Blackswan_Technical_Writeup.pdf
33.7 MB
#Analytics #writeup #Microsaft #Vulnerability
Microsoft 0-day Vulnerabilities, 2021.
t.iss.one/Library_Sec
Microsoft 0-day Vulnerabilities, 2021.
t.iss.one/Library_Sec
Ghidra2cpg.pdf
7.8 MB
#Research
"Ghidra2CPG: From Graph Queries to Vulnerabilities in Binary Code", 2021.
"Ghidra2CPG: From Graph Queries to Vulnerabilities in Binary Code", 2021.
DNS_over_HTTPS_identification.pdf
1.1 MB
#Threat_Research
"Privacy of DNS-over-HTTPS:
Requiem for a Dream?", 2021.
]-> https://github.com/cslev/doh_ml
"Privacy of DNS-over-HTTPS:
Requiem for a Dream?", 2021.
]-> https://github.com/cslev/doh_ml
log4j-recognizer-main @Library_Sec.zip
11.9 KB
#Log4j
Log4j Recognizer
This utility looks for log4j in the currently running JVM. It is useful for systems that allow plugins to introduce their own jars. Therefore, you can find if someone is using log4j with a dangerous version.
t.iss.one/Library_Sec
Log4j Recognizer
This utility looks for log4j in the currently running JVM. It is useful for systems that allow plugins to introduce their own jars. Therefore, you can find if someone is using log4j with a dangerous version.
t.iss.one/Library_Sec
Symbolic_Liveness_Analysis.pdf
1 MB
#Research
"Symbolic Liveness Analysis of Real-World Software", 2018.
]-> Repo:
https://github.com/COMSYS/SymbolicLivenessAnalysis
"Symbolic Liveness Analysis of Real-World Software", 2018.
]-> Repo:
https://github.com/COMSYS/SymbolicLivenessAnalysis
Attacks_on_Wireless_Coexistence.pdf
1.2 MB
#Research
#WLAN_Security
#privilege
"Attacks on Wireless Coexistence:
Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation", 2021.
t.iss.one/Library_Sec
#WLAN_Security
#privilege
"Attacks on Wireless Coexistence:
Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation", 2021.
t.iss.one/Library_Sec