Reference Library
26.5K subscribers
1K photos
122 videos
343K files
10.3K links
کتابخانه مرجع
مرجع تخصصی کتاب

لینک چنل آرشیو کتب:
@BOOKzMA
Download Telegram
Azure Sentinel Best Practices.pdf
625.4 KB
#Azure
Azure Sentinel Best Practices

📰
📚
Penetration Testing of Web Applications Bug Bounty Program.pdf
2.7 MB
Penetration Testing of Web Applications Bug Bounty Program

📰
📚
AZURE AZ-104 MATERIAL.pdf
1.9 MB
#Azure
AZURE AZ-104 MATERIAL

📰
📚
Cybersecurity_Solutions.pdf
5.1 MB
#Analytics
"Cybersecurity Solutions for a Riskier World:
How business and government can protect themselves in the emerging risk landscape", 2022.

📰
📚
SideWinder_Analysis.pdf
10.2 MB
#Malware_analysis
SideWinder.AntiBot.Script - Analysis of SideWinder's new infrastructure and tool
Investigating 🔎 WMI Attacks .pdf
5.2 MB
#WMI
Investigating 🔎 WMI Attacks

📰
📚
SOC.pdf
440.5 KB
Creating and Maintaining
a SOC : The details behind successful security operations centers.

📰
📚
cve_2022_27438.pdf
449.1 KB
#exploit
#Whitepaper
CVE-2022-27438:
Caphyon Advanced Installer 19.3 - "CustomDetection" Update Check RCE Vulnerability (PoC)
📰
📚
22WOOT.pdf
200.7 KB
#Research
#WLAN_Security
"On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats", 2022.

📰
📚
Fight_Poison_with_Poison.pdf
20.8 MB
#Malware_analysis
"Fight Poison with Poison: Detecting Backdoor Poison Samples via Decoupling Benign Correlations", 2022.

]-> https://github.com/Unispac/Fight-Poison-With-Poison
Hunting_for_Modern_AD_Attacks_Kheirkhabarov_Sokolin.pdf
24.9 MB
"Hunting for Active Directory Certificate Services Abuse", 2022.

📚 t.iss.one/Library_Sec
Circumventing_Backdoor_Defenses.pdf
4.6 MB
#Research
"Circumventing Backdoor Defenses That Are Based on Latent Separability", 2022.

]-> Repo: https://github.com/Unispac/Circumventing-Backdoor-Defenses

📰
📚
Hiding_Plain_Signal.pdf
705.5 KB
#5G_Network_Security
"Hiding in Plain Signal:
Physical Signal Overshadowing Attack on LTE".

📰
📚
GhostTouch.pdf
2.2 MB
#Research
"GhostTouch: Targeted Attacks on Touchscreens without Physical Touch", 2022.

📰
📚
AtLayer2_PoC.pdf
3.2 MB
#Offensive_security
Exploit Persistent XSS And Unsanitized Injection Vectors For Layer 2 Bypass And COOLHANDLUKE Protocol Creation

// demonstrates leveraging cross site scripting and polyglot exploitation in an exploit COOLHANDLUKE to violate network segmentation / L2 VLAN policies while routing and sending a file between isolated, air gapped networks without a router. This issue affects HP Procurve, Aruba Networks, Cisco, Dell, Netgear products
📰
📚
L7_Cisco.pdf
4.1 MB
#Whitepaper
"Exploiting Persistent XSS And Unsanitized Injection Vectors For DIRECTIVEFOUR Protocol Creation/IP Router-Less Tunneling", 2021.

// This issue affects Cisco SMB/Sx Series switches

📰
📚
WizardSpider_v1.4.pdf
3.7 MB
#Threat_Research
"Wizard Spider In-Depth Analysis", 2022.
Pre-hijacked_accounts.pdf
642.4 KB
#Research
"Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web", 2022.

]-> https://msrc-blog.microsoft.com/2022/05/23/pre-hijacking-attacks