iCTF forensic (cool story about ddos)
https://ictf.cs.ucsb.edu/pages/the-2016-2017-ictf-ddos.html
https://ictf.cs.ucsb.edu/pages/the-2016-2017-ictf-ddos.html
Linux RCE via remote broadcom WiFi modem RCE https://googleprojectzero.blogspot.hk/2017/04/over-air-exploiting-broadcoms-wi-fi_11.html?m=1
projectzero.google
Over The Air: Exploiting Broadcom’s Wi-Fi Stack (Part 2) - Project Zero
Posted by Gal Beniamini, Project ZeroIn this blog post we'll continue our journey into gaining remote kernel code execution, by means of Wi-Fi communication ...
Intel Boot Guard (RU)
https://habrahabr.ru/company/dsec/blog/326556/
https://habrahabr.ru/company/dsec/blog/326556/
Habr
Доверенная загрузка Шрёдингера. Intel Boot Guard
Предлагаем вновь спуститься на низкий уровень и поговорить о безопасности прошивок x86-совместимых компьютерных платформ. В этот раз главным ингредиентом исследования является Intel Boot Guard (не...
Exception-oriented exploitation on iOS https://googleprojectzero.blogspot.hk/2017/04/exception-oriented-exploitation-on-ios.html?m=1
projectzero.google
Exception-oriented exploitation on iOS - Project Zero
Posted by Ian Beer, Project ZeroThis post covers the discovery and exploitation of CVE-2017-2370, a heap buffer overflow in the mach_voucher_extract_attr_rec...
#tools opensource, cross-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) and post-exploitation tool mainly written in python
https://github.com/n1nj4sec/pupy
https://github.com/n1nj4sec/pupy
GitHub
GitHub - n1nj4sec/pupy: Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework…
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C - n1nj4sec/pupy
#cve Command line search and download tool for Vulners Database inspired by searchsploit. It allows you to search online for the exploits across all the most popular collections: Exploit-DB, Metasploit, Packetstorm and others. The most powerful feature is immediate exploit source download right in your working path.
https://github.com/vulnersCom/getsploit
https://github.com/vulnersCom/getsploit
GitHub
GitHub - vulnersCom/getsploit: Command line utility for searching and downloading exploits
Command line utility for searching and downloading exploits - vulnersCom/getsploit
#tools Burp Suite scanner plugin based on Vulners.com vulnerability database API
https://github.com/vankyver/burp-vulners-scanner
https://github.com/vankyver/burp-vulners-scanner
GitHub
GitHub - vankyver/burp-vulners-scanner: Vulnerability scanner based on vulners.com search API
Vulnerability scanner based on vulners.com search API - vankyver/burp-vulners-scanner