Reference Library
26.5K subscribers
1K photos
122 videos
343K files
10.3K links
کتابخانه مرجع
مرجع تخصصی کتاب

لینک چنل آرشیو کتب:
@BOOKzMA
Download Telegram
Process_Forking.pdf
524.4 KB
#Whitepaper
"Abusing Windows Implementation of Fork() for Stealthy Memory Operations", 2021.
https://billdemirkapi.me/abusing-windows-implementation-of-fork-for-stealthy-memory-operations
]-> An implementation and PoC of Process Forking:
https://github.com/D4stiny/ForkPlayground

📚
Testability_Tarpits.pdf
819 KB
#Research
"Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications", NDSS 2022.

]-> Repo: https://github.com/enferas/TestabilityTarpits

📚
email_auth_best_practices.pdf
284.7 KB
#hardening
#exploit
Email Authentication Recommended Best Practices (.pdf) + The Gmail SMTP Relay Service Exploit:
https://www.avanan.com/blog/the-gmail-smtp-relay-service-exploit

📚
APT32_macros.pdf
2.5 MB
#Threat_Research
Threat research report:
"The origin story of APT32 macros: The StrikeSuit Gift that keeps giving", 2022.

📰
📚
0days_ent_software.pdf
4.1 MB
#exploit
#Whitepaper
"Finding 0days in Enterprise Software".

📰
📚
web_sleep_agents.pdf
804.3 KB
#Research
"Awakening the Web's Sleeper Agents: Misusing Service Workers for Privacy Leakage", 2021.

📚
SANS_CSPS_SEC540_v2.1_0422 @Library_Sec-protected.pdf
3 MB
#SANS also released a poster with an application security #checklist, as well as a poster with useful links in 9 areas for protecting, monitoring and controlling the three main cloud platforms - #AWS, #Azure and Google. These areas include DevSecOps, infrastructure security, IAM, architecture, threat detection and response, governance, application protection, computing protection, data protection.


Password :

📚
post-quantum_cryptography.pdf
319.3 KB
#Research
#cryptography
"Implementing Post-quantum Cryptography for Developers", 2022.

📰
📚
RW-Fuzzer.pdf
747.1 KB
#Threat_Research
"RW-Fuzzer: A Fuzzing Method for Vulnerability Mining on Router Web Interface", 2022.

📰
📚
Practical Windows Forensics.pdf
5.6 MB
#Forensics

Practical Windows Forensics

📰
📚
breaking_formation_aws.pdf
4.1 MB
#Research
#Cloud_Security
"Breaking Formation: From an Error Message to AWS Infrastructure", 2022.

📰
📚
Security Operation Center 40 Tools.pdf
1.1 MB
Security Operation Center 40 Tools

📰
📚
IDS_eBPF.pdf
53.8 KB
#Research
#BlueTeam
"A flow-based IDS using Machine Learning in eBPF", 2022.
]-> https://github.com/CN-TU/machine-learning-in-ebpf

📰
📚
HyperV_Path_Traversal.pdf
1.5 MB
#Research
"Escape From Hyper-V by Path Traversal", ZEROCON 2022.

🧩
📚