WebAssembly.pdf
132.7 KB
"The Security Risk of Lacking Compiler Protection in WebAssembly", 2021.
#Research
t.iss.one/Library_Sec
#Research
t.iss.one/Library_Sec
ethical-hacking-mobile-devices-platforms-@library_sec.zip
323.4 MB
ethical hacking mobile devices platforms
password :
password :
Network_Flow_Logging.pdf
3.3 MB
"Ebb and Flow: Network Flow Logging as a Staple of Public Cloud Visibility or a Waning Imperative?", 2021.
#Whitepaper
#network
t.iss.one/Library_Sec
#Whitepaper
#network
t.iss.one/Library_Sec
trojan source code .pdf
3.5 MB
Trojan Source Code
"Trojan Source: Invisible Vulnerabilities", 2021.
]-> PoC:
https://github.com/nickboucher/trojan-source
]-> https://trojansource.codes
A new type of attack in which source code is maliciously encoded so that it appears different to a compiler and to the human eye. This attack exploits subtleties in text-encoding standards (Unicode) to produce source code whose tokens are logically encoded in a different order from the one in which they are displayed, leading to vulnerabilities that cannot be perceived directly by human code reviewers...
#trojan
t.iss.one/Library_Sec
"Trojan Source: Invisible Vulnerabilities", 2021.
]-> PoC:
https://github.com/nickboucher/trojan-source
]-> https://trojansource.codes
A new type of attack in which source code is maliciously encoded so that it appears different to a compiler and to the human eye. This attack exploits subtleties in text-encoding standards (Unicode) to produce source code whose tokens are logically encoded in a different order from the one in which they are displayed, leading to vulnerabilities that cannot be perceived directly by human code reviewers...
#trojan
t.iss.one/Library_Sec