How to run Windows 10 on ARM in Qemu with Hypervisor.framework patches on Apple Silicon Mac
https://gist.github.com/niw/e4313b9c14e968764a52375da41b4278#file-readme-md
https://gist.github.com/niw/e4313b9c14e968764a52375da41b4278#file-readme-md
Gist
How to run Windows 10 on ARM or Ubuntu for ARM64 in QEMU on Apple Silicon Mac
How to run Windows 10 on ARM or Ubuntu for ARM64 in QEMU on Apple Silicon Mac - README.en.md
Forwarded from r0 Crew (Channel)
Big Match: matching open source code in binaries for fun and profit https://rev.ng/blog/big-match/post.html #reverse #dukeBarman
Forwarded from r0 Crew (Channel)
PTM - Page Table Manipulation From Usermode https://back.engineering/01/12/2020/ #exploitation #windows
Private Group Of Back Engineers
PTM - Page Table Manipulation From Usermode
PTM is a Windows 10 C++ library that allows a programmer to manipulate all memory, physical, and virtual from user-mode. The project inherits an interface from VDM allowing the use of a physical memory read-write primitive to fuel this project. VDM is used…
Announcing the Atheris Python Fuzzer
https://opensource.googleblog.com/2020/12/announcing-atheris-python-fuzzer.html
https://opensource.googleblog.com/2020/12/announcing-atheris-python-fuzzer.html
Google Open Source Blog
Announcing the Atheris Python Fuzzer
Google has found thousands of security vulnerabilities and other bugs using Fuzzing. Now we are introducing the Atheris fuzzing engine.
"Important, Spoofing" - zero-click, wormable, cross-platform remote code execution in Microsoft Teams
https://github.com/oskarsve/ms-teams-rce/blob/main/README.md
https://github.com/oskarsve/ms-teams-rce/blob/main/README.md
GitHub
ms-teams-rce/README.md at main · oskarsve/ms-teams-rce
Contribute to oskarsve/ms-teams-rce development by creating an account on GitHub.
holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function.
https://github.com/megadose/holehe
https://github.com/megadose/holehe
GitHub
GitHub - megadose/holehe: holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve…
holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function. - megadose/holehe
4 Free easy wins that make Red Teams harder
https://www.trustedsec.com/blog/4-free-easy-wins-that-make-red-teams-harder/
https://www.trustedsec.com/blog/4-free-easy-wins-that-make-red-teams-harder/
TrustedSec
4 Free Easy Wins That Make Red Teams Harder - TrustedSec
TrustedSec's blog is an expert source of information on information security trends and best practices for strategic risk management.
CVE-2020-17049: Kerberos Bronze Bit Attack - Overview
https://blog.netspi.com/cve-2020-17049-kerberos-bronze-bit-overview/
https://blog.netspi.com/cve-2020-17049-kerberos-bronze-bit-overview/
NetSPI
CVE-2020-17049: Kerberos Bronze Bit Attack - Overview
Read a helpful overview of the Bronze Bit attack (CVE-2020-17049) against Kerberos implementations in Windows Active Directory.
CVE-2020-9967 - Apple macOS XNU 6LowPan Kernel RCE Write-up https://alexplaskett.github.io/CVE-2020-9967/
Amit Merchant - Software Engineer
CVE-2020-9967 - Apple macOS 6LowPAN Vulnerability
Inspired by Kevin Backhouse’s great work on finding XNU remote vulnerabilities I decided to spend some time looking at CodeQL and performing some variant analysis. This lead to the discovery of a local root to kernel (although documented by Apple as remote)…
Гиперотладка. Разбираем отладку Microsoft Hyper-V с самого начала
https://xakep.ru/2020/12/25/hyperv-hyperdebug/
https://xakep.ru/2020/12/25/hyperv-hyperdebug/
xakep.ru
Гиперотладка. Разбираем отладку Microsoft Hyper-V с самого начала
Гипервизор производства корпорации Microsoft содержит определенное количество ошибок. Поиск этих ошибок — занятие не только увлекательное, но и полезное: во-первых, Microsoft располагает собственной программой Bug Bounty, а во-вторых, знания о недокументированных…
Visualize the virtual address space of a Windows process on a Hilbert curve.
https://github.com/0vercl0k/clairvoyance
https://github.com/0vercl0k/clairvoyance
GitHub
GitHub - 0vercl0k/clairvoyance: Visualize the virtual address space of a Windows process on a Hilbert curve.
Visualize the virtual address space of a Windows process on a Hilbert curve. - 0vercl0k/clairvoyance
Forwarded from r0 Crew (Channel)
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation https://github.com/ant4g0nist/Vulnerable-Kext #exploitation #ios #macos #dukeBarman
GitHub
GitHub - ant4g0nist/Vulnerable-Kext: A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation - ant4g0nist/Vulnerable-Kext
[email protected]
12.3 MB
Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization