdf
449.1 KB
#exploit
#Whitepaper
CVE-2022-27438:
Caphyon Advanced Installer 19.3 - "CustomDetection" Update Check RCE Vulnerability (PoC)
📰
📚
22WOOT.pdf
200.7 KB
#Research
#WLAN_Security
"On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats", 2022.

📰
📚
Fight_Poison_with_Poison.pdf
20.8 MB
#Malware_analysis
"Fight Poison with Poison: Detecting Backdoor Poison Samples via Decoupling Benign Correlations", 2022.

]-> https://github.com/Unispac/Fight-Poison-With-Poison
Hunting_for_Modern_AD_Attacks_Kheirkhabarov_Sokolin.pdf
24.9 MB
"Hunting for Active Directory Certificate Services Abuse", 2022.

📚 t.iss.one/Library_Sec
Circumventing_Backdoor_Defenses.pdf
4.6 MB
#Research
"Circumventing Backdoor Defenses That Are Based on Latent Separability", 2022.

]-> Repo: https://github.com/Unispac/Circumventing-Backdoor-Defenses

📰
📚