Reference Library
26.5K subscribers
1K photos
122 videos
343K files
10.3K links
کتابخانه مرجع
مرجع تخصصی کتاب

لینک چنل آرشیو کتب:
@BOOKzMA
Download Telegram
NIST_SP_800_160_v1_r1.pdf
5.2 MB
#Infosec_Standards
NIST SP 800-160 Vol.1, Rev.1:
"Engineering Trustworthy Secure Systems", June 2022.

📰
📚
Intel_wifi.pdf
273.9 KB
#reversing
#WLAN_Security
"Ghost in the Wireless, iwlwifi edition", 2022.

📰
📚
MacOS_Browser_Hijacking.pdf
905.3 KB
#Malware_analysis
"How CrowdStrike Uncovered a New MacOS Browser Hijacking Campaign", 2022.

📰
📚
Hunting in memory.pdf
1.3 MB
Hunting in memory

📰
📚
Azure Sentinel Best Practices.pdf
625.4 KB
#Azure
Azure Sentinel Best Practices

📰
📚
Penetration Testing of Web Applications Bug Bounty Program.pdf
2.7 MB
Penetration Testing of Web Applications Bug Bounty Program

📰
📚
AZURE AZ-104 MATERIAL.pdf
1.9 MB
#Azure
AZURE AZ-104 MATERIAL

📰
📚
Cybersecurity_Solutions.pdf
5.1 MB
#Analytics
"Cybersecurity Solutions for a Riskier World:
How business and government can protect themselves in the emerging risk landscape", 2022.

📰
📚
SideWinder_Analysis.pdf
10.2 MB
#Malware_analysis
SideWinder.AntiBot.Script - Analysis of SideWinder's new infrastructure and tool
Investigating 🔎 WMI Attacks .pdf
5.2 MB
#WMI
Investigating 🔎 WMI Attacks

📰
📚
SOC.pdf
440.5 KB
Creating and Maintaining
a SOC : The details behind successful security operations centers.

📰
📚
cve_2022_27438.pdf
449.1 KB
#exploit
#Whitepaper
CVE-2022-27438:
Caphyon Advanced Installer 19.3 - "CustomDetection" Update Check RCE Vulnerability (PoC)
📰
📚
22WOOT.pdf
200.7 KB
#Research
#WLAN_Security
"On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats", 2022.

📰
📚
Fight_Poison_with_Poison.pdf
20.8 MB
#Malware_analysis
"Fight Poison with Poison: Detecting Backdoor Poison Samples via Decoupling Benign Correlations", 2022.

]-> https://github.com/Unispac/Fight-Poison-With-Poison
Hunting_for_Modern_AD_Attacks_Kheirkhabarov_Sokolin.pdf
24.9 MB
"Hunting for Active Directory Certificate Services Abuse", 2022.

📚 t.iss.one/Library_Sec
Circumventing_Backdoor_Defenses.pdf
4.6 MB
#Research
"Circumventing Backdoor Defenses That Are Based on Latent Separability", 2022.

]-> Repo: https://github.com/Unispac/Circumventing-Backdoor-Defenses

📰
📚
Hiding_Plain_Signal.pdf
705.5 KB
#5G_Network_Security
"Hiding in Plain Signal:
Physical Signal Overshadowing Attack on LTE".

📰
📚
GhostTouch.pdf
2.2 MB
#Research
"GhostTouch: Targeted Attacks on Touchscreens without Physical Touch", 2022.

📰
📚