Reference Library
26.5K subscribers
1K photos
122 videos
343K files
10.3K links
کتابخانه مرجع
مرجع تخصصی کتاب

لینک چنل آرشیو کتب:
@BOOKzMA
Download Telegram
ransomware_threat-report_22.pdf
1.6 MB
#Analytics
#Threat_Research
Ransomware Threat Report, 2022.

📰
📚
11_strategies_soc.pdf
15.7 MB
#Whitepaper
11 Strategies of a World-Class
Cybersecurity Operations Center, 2022.

📰
📚
PACTIGHT.pdf
709.9 KB
#Research
"ARM Pointer Authentication:
Tightly Seal Your Sensitive Pointers with PACTIGHT", 2022.

📰
📚
Cfg.pdf
1.2 MB
#Research
"Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis", 2022.

]-> A generic seed scheduler for fuzzers (LibFuzzer and AFL) and concolic execution engine (qsym):
https://github.com/Dongdongshe/K-Scheduler

📰
📚
DoubleFetch_Report_2022.pdf
680.4 KB
#Whitepaper
"Double Fetch Vulnerabilities in C/C++", ver.1.0, 2022.

📰
📚
privacy_google_dialer_sms.pdf
1.1 MB
#Research
"What Data Do The Google Dialer And Messages Apps On Android Send To Google?", 2022.

// In-depth whitepaper that casts light on the actual telemetry data sent by Google Play Services, which to date has largely been opaque

📰
📚
Not_so_fast.pdf
525.4 KB
#compilers
"Not So Fast: Understanding and Mitigating Negative Impacts of Compiler Optimizations on Code Reuse Gadget Sets", 2021.

]-> Towards Practical Security Optimizations for Binaries:
https://blog.trailofbits.com/2022/03/25/towards-practical-security-optimizations-for-binaries

📰
📚
Bug_in_jit.pdf
690 KB
#Threat_Research
"Automated Bug Localization in JIT Compilers", 2021.

📰
📚
Speculative_Type_Confusion_Vulns.pdf
1.4 MB
#Research
"An Analysis of Speculative Type Confusion Vulnerabilities in the Wild", 2022.

📰
📚
Delegating_Kerberos.pdf
14.4 MB
#Offensive_security
Delegating Kerberos to bypass Kerberos delegation limitation
https://www.thehacker.recipes/ad/movement/kerberos/delegations

📰
📚
Raining_Shells.pdf
13.9 MB
#Cloud_Security
"It’s Raining Shells:
How to Find New Attack Primitives in Azure".

📰
📚
linux_endpoint_hardening.pdf
402.7 KB
#hardening
"Linux Endpoint Hardening to Protect Against Malware and Destructive Attacks", 2022.
📰
📚
Lapsus Group Knowhow.pdf
1.3 MB
#lapsus
Lapsus Group Knowhow

📰
📚
analysis_of_ransomware_binaries.pdf
2.3 MB
#Research
#Malware_analysis
"An Empirically Comparative Analysis of Ransomware Binaries", 2022.
📰
📚
PIM_YUPANA.pdf
542.5 KB
#Whitepaper
"Passive Inter-Modulation Sources and Cancellation Methods", 2022.

// Also, a review of PIM mitigation techniques is presented in the article

📰
📚
ICPS_Perspective.pdf
596.5 KB
#SCADA_Security
"Cybersecurity Challenges in the Offshore Oil and Gas Industry: An Industrial Cyber-Physical Systems (ICPS) Perspective", 2022.

📰
📚
Webhook_Security.pdf
95.7 KB
#Whitepaper
"Webhook Security Guidelines".

]-> Simple webhook to block exploitation of CVE-2022-0811:
https://github.com/spiarh/webhook-cve-2022-0811

📰
📚
Relaying_RPC_DCOM.pdf
2.2 MB
"Relaying to Greatness:
Windows Privilege Escalation by abusing the RPC/DCOM protocols", 2022.
#privilege
📰
📚
Mobile_Threat_Report_2022.pdf
14.6 MB
#Analytics
"2022 Global Mobile Threat Report".

📰
📚