Link on Github --> https://github.com/Nieuport/news-and-links/blob/gh-pages/docs/2024.10.22.md
Your NVMe Had Been Syz’ed: Fuzzing NVMe-oF/TCP Driver for Linux with Syzkaller - https://www.cyberark.com/resources/threat-research-blog/your-nvme-had-been-syzed-fuzzing-nvme-of-tcp-driver-for-linux-with-syzkaller
Hacking misconfigured Cloudflare R2 buckets: a complete guide - https://blog.intigriti.com/hacking-tools/hacking-misconfigured-cloudflare-r2-buckets-a-complete-guide
SAS CTF and the many ways to persist a kernel shellcode on Windows 7 - https://securelist.com/sas-ctf-windows-7-challenge-explained/114180/
Using Offensive .NET to Enumerate and Exploit Active Directory Environments - https://logan-goins.com/2024-10-11-Dotnet-AD/
SHELLSILO: Simplifying Syscall Assembly and Shellcode Creation - https://meterpreter.org/shellsilo-simplifying-syscall-assembly-and-shellcode-creation/s.com/2024-10-11-Dotnet-AD/
#informatyka
Your NVMe Had Been Syz’ed: Fuzzing NVMe-oF/TCP Driver for Linux with Syzkaller - https://www.cyberark.com/resources/threat-research-blog/your-nvme-had-been-syzed-fuzzing-nvme-of-tcp-driver-for-linux-with-syzkaller
Hacking misconfigured Cloudflare R2 buckets: a complete guide - https://blog.intigriti.com/hacking-tools/hacking-misconfigured-cloudflare-r2-buckets-a-complete-guide
SAS CTF and the many ways to persist a kernel shellcode on Windows 7 - https://securelist.com/sas-ctf-windows-7-challenge-explained/114180/
Using Offensive .NET to Enumerate and Exploit Active Directory Environments - https://logan-goins.com/2024-10-11-Dotnet-AD/
SHELLSILO: Simplifying Syscall Assembly and Shellcode Creation - https://meterpreter.org/shellsilo-simplifying-syscall-assembly-and-shellcode-creation/s.com/2024-10-11-Dotnet-AD/
#informatyka
Zaloguj się aby komentować