The_Price_Of_Compatibility.pdf
7.4 MB
Black Hat Asia 2021:
"The Price of Compatibility:
Defeating macOS Kernel Using Extended File Attributes".
t.iss.one/Library_Sec
"The Price of Compatibility:
Defeating macOS Kernel Using Extended File Attributes".
t.iss.one/Library_Sec
Blackswan_Technical_Writeup.pdf
33.7 MB
#Analytics #writeup #Microsaft #Vulnerability
Microsoft 0-day Vulnerabilities, 2021.
t.iss.one/Library_Sec
Microsoft 0-day Vulnerabilities, 2021.
t.iss.one/Library_Sec
Ghidra2cpg.pdf
7.8 MB
#Research
"Ghidra2CPG: From Graph Queries to Vulnerabilities in Binary Code", 2021.
"Ghidra2CPG: From Graph Queries to Vulnerabilities in Binary Code", 2021.
DNS_over_HTTPS_identification.pdf
1.1 MB
#Threat_Research
"Privacy of DNS-over-HTTPS:
Requiem for a Dream?", 2021.
]-> https://github.com/cslev/doh_ml
"Privacy of DNS-over-HTTPS:
Requiem for a Dream?", 2021.
]-> https://github.com/cslev/doh_ml
log4j-recognizer-main @Library_Sec.zip
11.9 KB
#Log4j
Log4j Recognizer
This utility looks for log4j in the currently running JVM. It is useful for systems that allow plugins to introduce their own jars. Therefore, you can find if someone is using log4j with a dangerous version.
t.iss.one/Library_Sec
Log4j Recognizer
This utility looks for log4j in the currently running JVM. It is useful for systems that allow plugins to introduce their own jars. Therefore, you can find if someone is using log4j with a dangerous version.
t.iss.one/Library_Sec