Hack-tualité by G-echo - Security-Hacks - Mois 2019/05

Security-Hacks - Mois 2019/05

Wed, 15 May 2019 07:22:55 GMT
Note
Wed, 15 May 2019 07:22:55 GMT
vysecurity
This repository and it's contributors are in no way affiliated with MITRE, or the Official ATT&CK team. We are community contributors who have come …
Thu, 23 May 2019 08:34:07 GMT
ZombieLoad Attack
Thu, 23 May 2019 08:34:07 GMT
No. These are bugs in the processor. Software can work around these bugs, which costs performance. Future processors will have integrated fixes.<p>Can I …
Mon, 06 May 2019 05:22:39 GMT
Let’s nuke Megumin Trojan
Mon, 06 May 2019 05:22:39 GMT
When you are a big fan of the Konosuba franchise, you are a bit curious when you spot a malware called "Megumin Trojan" on some selling forums and …
Sun, 05 May 2019 19:29:06 GMT
How To Do Firmware Analysis. Tools, Tips, and Tricks
Sun, 05 May 2019 19:29:06 GMT
Dave Null
So, you’ve got a firmware dump. Perhaps a raw read off a chip? An update file you downloaded off the internet? Now what?<p>Taking a firmware dump and …
Tue, 21 May 2019 07:15:51 GMT
Pwn2Own 2019: Microsoft Edge Renderer Exploitation (CVE-2019-0940). Part 1
Tue, 21 May 2019 07:15:51 GMT
Exodus Intel VRT
This year Exodus Intelligence participated in the Pwn2Own competition in Vancouver. The chosen target was the Microsoft Edge browser and a full-chain …
Thu, 16 May 2019 16:31:32 GMT
Hacking macOS: How to Hide Payloads Inside Photo Metadata
Thu, 16 May 2019 16:31:32 GMT
tokyoneon
Complex shell scripts can be implanted into photo metadata and later used to exploit a MacBook. In addition to obfuscating the true nature of an …
Thu, 02 May 2019 06:19:45 GMT
pestudio
Thu, 02 May 2019 06:19:45 GMT
<b>pestudio</b> is used by Computer Emergency Response Teams (CERT) and Labs worldwide in order to perform Malware Initial Assessment.<p>Malicious software …
Sun, 05 May 2019 19:28:42 GMT
Unpacking Redaman Malware & Basics of Self-Injection Packers - ft. OALabs
Sun, 05 May 2019 19:28:42 GMT
LiveOverflow
<b>OALabs</b> is an excellent YouTube channel with videos on Reverse Engineering and Malware Analysis. Since I don't really cover Malware Analysis, I …
Tue, 07 May 2019 08:35:09 GMT
Firmware Reverse Engineering
Tue, 07 May 2019 08:35:09 GMT
If you need help using Tor you can contact WikiLeaks for assistance in setting it up using our simple webchat available at: https://wikileaks.org/talk<p>…
Wed, 01 May 2019 14:11:08 GMT
Flerken - Obfuscated Command Detection Tool
Wed, 01 May 2019 14:11:08 GMT
<b>Command line obfuscation</b> has been proved to be a non-negligible factor in fileless malware or malicious actors that are "living off the land". To …
Tue, 07 May 2019 10:35:04 GMT
Decryptor for MegaLocker and NamPoHyu Virus Ransomware Released
Tue, 07 May 2019 10:35:04 GMT
Lawrence Abrams
Emsisoft has released a decryptor for the MegaLocker and NamPoHyu Virus ransomware that has been targeting exposed Samba servers. Victims can now use …
Wed, 01 May 2019 09:41:46 GMT
Remote Code Execution on most Dell computers
Wed, 01 May 2019 09:41:46 GMT
Bill Demirkapi's Blog
What computer do you use? Who made it? Have you ever thought about what came with your computer? When we think of Remote Code Execution (RCE) …
Wed, 01 May 2019 13:59:20 GMT
Twint - An Advanced Twitter Scraping And OSINT Tool
Wed, 01 May 2019 13:59:20 GMT
Formerly known as Tweep, Twint is an advanced Twitter scraping tool written in Python that allows for scraping Tweets from Twitter profiles <b>without</b> …
Mon, 06 May 2019 05:18:00 GMT
Evil Clippy: a tool for making undetectable malicious Microsoft Office docs
Mon, 06 May 2019 05:18:00 GMT
Cory Doctorow
Evil Clippy comes from Dutch security researchers Outflank: "a tool which assists red teamers and security testers in creating malicious MS Office …