Zdjęcie w tle
konik_polanowy

konik_polanowy

Osobistość
  • 937wpisy
  • 104komentarzy

https://lubimyczytac.pl/profil/127443/joker

Zaloguj się aby komentować

Link on Github --> https://github.com/Nieuport/news-and-links/blob/gh-pages/docs/2021.06.22.md
Inside a transistorized shift register box, built in 1965 for Apollo testing - https://www.righto.com/2021/06/inside-transistorized-shift-register.html
Bypassing Image Load Kernel Callbacks - https://www.mdsec.co.uk/2021/06/bypassing-image-load-kernel-callbacks/
Relaying Potatoes: Another Unexpected Privilege Escalation Vulnerability in Windows RPC Protocol - https://labs.sentinelone.com/relaying-potatoes-dce-rpc-ntlm-relay-eop/
All Resource Collection Projects - https://github.com/alphaSeclab/windows-security/blob/master/Readme_en.md
Collection of malware source code for a variety of platforms in an array of different programming languages - https://github.com/vxunderground/MalwareSourceCode

Zaloguj się aby komentować

Zostań Patronem Hejto i odblokuj dodatkowe korzyści tylko dla Patronów

  • Włączona możliwość zarabiania na swoich treściach
  • Całkowity brak reklam na każdym urządzeniu
  • Oznaczenie w postaci rogala , który świadczy o Twoim wsparciu
  • Wcześniejszy dostęp, do wybranych funkcji na Hejto
Zostań Patronem
Link on Github --> https://github.com/Nieuport/news-and-links/blob/gh-pages/docs/2021.06.05.md
Dumping K360 wireless keyboard firmware with a GreatFET https://jamchamb.net/2021/05/29/dumping-k360-firmware.html
Analysis report of the Facefish rootkit https://blog.netlab.360.com/ssh_stealer_facefish_en/
Hardware Hacking : Getting UART Shells https://hacklido.com/blog/67-hardware-hacking-getting-uart-shells
DEF CON 24 - Marc Newlin - MouseJack: Injecting Keystrokes into Wireless Mice https://www.youtube.com/watch?v=00A36VABIA4
GNU BRE/ERE cheatsheet and differences between grep, sed and awk https://learnbyexample.github.io/gnu-bre-ere-cheatsheet/
Use Facial Detection & Recognition on an ESP32 Wi-Fi Camera [Tutorial] https://www.youtube.com/watch?v=LOqVIe9cnW8
Mentalist is a graphical tool for custom wordlist generation https://github.com/sc0tfree/mentalist

Zaloguj się aby komentować

Link on Github --> https://github.com/Nieuport/news-and-links/blob/gh-pages/docs/2021.05.26.md
IRC Botnet Reverse Engineering Part 1 - Preparing Binary for Analysis in IDA PRO - https://www.youtube.com/watch?v=JPvcLLYR0tE
VMProtect 2 - Detailed Analysis of the Virtual Machine Architecture - https://back.engineering/17/05/2021/
The Solution of the Zodiac Killer’s 340-Character Cipher - https://blog.wolfram.com/2021/03/24/the-solution-of-the-zodiac-killers-340-character-cipher/
Beginner Reverse Engineering | Part 2: Compiling and Decompiling (Ghidra + IDA) - https://www.youtube.com/watch?v=Bv-7SszPuvI
Changing Service Mesh - https://nais.io/blog/posts/2021/05/changing-service-mesh.html
Dumping Stored Credentials with SeTrustedCredmanAccessPrivilege - https://www.tiraniddo.dev/2021/05/dumping-stored-credentials-with.html

Zaloguj się aby komentować

Link on Github --> https://github.com/Nieuport/news-and-links/blob/gh-pages/docs/2021.05.20.md
Remote Potato – From Domain User to Enterprise Admin - https://pentestlab.blog/2021/05/04/remote-potato-from-domain-user-to-enterprise-admin/
How I Got My Data Back from the Microsoft Band and Hello Sense - https://jeffhuang.com/extracting_data_from_tracking_devices/
Identify a Facebook user by his phone number despite privacy settings set - https://ysamm.com/?p=691
Counter-Strike Global Offsets: reliable remote code execution - https://secret.club/2021/05/13/source-engine-rce-join.html
Evil Logitech - erm I ment USB cable - https://luemmelsec.github.io/Building-An-Evil-USB-Cable/
ListingLover – Add pseudo-code to Ghidra disassembly - https://security.humanativaspa.it/listinglover-add-pseudocode-to-ghidra-disassembly/
Open source retro ISA video card - https://github.com/schlae/graphics-gremlin
A physical graffiti of LSASS: getting credentials from physical memory for fun and learning - https://adepts.of0x.cc/physical-graffiti-lsass/

Zaloguj się aby komentować