Link on Github --> https://github.com/Nieuport/news-and-links/blob/gh-pages/docs/2023.01.16.md
DirtyCred Remastered: how to turn an UAF into Privilege Escalation - https://exploiter.dev/blog/2022/CVE-2022-2602.html
Detecting and Fingerprinting Infostealer Malware-as-a-Service platforms - https://blog.bushidotoken.net/2022/11/detecting-and-fingerprinting.html
How to save $$$ by storing your Syslog and Defender for Endpoint - https://mortenknudsen.net/?p=575
Racing bugs in Windows kernel - https://dannyodler.hashnode.dev/racing-bugs-in-windows-kernel
Learning eBPF exploitation - https://stdnoerr.github.io/writeup/2022/08/21/eBPF-exploitation-(ft.-D-3CTF-d3bpf).html
#informatyka
DirtyCred Remastered: how to turn an UAF into Privilege Escalation - https://exploiter.dev/blog/2022/CVE-2022-2602.html
Detecting and Fingerprinting Infostealer Malware-as-a-Service platforms - https://blog.bushidotoken.net/2022/11/detecting-and-fingerprinting.html
How to save $$$ by storing your Syslog and Defender for Endpoint - https://mortenknudsen.net/?p=575
Racing bugs in Windows kernel - https://dannyodler.hashnode.dev/racing-bugs-in-windows-kernel
Learning eBPF exploitation - https://stdnoerr.github.io/writeup/2022/08/21/eBPF-exploitation-(ft.-D-3CTF-d3bpf).html
#informatyka
Ale o co chodzi? jestem kompletnie nie wtajemniczony w temat
@Rzezimioszek 5 linków dotyczących z cybersecurity
Zaloguj się aby komentować