Reference Library
26.5K subscribers
1K photos
122 videos
343K files
10.3K links
کتابخانه مرجع
مرجع تخصصی کتاب

لینک چنل آرشیو کتب:
@BOOKzMA
Download Telegram
Widevine.pdf
386 KB
#tools
#Offensive_security
"Exploring Widevine for Fun and Profit", 2022.

]-> Widevine Key Ladder Script (Python3):
https://github.com/Avalonswanderer/widevine_key_ladder
]-> A tool to trace Widevine execution in Android and dump buffers: https://github.com/Avalonswanderer/wideXtractor

Nowadays, people prefer media consumption on over-the￾top platforms (OTT), such as Netflix and Amazon Prime, that distribute multimedia content over the Internet, allowing users to play them whenever they wish. Such ease of viewing the same videos across devices creates challenges for content producers and owners.
SMS_Encr.pdf
1.9 MB
#tools
#cryptography
"SMS E2E Encryption and Tunneling for Smart Mobile Devices", 2022.

]-> E2E Encrypted SMS and SMS Tunneling app: https://github.com/mich01/SpiderSMS
Pulling_Psw_out_of_Configuration_Mng.pdf
8.5 MB
#tools
#Offensive_security
"Pulling Passwords out of Configuration Manager: Practical Attacks against Microsoft's Endpoint Management Software", 2022.

]-> PXEThief - set of tooling that can extract passwords from the OS Deployment functionality in MS Endpoint Conf. Manager:
https://github.com/MWR-CyberSec/PXEThief
📰
📚
Taking_Kerberos_Next_Level.pdf
5.2 MB
#tools
#Blue_Team
BlackHat USA 2022:
"Taking Kerberos To The Next Level"

]-> Set of tools to analyze Windows sandboxes for exposed attack surface:
https://github.com/googleprojectzero/sandbox-attacksurface-analysis-tools
📰
📚
Blasting_Event_Driven_Cornucopia.pdf
4.7 MB
#tools
BlackHat USA 2022:
"Blasting Event-Driven Cornucopia: WMI-based User-Space Attacks Blind SIEMs and EDRs"

]-> MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x/EPT features:
https://github.com/IgorKorkin/MemoryRanger
📰
📚
Forensic Investigation Tools @Library_Sec.pdf
254.3 KB
#tools #Forensics
Forensic Investigation Tools for IT Security Expert

📰
📚
DevSecOpsTools.pdf
1009.1 KB
#tools
#Whitepaper
"DevSecOps Fundamentals Guidebook:
DevSecOps Tools & Activities", 2022.
t.iss.one/Library_Sec
JSAC22_kobayashi.pdf
2.9 MB
#tools
#Blue_Team_Techniques
"ma2tl: macOS Forensic Timeline Generator Using mac_apt Analysis Results", JSAC 2022.

t.iss.one/Library_Sec