1_4943160972878545053.rar
1.3 MB
گام به گام یازدهم حسابداری اموال و انبار📚
✅کانال رسمی گام به گام فنی⚙
✅کانال رسمی گام به گام فنی⚙
@gambegam_darsi.pdf
17.1 MB
#گام_به_گام حسابداری حقوق و دستمزد
#یازدهم_حسابداری
از ابتدا تا انتهای کتاب
کانال رسمی گام به گام فنی🛠
🆔
#یازدهم_حسابداری
از ابتدا تا انتهای کتاب
کانال رسمی گام به گام فنی🛠
🆔
4_5987805746362845068.pdf
20.2 MB
گام به گام حقوق و دستمزد
یازدهم حسابداری
یازدهم حسابداری
4_5902214654540646231.pdf
17.1 MB
گام به گام حقوق و دستمزد
یازدهم حسابداری
یازدهم حسابداری
UbSym.pdf
978.5 KB
"A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes", 2022.
Memory corruption vulnerabilities are prevalent and detrimental software weaknesses, which potentially occur when programming with low-level languages (usually C and C++).
]-> Tool: https://github.com/SoftwareSecurityLab/UbSym
📚 t.iss.one/Library_Sec
Memory corruption vulnerabilities are prevalent and detrimental software weaknesses, which potentially occur when programming with low-level languages (usually C and C++).
]-> Tool: https://github.com/SoftwareSecurityLab/UbSym
📚 t.iss.one/Library_Sec
L2Fuzz.pdf
3.3 MB
#Fuzzing
"L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing", 2022.
Bluetooth is a wireless communication technology that allows users to exchange various data in a short range, including Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) and
Bluetooth Low Energy (BLE). Owing to their convenience, billions of devices have adopted Bluetooth technologies .
]-> A stateful fuzzer to detect vulnerabilities in Bluetooth BR/EDR LLC/L2CAP:
https://github.com/haramel/l2fuzz
📚
"L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing", 2022.
Bluetooth is a wireless communication technology that allows users to exchange various data in a short range, including Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) and
Bluetooth Low Energy (BLE). Owing to their convenience, billions of devices have adopted Bluetooth technologies .
]-> A stateful fuzzer to detect vulnerabilities in Bluetooth BR/EDR LLC/L2CAP:
https://github.com/haramel/l2fuzz
📚
LibDB.pdf
1 MB
#Sec_code_review
"LibDB: An Effective and Efficient Framework for Detecting Third-Party Libraries in Binaries", 2022.
Third-party libraries (TPLs) are important components of modern
software systems. They are reused frequently during software de velopment . Open-source repository platforms and package management systems are the major sources of third-party libraries.
However, security issues of the third-party code continue to arise.
Vulnerabilities in well-known third-party libraries, such as the
Heartbleed bug, could bring security threats to millions of devices. In addition, non-compliant reuse, which is a violation of legal software licenses, could lead to costly commercial disputes. Unfortunately, many developers do not pay sufficient attention to the code that is imported from third-party libraries.
]-> Datasets and source code:
https://github.com/DeepSoftwareAnalytics/LibDB
📚
"LibDB: An Effective and Efficient Framework for Detecting Third-Party Libraries in Binaries", 2022.
Third-party libraries (TPLs) are important components of modern
software systems. They are reused frequently during software de velopment . Open-source repository platforms and package management systems are the major sources of third-party libraries.
However, security issues of the third-party code continue to arise.
Vulnerabilities in well-known third-party libraries, such as the
Heartbleed bug, could bring security threats to millions of devices. In addition, non-compliant reuse, which is a violation of legal software licenses, could lead to costly commercial disputes. Unfortunately, many developers do not pay sufficient attention to the code that is imported from third-party libraries.
]-> Datasets and source code:
https://github.com/DeepSoftwareAnalytics/LibDB
📚
Exploits_GitHub.pdf
978 KB
"How security professionals are being attacked: A study of malicious CVE proof of concept exploits in GitHub", 2022.
CVE, which stands for Common Vulnerabilities and Exposures1, is a list of publicly disclosed security flaws in software or systems, which have been assigned individual CVE IDs.
]-> Tool: https://github.com/SoftwareSecurityLab/UbSym
📚
CVE, which stands for Common Vulnerabilities and Exposures1, is a list of publicly disclosed security flaws in software or systems, which have been assigned individual CVE IDs.
]-> Tool: https://github.com/SoftwareSecurityLab/UbSym
📚