Alaid TechThread
677 subscribers
6 photos
1 video
83 files
1.31K links
Vulnerability discovery, threat intelligence, reverse engineering, AppSec
Download Telegram
First UEFI rootkit found in the wild, courtesy
of the Sednit group #APT28
https://www.welivesecurity.com/wp-content/uploads/2018/09/ESET-LoJax.pdf
The Doodle Master seeks to turn your UI mockups into real code. Currently this repository just serves to demonstrate a Proof Of Concept of Artificially Intelligent Design Tools.

https://github.com/karanchahal/DoodleMaster
poc2018.zip
64.9 MB
Презентации корейской конференции POC 2018
Denis Kolegov, Oleg Broslavsky, "WebGoat.SDWAN.Net in Depth"

En He, Jiashui Wang "Hacking Android VoIP for Fun and Profit!"

Gmliu, "Windows Kernel Fuzzing"

Jaanus Kääp, "Document parsers "research" as passive income"

Jiafeng Li, Zuotong Feng, "How to Exploit Blockchain Public Chain and Smart Contract Vulnerability"

Jin Liu & Chong Xu, "Pwning Microsoft Edge Browser: From Memory Safety Vulnerability to Remote Code Execution"

Kang Li, "Practical evading attacks on commercial AI image recognition services"

Lidong LI & Naijie XU, "802.11 Smart Fuzzing"

Ned Williamson, "Exploiting Chrome IPC"

Nikita Tarakanov, "Automating Windows Kernel Pool Overflow/Corruption Exploits Development"

Samuel Groß, "IPC MitM: Exploiting a Fun Logic Bug for Kernel-Mode Code Execution on MacOS"

Tielei Wang, Hao Xu, "IOService Becomes a Grandpa"

Yannay Livneh, "Baby I can drive your car: remotely hacking Telematics CAN-connected devices"

Yunhai Zhang, "Diving into Windows Defender Application Guard"
1711.09666.pdf
114.9 KB
DeepAPT: Nation-State APT Attribution Using End-to-End Deep Neural Networks
ebook-web.pdf
3.4 MB
Интересная подборка по теме Threat Hunting
Forwarded from Br0wSec (Andrey Kovalev)
Моя презентация c ZeroNights 2018 про то, как начать ломать браузеры, а также о том, какие баги в них сейчас ищут, доступна online: https://goo.gl/LhiYdP.