konik_polanowy
- 936wpisy
- 104komentarzy
https://lubimyczytac.pl/profil/127443/joker
#wykop
Zaloguj się aby komentować
Zostań Patronem Hejto i tylko dla Patronów
- Włączona możliwość zarabiania na swoich treściach
- Całkowity brak reklam na każdym urządzeniu
- Oznaczenie w postaci rogala , który świadczy o Twoim wsparciu
- Wcześniejszy dostęp, do wybranych funkcji na Hejto
Exploiting null-dereferences in the Linux kernel - https://googleprojectzero.blogspot.com/2023/01/exploiting-null-dereferences-in-linux.html
IPinside: Korea’s mandatory spyware - https://palant.info/2023/01/25/ipinside-koreas-mandatory-spyware/
Syzkaller Diving 01 - https://f0rm2l1n.github.io/2021-02-02-syzkaller-diving-01/
Analyzing Malicious OneNote Documents - https://blog.didierstevens.com/2023/01/22/analyzing-malicious-onenote-documents/
Reverse Engineering Yaesu FT-70D Firmware Encryption - https://landaire.net/reversing-yaesu-firmware-encryption/
#informatyka
Zaloguj się aby komentować
New version of Remcos RAT uses direct syscalls to evade detection - https://minerva-labs.com/blog/new-version-of-remcos-rat-uses-direct-syscalls-to-evade-detection/
No-Fix Local Privilege Escalation Using KrbRelay With Shadow Credentials - https://icyguider.github.io/2022/05/19/NoFix-LPE-Using-KrbRelay-With-Shadow-Credentials.html
Examples and guides for using the OpenAI API - https://github.com/openai/openai-cookbook
Scaling Up: How To Collect, Analyse, and Store Flows at Scale (100 Gbit+) - https://www.ntop.org/nprobe/scaling-up-how-to-collect-analyse-and-store-flows-at-scale-100-gbit/
Fourchain - Sandbox - https://org.anize.rs/HITCON-2022/pwn/fourchain-sandbox
#informatyka
Zaloguj się aby komentować
Restoring Dyld Memory Loading - https://blog.xpnsec.com/restoring-dyld-memory-loading/
KeyDecoder app - https://github.com/MaximeBeasse/KeyDecoder
[Linux Kernel Exploitation 0x0] Debugging the Kernel with QEMU - https://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x0-debugging.html
Hacking ICS Historians: The Pivot Point from IT to OT - https://claroty.com/team82/research/hacking-ics-historians-the-pivot-point-from-it-to-ot
The Memory Process File System - https://github.com/ufrisk/MemProcFS
#informatyka
@grappas jaki gość? to mój spam i już tłumaczyłem, co to jest
Zaloguj się aby komentować
To tak, jakbyście się nie pytali
#wykop #oswiadczenie
Zaloguj się aby komentować
Executable and Linkable Format 101 - Part 1 Sections and Segments - https://www.intezer.com/blog/research/executable-linkable-format-101-part1-sections-segments/
Web skimmer found on website of Liquor Control Board of Ontario - https://www.malwarebytes.com/blog/news/2023/01/web-skimmer-found-on-website-of-liquor-control-board-of-ontario
Detecting malicious artifacts using an ETW consumer in kernel mode - https://www.countercraftsec.com/blog/detecting-malicious-artifacts-using-an-etw-consumer-in-kernel-mode/
Introducing RPC Investigator - https://blog.trailofbits.com/2023/01/17/rpc-investigator-microsoft-windows-remote-procedure-call/
XML Security in Java - https://semgrep.dev/blog/2022/xml-security-in-java
#informatyka
Zaloguj się aby komentować
SonicWall SMA 500v and SMA 100 Series Firmware Heap Buffer Overflow - https://blog.exodusintel.com/2023/01/12/sonicwall-sma-500v-and-sma-100-series-firmware-heap-buffer-overflow/
Apple Has Begun Scanning Your Local Image Files Without Consent - https://sneak.berlin/20230115/macos-scans-your-local-files-now/
wInd3x, the iPod Bootrom exploit 10 years too late - https://q3k.org/wInd3x.html
Search WiFi geolocation data by BSSID and SSID on different public databases - https://github.com/GONZOsint/geowifi
