https://www.meetup.com/OWASP-Russia/events/247958426/ любителям веба может быть интересно
Meetup
OWASP Russia Meetup #7
• What we'll doВ московском офисе Яндекса пройдёт очередной OWASP Russia Meetup — встреча российского отделения сообщества, на которой соберутся специалисты по информационной безопасности.OWASP (Open
"Атаки на человеческий мозг" https://spectrum.ieee.org/the-human-os/robotics/artificial-intelligence/hacking-the-brain-with-adversarial-images
From Assembly to Javascript and back: Turning Memory Errors into Code Execution
with Client-side Compilers https://github.com/rh0dev/slides/blob/master/OffensiveCon2018_From_Assembly_to_JavaScript_and_back.pdf
with Client-side Compilers https://github.com/rh0dev/slides/blob/master/OffensiveCon2018_From_Assembly_to_JavaScript_and_back.pdf
GitHub
rh0dev/slides
Contribute to rh0dev/slides development by creating an account on GitHub.
https://github.com/Viralmaniar/Passhunt - инструмент для проверки дефолтных паролей в сетевых устройствах
GitHub
GitHub - Viralmaniar/Passhunt: Passhunt is a simple tool for searching of default credentials for network devices, web applications…
Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords. - Viralmaniar/Passhunt
ядро Windows и разработка драйверов, описание с MSDN, собранное в удобный PDF
Forwarded from r0 Crew (Channel) (Bear0)
Working POC of Mikrotik exploit from Vault 7 CIA Leaks (updated) https://github.com/BigNerd95/Chimay-Red #dukeBarman
GitHub
GitHub - BigNerd95/Chimay-Red: Working POC of Mikrotik exploit from Vault 7 CIA Leaks
Working POC of Mikrotik exploit from Vault 7 CIA Leaks - BigNerd95/Chimay-Red
https://github.com/a0rtega/pafish - демонстрационный модуль проверки окружения песочниц
GitHub
GitHub - a0rtega/pafish: Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis…
Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do - a0rtega/pafish
Обзор прикладного использования Динамического Символьного Исполнения
https://www.miasm.re/blog/2017/10/05/playing_with_dynamic_symbolic_execution.html
https://www.miasm.re/blog/2017/10/05/playing_with_dynamic_symbolic_execution.html
miasm.re
Playing with Dynamic symbolic execution — Miasm's blog
Miasm: Python reverse engineering framework
10 техник внедрения в процессы:
https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process
https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process
Elastic Blog
Ten process injection techniques: A technical survey of common and trending process injection techniques
Process injection is a widespread defense evasion technique employed often within malware and fileless adversary tradecraft, and entails running custom code within the address space of another process...