Process_Forking.pdf
524.4 KB
#Whitepaper
"Abusing Windows Implementation of Fork() for Stealthy Memory Operations", 2021.
https://billdemirkapi.me/abusing-windows-implementation-of-fork-for-stealthy-memory-operations
]-> An implementation and PoC of Process Forking:
https://github.com/D4stiny/ForkPlayground
📚
"Abusing Windows Implementation of Fork() for Stealthy Memory Operations", 2021.
https://billdemirkapi.me/abusing-windows-implementation-of-fork-for-stealthy-memory-operations
]-> An implementation and PoC of Process Forking:
https://github.com/D4stiny/ForkPlayground
📚
Testability_Tarpits.pdf
819 KB
#Research
"Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications", NDSS 2022.
]-> Repo: https://github.com/enferas/TestabilityTarpits
📚
"Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications", NDSS 2022.
]-> Repo: https://github.com/enferas/TestabilityTarpits
📚
email_auth_best_practices.pdf
284.7 KB
#hardening
#exploit
Email Authentication Recommended Best Practices (.pdf) + The Gmail SMTP Relay Service Exploit:
https://www.avanan.com/blog/the-gmail-smtp-relay-service-exploit
📚
#exploit
Email Authentication Recommended Best Practices (.pdf) + The Gmail SMTP Relay Service Exploit:
https://www.avanan.com/blog/the-gmail-smtp-relay-service-exploit
📚
APT32_macros.pdf
2.5 MB
#Threat_Research
Threat research report:
"The origin story of APT32 macros: The StrikeSuit Gift that keeps giving", 2022.
📰
📚
Threat research report:
"The origin story of APT32 macros: The StrikeSuit Gift that keeps giving", 2022.
📰
📚
SANS_CSPS_SEC540_v2.1_0422 @Library_Sec-protected.pdf
3 MB
#SANS also released a poster with an application security #checklist, as well as a poster with useful links in 9 areas for protecting, monitoring and controlling the three main cloud platforms - #AWS, #Azure and Google. These areas include DevSecOps, infrastructure security, IAM, architecture, threat detection and response, governance, application protection, computing protection, data protection.
Password :
📚
Password :
📚
RW-Fuzzer.pdf
747.1 KB
#Threat_Research
"RW-Fuzzer: A Fuzzing Method for Vulnerability Mining on Router Web Interface", 2022.
📰
📚
"RW-Fuzzer: A Fuzzing Method for Vulnerability Mining on Router Web Interface", 2022.
📰
📚
breaking_formation_aws.pdf
4.1 MB
#Research
#Cloud_Security
"Breaking Formation: From an Error Message to AWS Infrastructure", 2022.
📰
📚
#Cloud_Security
"Breaking Formation: From an Error Message to AWS Infrastructure", 2022.
📰
📚
Security Operation Center 40 Tools.pdf
1.1 MB
Security Operation Center 40 Tools
📰
📚
📰
📚
IDS_eBPF.pdf
53.8 KB
#Research
#BlueTeam
"A flow-based IDS using Machine Learning in eBPF", 2022.
]-> https://github.com/CN-TU/machine-learning-in-ebpf
📰
📚
#BlueTeam
"A flow-based IDS using Machine Learning in eBPF", 2022.
]-> https://github.com/CN-TU/machine-learning-in-ebpf
📰
📚