Automating Malware Analysis Operations (MAOps) - https://blogs.jpcert.or.jp/en/2023/01/cloud_malware_analysis.html
#informatyka
Zaloguj się aby komentować
#wykop
to żydowski wymysł, polak loguje się hasłem Login123
Zaloguj się aby komentować
DirtyCred Remastered: how to turn an UAF into Privilege Escalation - https://exploiter.dev/blog/2022/CVE-2022-2602.html
Detecting and Fingerprinting Infostealer Malware-as-a-Service platforms - https://blog.bushidotoken.net/2022/11/detecting-and-fingerprinting.html
How to save $$$ by storing your Syslog and Defender for Endpoint - https://mortenknudsen.net/?p=575
Racing bugs in Windows kernel - https://dannyodler.hashnode.dev/racing-bugs-in-windows-kernel
Learning eBPF exploitation - https://stdnoerr.github.io/writeup/2022/08/21/eBPF-exploitation-(ft.-D-3CTF-d3bpf).html
#informatyka
@Rzezimioszek 5 linków dotyczących z cybersecurity
Zaloguj się aby komentować
#android #todo
ja uzywam clickupa do organizacji zycia, moze to kombajn do samych list, ale ma ficzer, ktorego nie znalazlem nigdzie indziej: task dependency, dzieki niemu zamiast prostej listy mozesz sobie zapisac ktory task trzeba zrobic przed ktorym
Zaloguj się aby komentować
iCDump: A Modern Objective-C Class Dump - https://www.romainthomas.fr/post/23-01-icdump/
DLL Sideloading not by DLLMain - https://www.redteam.cafe/red-team/dll-sideloading/dll-sideloading-not-by-dllmain
Detection Engineering Maturity Matrix - https://detectionengineering.io/
Malware-based attacks on ATMs – A summary - https://blog.nviso.eu/2023/01/10/malware-based-attacks-on-atms-a-summary/
Exception(al) Failure - Breaking the STM32F1 Read-Out Protection - https://blog.zapb.de/stm32f1-exceptional-failure/
#informatyka
Zaloguj się aby komentować
How to Continuously Detect Vulnerable Jenkins Plugins to Avoid a Software Supply Chain Attack - https://www.legitsecurity.com/blog/how-to-continuously-detect-vulnerable-jenkins-plugins-to-avoid-a-software-supply-chain-attack
Awesome IDA, Ghidra, x64DBG, GDB & OllyDBG plugins - https://github.com/fr0gger/awesome-ida-x64-olly-plugin/blob/master/README.md
Corrupting memory without memory corruption - https://github.blog/2022-07-27-corrupting-memory-without-memory-corruption/
Calling Rust from Python using PyO3 - https://saidvandeklundert.net/learn/2021-11-18-calling-rust-from-python-using-pyo3/
Introduction to Graph Machine Learning - https://huggingface.co/blog/intro-graphml
#informatyka
Zaloguj się aby komentować
Manipulating AES Traffic using a Chain of Proxies and Hardcoded Keys - https://blog.dixitaditya.com/manipulating-aes-traffic-using-a-chain-of-proxies-and-hardcoded-keys
I scanned every package on PyPi and found 57 live AWS keys - https://tomforb.es/i-scanned-every-package-on-pypi-and-found-57-live-aws-keys/
Turning Google smart speakers into wiretaps for $100k - https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html
A tool for OSINT based threat hunting - https://github.com/ninoseki/mihari
Exploit Party: Bring Your Own Vulnerable Driver Attacks - https://fourcore.io/blogs/bring-your-own-vulnerable-driver-attack
#informatyka
Zaloguj się aby komentować
DualShock4 Reverse Engineering - Part 1 - https://blog.the.al/2023/01/01/ds4-reverse-engineering.html
gpu poisoning; hide the payload inside the gpu memory - https://gitlab.com/ORCA000/gp
Survey of security mitigations and architectures, December 2022 - https://saaramar.github.io/memory_safety_blogpost_2022/
The Mac Malware of 2022 - https://objective-see.org/blog/blog_0x71.html
N-Day RCE Exploit for ZDI-17-836 (CVE-2017-12561) - https://primalcerebral.com/blog/egregious-mage-nday-rce-exploit-zdi-17-836.php
#informatyka
Zaloguj się aby komentować