Alaid TechThread
673 subscribers
6 photos
1 video
82 files
1.31K links
Vulnerability discovery, threat intelligence, reverse engineering, AppSec
Download Telegram
Forwarded from r0 Crew (Channel)
This post will explain the process of finding and exploiting a previously unknown vulnerability in a real-world piece of software to achieve code execution. The vulnerability was initially found in 2016 and the vendor was contacted however no response was ever received. Now several years later (March 2019 at time of writing), the vulnerability still exists in the latest version.

https://medium.com/@DanielC7/introduction-to-file-format-fuzzing-exploitation-922143ab2ab3

#re #fuzzing #expdev
Automatic Techniques to Systematically Discover New Heap Exploitation Primitives
https://arxiv.org/pdf/1903.00503.pdf
Hunting_Cyber_Threat_Actors_with.pdf
4.7 MB
Применение информации из #SSL #TLS сертификатов
#OSINT Email-Enum searches mainstream websites and tells you if an #email is registered! https://github.com/Frint0/email-enum