Penetration Testing of Web Applications Bug Bounty Program.pdf
2.7 MB
Penetration Testing of Web Applications Bug Bounty Program
📰
📚
📰
📚
Cybersecurity_Solutions.pdf
5.1 MB
#Analytics
"Cybersecurity Solutions for a Riskier World:
How business and government can protect themselves in the emerging risk landscape", 2022.
📰
📚
"Cybersecurity Solutions for a Riskier World:
How business and government can protect themselves in the emerging risk landscape", 2022.
📰
📚
SideWinder_Analysis.pdf
10.2 MB
#Malware_analysis
SideWinder.AntiBot.Script - Analysis of SideWinder's new infrastructure and tool
SideWinder.AntiBot.Script - Analysis of SideWinder's new infrastructure and tool
SOC.pdf
440.5 KB
Creating and Maintaining
a SOC : The details behind successful security operations centers.
📰
📚
a SOC : The details behind successful security operations centers.
📰
📚
cve_2022_27438.pdf
449.1 KB
#exploit
#Whitepaper
CVE-2022-27438:
Caphyon Advanced Installer 19.3 - "CustomDetection" Update Check RCE Vulnerability (PoC)
📰
📚
#Whitepaper
CVE-2022-27438:
Caphyon Advanced Installer 19.3 - "CustomDetection" Update Check RCE Vulnerability (PoC)
📰
📚
22WOOT.pdf
200.7 KB
#Research
#WLAN_Security
"On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats", 2022.
📰
📚
#WLAN_Security
"On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats", 2022.
📰
📚
Fight_Poison_with_Poison.pdf
20.8 MB
#Malware_analysis
"Fight Poison with Poison: Detecting Backdoor Poison Samples via Decoupling Benign Correlations", 2022.
]-> https://github.com/Unispac/Fight-Poison-With-Poison
"Fight Poison with Poison: Detecting Backdoor Poison Samples via Decoupling Benign Correlations", 2022.
]-> https://github.com/Unispac/Fight-Poison-With-Poison
Circumventing_Backdoor_Defenses.pdf
4.6 MB
#Research
"Circumventing Backdoor Defenses That Are Based on Latent Separability", 2022.
]-> Repo: https://github.com/Unispac/Circumventing-Backdoor-Defenses
📰
📚
"Circumventing Backdoor Defenses That Are Based on Latent Separability", 2022.
]-> Repo: https://github.com/Unispac/Circumventing-Backdoor-Defenses
📰
📚
AtLayer2_PoC.pdf
3.2 MB
#Offensive_security
Exploit Persistent XSS And Unsanitized Injection Vectors For Layer 2 Bypass And COOLHANDLUKE Protocol Creation
// demonstrates leveraging cross site scripting and polyglot exploitation in an exploit COOLHANDLUKE to violate network segmentation / L2 VLAN policies while routing and sending a file between isolated, air gapped networks without a router. This issue affects HP Procurve, Aruba Networks, Cisco, Dell, Netgear products
📰
📚
Exploit Persistent XSS And Unsanitized Injection Vectors For Layer 2 Bypass And COOLHANDLUKE Protocol Creation
// demonstrates leveraging cross site scripting and polyglot exploitation in an exploit COOLHANDLUKE to violate network segmentation / L2 VLAN policies while routing and sending a file between isolated, air gapped networks without a router. This issue affects HP Procurve, Aruba Networks, Cisco, Dell, Netgear products
📰
📚
L7_Cisco.pdf
4.1 MB
#Whitepaper
"Exploiting Persistent XSS And Unsanitized Injection Vectors For DIRECTIVEFOUR Protocol Creation/IP Router-Less Tunneling", 2021.
// This issue affects Cisco SMB/Sx Series switches
📰
📚
"Exploiting Persistent XSS And Unsanitized Injection Vectors For DIRECTIVEFOUR Protocol Creation/IP Router-Less Tunneling", 2021.
// This issue affects Cisco SMB/Sx Series switches
📰
📚