-CyberSecurityTechnologies-


Гео и язык канала: не указан, Английский
Категория: Технологии


Welcome to -CyberSecurityTechnologies- Channel:
- BlueTeam (APT/OpSec/DFIR)
- Offensive Security (RedTeaming/TH/PenTesting)
- Reverse Engineering/Malware Analisys (TTPs)
- Web Security/DevSecOps
- Tools/PoC/Research
Tags: t.me/CyberSecurityTechnologies/2

Связанные каналы  |  Похожие каналы

Гео и язык канала
не указан, Английский
Категория
Технологии
Статистика
Фильтр публикаций


#SCADA_Security
Unpacking the Blackjack Group's Fuxnet Malware
https://claroty.com/team82/research/unpacking-the-blackjack-groups-fuxnet-malware


EvilTwin.pdf
774.3Кб
#WLAN_Security
"A Robust Certificate Management System to Prevent Evil Twin Attacks in IEEE 802.11 Networks", 2023.


#Threat_Research
The Windows Registry Adventure
Part 1 - Introduction and research results:
https://googleprojectzero.blogspot.com/2024/04/the-windows-registry-adventure-1.html
Part 2 - A brief history of the feature:
https://googleprojectzero.blogspot.com/2024/04/the-windows-registry-adventure-2.html


#exploit
1. CVE-2024-31869:
Apache Airflow: Sensitive configuration for providers displayed when "non-sensitive-only" config used
https://seclists.org/oss-sec/2024/q2/138

2. CVE-2024-20697:
Windows Libarchive RCE
https://www.zerodayinitiative.com/blog/2024/4/17/cve-2024-20697-windows-libarchive-remote-code-execution-vulnerability


#Mobile_Security
Breaking Custom Encryption Using Frida (Mobile Application Pentesting)
https://labs.cognisys.group/posts/Breaking-Custom-Ecryption-Using-Frida-Mobile-Application-pentesting


Kubernetes_Security_Observability.pdf
11.5Мб
#Tech_book
#Cloud_Security
"Kubernetes Security and Observability", 2022.




LLM_0day.pdf
578.6Кб
#MLSecOps
"LLM Agents can Autonomously Exploit One-day Vulnerabilities", 2024.




#exploit
1. CVE-2024-2448:
Authenticated Command Injection In Progress Kemp LoadMaster
https://rhinosecuritylabs.com/research/cve-2024-2448-kemp-loadmaster

2. Linux LPE via GSMIOC_SETCONF_DLCI
https://seclists.org/oss-sec/2024/q2/129


#tools
#Offensive_security
1. Catcher - key system fingerprint vulnerability verification tool
https://github.com/wudijun/Catcher
2. NoArgs - tool designed to dynamically spoof and conceal process arguments while staying undetected
https://github.com/oh-az/NoArgs




#Red_Team_Tactics
From a SSRF to the creation of gcp_enum
https://hakaisecurity.io/from-a-ssrf-to-the-creation-of-gcp_enum/research-blog


Win11_Secbook.pdf
8.8Мб
#Whitepaper
"Windows 11 Security Book:
Powerful security by design", 2023.


#tools
#Offensive_security
Elastic Universal Profiling Agent
https://github.com/elastic/otel-profiling-agent




#tools
#reversing
Toolkit for reversing, malware analysis, and cracking
https://github.com/indetectables-net/toolkit


RBF.pdf
1.3Мб
#Fuzzing
#WebApp_Security
"Sniping at web applications to discover input-handling vulnerabilities", 2024.
]-> https://github.com/NS-unina/Rule-Based-Fuzzer




Keycloak.pdf
7.8Мб
#Tech_book
"Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications", Second Edition, 2023.
]-> https://github.com/PacktPublishing/Keycloak-Identity-and-Access-Management-for-Modern-Applications/tree/master

Показано 20 последних публикаций.