-CyberSecurityTechnologies-


Channel's geo and language: World, English
Category: Technologies


Welcome to -CyberSecurityTechnologies- Channel:
- BlueTeam (APT/OpSec/DFIR)
- OffSec (RedTeaming/TH/Pentesting)
- Reversing/Malware Analisys (TTPs)
- Web Security/DevSecOps
- AI Security/MLSecOps
- Tools/PoC/Research
Tags: t.me/CyberSecurityTechnologies/2

Related channels  |  Similar channels

Channel's geo and language
World, English
Statistics
Posts filter


BPSec.pdf
2.3Mb
#cryptography
#Space_Security
"Cryptography is Rocket: Science Analysis of BPSec (Bundle Protocol Security)", 2025.


#tools
#hardening
1. Win11Debloat - PowerShell script to remove pre-installed apps, disable telemetry, remove Bing from Windows search as well as perform various other changes (Win10/11)
2. HardenAD - Hardening Active Directory, ver. 2
3. Kernel-hardening-checker - tool for checking security hardening options of the Linux kernel


RMM.pdf
816.9Kb
#Whitepaper
#Malware_analysis
"The Dual-Edged Sword: RMM-Ransomware Conundrum and Enhancing Security Through Threat Hunting", 2025.


#Kernel_Security
1. Ksmbd vulnerability research
(CVE-2024-50283, CVE-2024-50285, CVE-2024-50286)
https://blog.doyensec.com/2025/01/07/ksmbd-1.html
2. Memory-related CVEs Exploited in kernelCTF (CVE-2023-3269, CVE-2024-50066)
https://u1f383.github.io/linux/2025/01/12/memory-related-cves-exploited-in-kernelctf.html


OWASP_Bench.pdf
1.5Mb
#tools
#WebApp_Security
"Security Testing Framework for Web Applications: Benchmarking ZAP V2.12.0 and V2.13.0 by OWASP as an example", 2025.


#Mobile_Security
#Offensive_security
Attacking Android Binder: Binder Internals
https://androidoffsec.withgoogle.com/posts/binder-internals
]-> libdevbinder library


SoK.pdf
291.2Kb
#Kernel_Security
#Threat_Research
"SoK: Understanding the Attack Surface in Device Driver Isolation Frameworks", 2024.




#Kernel_Security
0x01 - Killing Windows Kernel Mitigations
0x02 - Introduction to Windows Kernel UaFs
0x03 - Approaching the Modern Windows Kernel Heap
0x04 - Introduction to Windows Kernel Write What Where Vulnerabilities
0x05 - Introduction to Windows Kernel Type Confusion Vulnerabilities


rubygems_secreview.pdf
1.5Mb
#Analytics
Auditing the Ruby ecosystem’s central package repository, Dec. 2024.
]-> https://blog.trailofbits.com/2024/12/11/auditing-the-ruby-ecosystems-central-package-repository


#tools
#Malware_analysis
1. Malware Analysis Toolkit for static and dynamic analysis Windows PE files
2. kramer_decryptor - Decrypt/deobfuscate compiled python scripts which have been encrypted/obfuscated by Kramer
3. Qu1cksc0pe - All-in-One malware analysis tool




#exploit
1. CVE-2024-49114:
Windows Cloud Files Mini Filter Driver EoP
https://packetstorm.news/files/id/183324

2. Exploiting SSTI in a Spring Boot 3.3.4
https://modzero.com/en/blog/spring_boot_ssti

3. CVE-2024-54498:
Escape macOS Sandbox using sharedfilelistd exploit
https://github.com/wh1te4ever/CVE-2024-54498-PoC


M_Esp.pdf
9.1Mb
#Research
#Sec_code_review
"Bringing Order Amidst Chaos: On the Role of Artificial Intelligence in Secure Software Engineering", 2024.
]-> https://github.com/jonidacarka/ACUME


#tools
#DFIR
#Blue_Team_Techniques
1. ACEshark - Extract and analyze Windows service configurations and Access Control Entries
2. RequestShield - Analyze HTTP access.logs to identify potential security threats
3. WhacAMole - Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and environment variables


WorstFit.pdf
7.4Mb
#Threat_Research
#Red_Team_Tactics
"WorstFit: Unveiling Hidden Transformers in Windows ANSI", 2024.
]-> https://blog.orange.tw/posts/2025-01-worstfit-unveiling-hidden-transformers-in-windows-ansi


#tools
#Offensive_security
1. vermilion - Linux post exploitation tool
2. s1c0n - web server recon tool
3. Bypass-Four03 - tool to bypass HTTP 403 forbidden errors through various path and header manipulation techniques


FSF_Taxonomy.pdf
1.3Mb
#Research
#Infosec_Standards
"A Taxonomy of Functional Security Features and How They Can Be Located", 2025.


LLM_Phish.pdf
935.1Kb
#CogSec
"Evaluating Large Language Models’ Capability to Launch Fully Automated Spear Phishing Campaigns: Validated on Human Subjects", 2024.



20 last posts shown.