Reference Library
26.5K subscribers
1K photos
122 videos
343K files
10.3K links
کتابخانه مرجع
مرجع تخصصی کتاب

لینک چنل آرشیو کتب:
@BOOKzMA
Download Telegram
apple_platform_sec_22.pdf
2.4 MB
#Whitepaper
"Apple Platform Security", May 2022.

// This documentation provides details about how security technology and features are implemented within Apple platforms. It also helps organizations combine Apple platform security technology and features with their own policies and procedures to meet their specific security needs

📚
dependency_measurement.pdf
2.1 MB
#Research
"Demystifying the Dependency Challenge in Kernel Fuzzing", 2022.

📚
Cerberus.pdf
1.5 MB
#Threat_Research
"Cerberus: Query-driven Scalable Security Checking for OAuth Service Provider Implementations", 2022.
📚
A_tale_two_markets.pdf
656.9 KB
#Analytics
"A Tale of Two Markets: Investigating the Ransomware Payments Economy", 2022.

📚
Phishpedia.pdf
3.5 MB
#Research
"Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages", 2021.

📚
Recursive_MMIO.pdf
1.3 MB
Black Hat Asia 2022:
"Hunting and Exploiting Recursive MMIO Flaws in QEMU/KVM".

📚
Learn Splunk in 1 day by Sumit Pandey.pdf
1.1 MB
Learn Splunk in 1 day by Sumit Pandey

📚
Threat Hunting Architecture.pdf
303.6 KB
#Threat #Hunt

Threat Hunting Architecture

📚
Bypass_CFG.pdf
1.1 MB
#Offensive_security
Black Hat Asia 2022:
"Bypass Control Flow Guard (CFG) in Chrome".


📚
Robustness_WiFi6.pdf
1.2 MB
#WLAN_Security
"On the Robustness of Wi-Fi 6 Deauthentication Countermeasures", 2022.

📚
iPhone_Never_Sleep.pdf
2.3 MB
#Research
#Malware_analysis
"Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones", 2022.

// As a practical example what this means to security, we demonstrate the possibility to load malware onto a Bluetooth chip that is executed while the iPhone is off

📚
CEH Summarized.pdf
7.4 MB
#CEH

CEH Summarized

📚
Hidden_rce_Droids.pdf
3.5 MB
Black Hat Asia 2022:
"The Hidden RCE Surfaces that Control the droids".

📚