Reference Library
26.5K subscribers
1K photos
122 videos
343K files
10.3K links
کتابخانه مرجع
مرجع تخصصی کتاب

لینک چنل آرشیو کتب:
@BOOKzMA
Download Telegram
TLP_KISA_TTPs_1.pdf
2.9 MB
#Whitepaper
"Controlling local network through vulnerable websites".

t.iss.one/Library_Sec
detecting_l7_ddos_using_tls_fingerprinting.pdf
1.7 MB
#Research #DDOS
"Detecting Application Layer DDoS Attacks Using TLS Fingerprinting", 2021.


t.iss.one/Library_Sec
Exploiting_URL_Parsing.pdf
2 MB
#Whitepaper
"Exploiting URL Parsers.
The Good, Bad, and Inconsistent", 2021.

t.iss.one/Library_Sec
NeoDiff.pdf
1.6 MB
#Research
"Uncovering Smart Contract VM Bugs Via Differential Fuzzing", 2021.

]-> Repo:
https://github.com/fgsect/NeoDiff

t.iss.one/Library_Sec
windows_privileges.pdf
124.5 KB
#Privilege #Cheatsheet #windows

Windows Privileges.
A cheatsheet about Microsoft Windows Privileges.

t.iss.one/Library_Sec
Proof_of_Storage_Time.pdf
801.8 KB
"Proof of Storage-Time: Efficiently Checking Continuous Data Availability", 2020.
]-> Repo:
https://github.com/winderica/PoST_NDSS20

t.iss.one/Library_Sec
An_Empirical_Assessment_Endpoint_Security_Systems.pdf
8 MB
#Research
"An Empirical Assessment of Endpoint Security Systems Against Advanced Persistent Threats Attack Vectors", 2021.

t.iss.one/Library_Sec
woot16_slides_davidson @Library_Sec.pdf
12.5 MB
Controlling UAVs with Sensor
Input Spoofing ADacks

t.iss.one/Library_Sec
credential_stuffing_attacks @Library_Sec.pdf
633.9 KB
Business Guide for Credential Stuffing Attacks

t.iss.one/Library_Sec
credential_stuffing_attacks.pdf
633.9 KB
#Whitepaper
"Business Guide for Credential Stuffing Attacks", 2022.

t.iss.one/Library_Sec
Sygnia_Elephant_Beetle.pdf
720 KB
#Threat_Research
"TG2003: Elephant Beetle
UNCOVERING AN ORGANIZED
FINANCIAL-THEFT OPERATION", 2022.

t.iss.one/Library_Sec