Link on Github --> https://github.com/Nieuport/news-and-links/blob/gh-pages/docs/2021.07.13.md
Exploitation Mitigations - https://github.com/nccgroup/exploit_mitigations
Not-quite-so-broken TLS : lessons in re-engineering a security protocol specification and implementation - usenix15.nqsb.io
Undocumented x86 Instructions to control the CPU at the microarchitecture level in modern Intel processors - https://raw.githubusercontent.com/chip-red-pill/udbgInstr/main/paper/undocumented_x86_insts_for_uarch_control.pdf
How SHA-256 Works Step-By-Step - https://qvault.io/cryptography/how-sha-2-works-step-by-step-sha-256/
Ransomwhere - https://ransomwhe.re/
Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory - https://www.darknet.org.uk/2021/07/aclpwn-py-exploit-acl-based-privilege-escalation-paths-in-active-directory/
Exploitation Mitigations - https://github.com/nccgroup/exploit_mitigations
Not-quite-so-broken TLS : lessons in re-engineering a security protocol specification and implementation - usenix15.nqsb.io
Undocumented x86 Instructions to control the CPU at the microarchitecture level in modern Intel processors - https://raw.githubusercontent.com/chip-red-pill/udbgInstr/main/paper/undocumented_x86_insts_for_uarch_control.pdf
How SHA-256 Works Step-By-Step - https://qvault.io/cryptography/how-sha-2-works-step-by-step-sha-256/
Ransomwhere - https://ransomwhe.re/
Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory - https://www.darknet.org.uk/2021/07/aclpwn-py-exploit-acl-based-privilege-escalation-paths-in-active-directory/
Zaloguj się aby komentować