Beaconfuzz.pdf
3.4 MB
#Offensive_security
"BeaconFuzz:
A Journey into Ethereum 2.0 Blockchain Fuzzing and Vulnerability Discovery",.
t.iss.one/Library_Sec
"BeaconFuzz:
A Journey into Ethereum 2.0 Blockchain Fuzzing and Vulnerability Discovery",.
t.iss.one/Library_Sec
Antivirus_Event_Analysis_CheatSheet_1.9.0.pdf
56.3 KB
#Infographics
#Malware_analysis
Antivirus Event Analysis Cheat Sheet, ver. 1.9.0.
]-> https://www.nextron-systems.com/2022/02/06/antivirus-event-analysis-cheat-sheet-v1-9-0
t.iss.one/Library_Sec
#Malware_analysis
Antivirus Event Analysis Cheat Sheet, ver. 1.9.0.
]-> https://www.nextron-systems.com/2022/02/06/antivirus-event-analysis-cheat-sheet-v1-9-0
t.iss.one/Library_Sec
Cloud_Sec_Tech_Architecture_V1.pdf
2.5 MB
#Cloud_Security
"Cloud Security Technical Reference Architecture", Ver. 1.0, 2021.
t.iss.one/Library_Sec
"Cloud Security Technical Reference Architecture", Ver. 1.0, 2021.
t.iss.one/Library_Sec
Android_Permissions_Demystified.pdf
2.2 MB
#Research #privilege
"Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings", 2021.
]-> A black-box fuzzer to detect custom permission related privilege escalation vulnerabilities in Android:
https://github.com/little-leiry/CuPerFuzzer
t.iss.one/Library_Sec
"Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings", 2021.
]-> A black-box fuzzer to detect custom permission related privilege escalation vulnerabilities in Android:
https://github.com/little-leiry/CuPerFuzzer
t.iss.one/Library_Sec
JSAC22_kobayashi.pdf
2.9 MB
#tools
#Blue_Team_Techniques
"ma2tl: macOS Forensic Timeline Generator Using mac_apt Analysis Results", JSAC 2022.
t.iss.one/Library_Sec
#Blue_Team_Techniques
"ma2tl: macOS Forensic Timeline Generator Using mac_apt Analysis Results", JSAC 2022.
t.iss.one/Library_Sec
Машинное_обучение_алгоритмы_для_бизнеса_2019_Маркос_Лопез_де_Прадо.pdf
55.6 MB
Машинное обучение: алгоритмы для бизнеса
де Прадо Маркос Лопез (2019)
Машинное обучение меняет практически каждый аспект нашей жизни, алгоритмы МО выполняют задачи, которые до недавнего времени доверяли только проверенным экспертам. В ближайшем будущем машинное обучение будет доминировать в финансах, гадание на кофейной гуще уйдет в прошлое, а инвестиции перестанут быть синонимом азартных игр.
t.iss.one/Library_Sec
де Прадо Маркос Лопез (2019)
Машинное обучение меняет практически каждый аспект нашей жизни, алгоритмы МО выполняют задачи, которые до недавнего времени доверяли только проверенным экспертам. В ближайшем будущем машинное обучение будет доминировать в финансах, гадание на кофейной гуще уйдет в прошлое, а инвестиции перестанут быть синонимом азартных игр.
t.iss.one/Library_Sec
npm_threat_report.pdf
11 MB
#Analytics
"NPM THREAT REPORT:
Popular Javascript Package Registry Is a Playground For Malicious Actors...", 2022.
t.iss.one/Library_Sec
"NPM THREAT REPORT:
Popular Javascript Package Registry Is a Playground For Malicious Actors...", 2022.
t.iss.one/Library_Sec
M_21_31_Model.pdf
1.3 MB
#Blue_Team_Techniques
"Maturity Model for Event Log Management (M-21-31)", August 27, 2021.
t.iss.one/Library_Sec
"Maturity Model for Event Log Management (M-21-31)", August 27, 2021.
t.iss.one/Library_Sec
RESTful_APIs.pdf
333.2 KB
#Research
"JavaScript Instrumentation for Search-Based Software Testing: A Study with RESTful APIs", 2021.
]-> The first open-source AI-driven tool for automatically generating system-level test cases for web/enterprise applications:
https://github.com/EMResearch/EvoMaster
t.iss.one/Library_Sec
"JavaScript Instrumentation for Search-Based Software Testing: A Study with RESTful APIs", 2021.
]-> The first open-source AI-driven tool for automatically generating system-level test cases for web/enterprise applications:
https://github.com/EMResearch/EvoMaster
t.iss.one/Library_Sec
Win10_Hardening_Guide.pdf
505.8 KB
#hardening
"Configuration Recommendations for Hardening of Windows 10 Using Built-in Functionalities", 2021.
]-> https://www.bsi.bund.de/EN/Topics/Cyber-Security/Recommendations/SiSyPHuS_Win10/AP11/SiSyPHuS_AP11_node.html
t.iss.one/Library_Sec
"Configuration Recommendations for Hardening of Windows 10 Using Built-in Functionalities", 2021.
]-> https://www.bsi.bund.de/EN/Topics/Cyber-Security/Recommendations/SiSyPHuS_Win10/AP11/SiSyPHuS_AP11_node.html
t.iss.one/Library_Sec
to_click_not_to_click.pdf
2.3 MB
#Analytics
"To click or not to click", 2021.
// What we Learned from Phishing 80K People...
t.iss.one/Library_Sec
"To click or not to click", 2021.
// What we Learned from Phishing 80K People...
t.iss.one/Library_Sec
upnproxy_nat_injections.pdf
3.7 MB
#Whitepaper
#Threat_Research
"UPnProxy:
Blackhat Proxies via NAT Injections", 2022.
]-> https://www.akamai.com/blog/security/upnproxy-eternal-silence
t.iss.one/Library_Sec
#Threat_Research
"UPnProxy:
Blackhat Proxies via NAT Injections", 2022.
]-> https://www.akamai.com/blog/security/upnproxy-eternal-silence
t.iss.one/Library_Sec
DrawnApart.pdf
630 KB
#Research
"DRAWNAPART:
A Device Identification Technique based on Remote GPU Fingerprinting", NDSS, 2022.
t.iss.one/Library_Sec
"DRAWNAPART:
A Device Identification Technique based on Remote GPU Fingerprinting", NDSS, 2022.
t.iss.one/Library_Sec