konik_polanowy
Osobistość
Link on Github --> https://github.com/Nieuport/news-and-links/blob/gh-pages/docs/2025.03.03.md
A Missed Opportunity: Addressing Weak Password Hashing in VxWorks - https://sec-consult.com/blog/detail/a-missed-opportunity-addressing-weak-password-hashing-in-vxworks/
WMI Malware: The Complete Forensics Guide - https://www.cybertriage.com/blog/wmi-malware/
Reverse-engineering an encrypted IoT protocol - https://smlx.dev/posts/goodwe-sems-protocol-teardown/
Concealing Payloads: Hiding Shellcode in Image Files with Python and C/C++ - https://wafflesexploits.github.io/posts/Hide_a_Payload_in_Plain_Sight_Embedding_Shellcode_in_a_Image_file/
Advanced Initial Access Techniques - https://lorenzomeacci.com/advanced-initial-access-techniques
#informatyka
A Missed Opportunity: Addressing Weak Password Hashing in VxWorks - https://sec-consult.com/blog/detail/a-missed-opportunity-addressing-weak-password-hashing-in-vxworks/
WMI Malware: The Complete Forensics Guide - https://www.cybertriage.com/blog/wmi-malware/
Reverse-engineering an encrypted IoT protocol - https://smlx.dev/posts/goodwe-sems-protocol-teardown/
Concealing Payloads: Hiding Shellcode in Image Files with Python and C/C++ - https://wafflesexploits.github.io/posts/Hide_a_Payload_in_Plain_Sight_Embedding_Shellcode_in_a_Image_file/
Advanced Initial Access Techniques - https://lorenzomeacci.com/advanced-initial-access-techniques
#informatyka