Alaid TechThread
@offensive_thread
675
subscribers
6
photos
1
video
82
files
1.31K
links
Vulnerability discovery, threat intelligence, reverse engineering, AppSec
Download Telegram
Join
Alaid TechThread
675 subscribers
Alaid TechThread
https://github.com/quoscient/octopus
GitHub
GitHub - FuzzingLabs/octopus: Security Analysis tool for WebAssembly module (wasm) and Blockchain Smart Contracts (BTC/ETH/NEO/EOS)
Security Analysis tool for WebAssembly module (wasm) and Blockchain Smart Contracts (BTC/ETH/NEO/EOS) - FuzzingLabs/octopus
Alaid TechThread
https://twitter.com/specterdev/status/1017866658407280640?s=21
Twitter
Specter
Took me a bit longer than I'd hoped - but the PS4 5.05 Kernel Exploit writeup has now been published :). If you have any suggestions for clarity or corrections, please add the issue to the GitHub repo or reply them to this tweet. https://t.co/LbX7mUPZJK
Alaid TechThread
https://labs.mwrinfosecurity.com/blog/experimenting-bypassing-memory-scanners-with-cobalt-strike-and-gargoyle/
Alaid TechThread
pyrebox_hitb_ams.pdf
3.6 MB
Alaid TechThread
Forwarded from
r0 Crew (Channel)
(
Bear0
)
Packer-Complexity Analysis in PANDA
https://webthesis.biblio.polito.it/7519/1/tesi.pdf
#malware
#dukeBarman
Alaid TechThread
https://github.com/AlessandroZ/BeRoot/blob/master/Windows/README.md
GitHub
AlessandroZ/BeRoot
Privilege Escalation Project - Windows / Linux / Mac - AlessandroZ/BeRoot
Alaid TechThread
https://bugs.chromium.org/p/chromium/issues/detail?id=386988
Alaid TechThread
https://blog.ret2.io/2018/07/25/pwn2own-2018-safari-sandbox/
RET2 Systems Blog
Cracking the Walls of the Safari Sandbox
When exploiting real world software or devices, achieving arbitrary code execution on a system may only be the first step towards total compromise. For high ...
Alaid TechThread
https://github.com/McGill-DMaS/Kam1n0-Plugin-IDA-Pro
GitHub
McGill-DMaS/Kam1n0-Plugin-IDA-Pro
Kam1n0-Plugin-IDA-Pro - The Kam1n0 Assembly Analysis Platform
Alaid TechThread
https://vimeo.com/273963786
Vimeo
Sophia d'Antoine — asm2vec: Binary Learning for Vulnerability Discovery
This talk will present a novel application of a machine learning model and a corresponding tool, asm2vec, for vulnerability discovery. Treating both program disassembly…
Alaid TechThread
https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-banescu.pdf
Alaid TechThread
https://twitter.com/pythonarsenal/status/1027869357450375168?s=21
Twitter
PythonArsenal
Fuze - towards automating exploit generation for arbitrary types of kernel vulnerabilities. Based on Angr, capstone, pwntools, ropgadget, claripy, simuvex. https://t.co/lgjaA6TWDD
Alaid TechThread
https://github.com/trailofbits/manticore/blob/master/README.md
GitHub
manticore/README.md at master · trailofbits/manticore
Symbolic execution tool. Contribute to trailofbits/manticore development by creating an account on GitHub.
Alaid TechThread
https://github.com/xoreaxeaxeax/rosenbridge
GitHub
GitHub - xoreaxeaxeax/rosenbridge: Hardware backdoors in some x86 CPUs
Hardware backdoors in some x86 CPUs. Contribute to xoreaxeaxeax/rosenbridge development by creating an account on GitHub.
Alaid TechThread
https://twitter.com/j00ru/status/1029316938089078785?s=12
Twitter
j00ru//vx
Meet BrokenType – the font fuzzing toolset that helped me find 39 vulns in the Windows kernel and user-mode Uniscribe library in 2015-2017. It includes a font mutator, generator and loader. Now on GitHub: https://t.co/Z9aDlP7xvp
Alaid TechThread
https://twitter.com/benhawkes/status/1029412634007724032?s=12
Twitter
Ben Hawkes
Project Zero blog: "Windows Exploitation Tricks: Exploiting Arbitrary Object Directory Creation for Local Elevation of Privilege" by @tiraniddo - https://t.co/YxONKNlgc2
Alaid TechThread
https://twitter.com/pythonarsenal/status/1028899983444127745?s=12
Twitter
PythonArsenal
WindowsDefenderTools - scripts for reverse engineering of Windows Defender Antivirus' binary emulator. Based on IDAPython. https://t.co/kVW2WgHQEr
Alaid TechThread
https://twitter.com/thezdi/status/1029431405288275971?s=12
Twitter
Zero Day Initiative
A full analysis of the #Microsoft #Exchange code execution bug released today (CVE-2018-8302) is now available. Includes a video demo of the exploit in action. Read the details at https://t.co/evpdEBMP8G.
Alaid TechThread
https://www.fireeye.com/blog/threat-research/2018/08/announcing-the-fifth-annual-flare-on-challenge.html
FireEye
Announcing the Fifth Annual Flare-On Challenge
The FireEye Labs Advanced Reverse Engineering (FLARE) team’s annual reverse engineering challenge will start at 8:00 p.m. ET on Aug. 24, 2018.
Alaid TechThread
https://googleprojectzero.blogspot.com/2018/08/the-problems-and-promise-of-webassembly.html
Blogspot
The Problems and Promise of WebAssembly
Posted by Natalie Silvanovich, Project Zero WebAssembly is a format that allows code written in assembly-like instructions to be run from J...