Stowaway — Multi-hop Proxy Tool for pentesters by ph4ntom
MacOS Dylib Injection through Mach-O Binary Manipulation by re4lity
GhostBuild – MSBuild launchers for various GhostPack/.NET projects by re4lity
Lateral Movement: PowerShell Remoting by re4lity
Tinyshell Under the Microscope by re4lity
DLL hijacking vulnerabilities in Nirsoft tools by re4lity
Tale of two hypervisor bugs – Escaping from FreeBSD bhyve by re4lity
CryptoHack – A fun platform for learning cryptography by re4lity
joincap: Merge multiple pcap files together, gracefully. by re4lity
Building a Basic C2 by re4lity
Attacking and Auditing Docker Containers and Kubernetes Clusters by re4lity
Assistant plugin for vulnerability research by re4lity
Terminal Escape Injection by re4lity
OSS-Fuzz data in Vulners by re4lity
How We Hacked an Android Game And Ranked First globally by re4lity
Exploiting POST-based XSSI by re4lity
xioc: Extract IOCs from text, including “escaped” ones. by re4lity
The Hitchhiker’s Guide to Shellcoding by re4lity
Everything You Need to Know About IDOR by re4lity
Uninitialized Memory Disclosures in Web Applications by re4lity
Is BGP safe yet? · Cloudflare by re4lity
pingfisher: A ping detection tool for linux by re4lity
Sqlserver, or the Miner in the Basement by re4lity
Abusing HTTP Path Normalization and Cache Poisoning to steal accounts by re4lity
JSON Web Token Validation Bypass in Auth0 Authentication API by re4lity
The Zaheck of Android Deep Links! by re4lity
Xiaomi Mi9 (Pwn2Own 2019) by re4lity
Critical CSRF to RCE bug chain in Prestashop v1.7.6.4 and below by re4lity
Exploiting (Almost) Every Antivirus Software by re4lity
iOS acquisition methods compared: logical, full file system and iCloud by re4lity
Grammar based fuzzing PDFs with Domato by re4lity
CVE-2020-0791 by re4lity
SMBGhost pre-auth RCE abusing Direct Memory Access structs by re4lity
A HTTP PoC Endpoint for cve-2020-5260 by re4lity
Android Kernel Exploitation by re4lity
GHSL-2020-038: Use after free in Chrome WebAudio by re4lity
Dissecting the Windows Defender Driver by re4lity
awesome-virtualization: Collection of resources about Virtualization by re4lity
SystemToken: Steal privileged token to obtain SYSTEM shell by re4lity
Handbook of information collection for penetration testing and src by re4lity
This challenge is Inon Shkedy’s 31 days API Security Tips. by re4lity
AIL framework – Analysis Information Leak framework by re4lity
A Defender’s Guide For Rootkit Detection: Episode 1 by re4lity
更多最新文章,请访问SecWiki