cookie

Ми використовуємо файли cookie для покращення вашого досвіду перегляду. Натиснувши «Прийняти все», ви погоджуєтеся на використання файлів cookie.

avatar

Society Elite

。.。:∞♡*♥ قناة تختص أمن المعلومات و السايبر سكيورتي و البرمجة وغيرها من مسارات تقنية المعلومات و الصور و الصوتيات و معلومات عامة / " التكنولوجيا " كتب مختلفة التصنيف " وغيرها من العلوم تابعة لـــ : Academy F6-Team

Більше
Рекламні дописи
649
Підписники
-124 години
-27 днів
-530 днів

Триває завантаження даних...

Приріст підписників

Триває завантаження даних...

Фото недоступнеДивитись в Telegram
موقع قياس سرعة الإنترنت من مجلة PC MAGAZINE باللغة العربية: https://pcm-intl.speedtestcustom.com/
Показати все...
00:34
Відео недоступнеДивитись в Telegram
كيفية زيادة سرعة النظام | 4 خطوات لتسريع الويندوز | اختصارات Windows الأساسية |
Показати все...
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region https://github.com/Offensive-Panda/RWX_MEMEORY_HUNT_AND_INJECTION_DV
Показати все...
GitHub - Offensive-Panda/RWX_MEMEORY_HUNT_AND_INJECTION_DV: Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.

Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region. - Offensive-Panda/RWX_MEMEORY_HUNT_AND_INJECTION_DV

Показати все...
Pwn2Own Toronto 2022 : A 9-year-old bug in MikroTik RouterOS | DEVCORE 戴夫寇爾

DEVCORE research team found a 9-year-old WAN bug on RouterOS, the product of MikroTik. Combined with another bug of the Canon printer, DEVCORE becomes the first team ever to successfully complete an attack chain in the brand new SOHO Smashup category of Pwn2Own. And DEVCORE also won the title of Master of Pwn in Pwn2Own Toronto 2022.

A Command-Line Tool for Microsoft Graph API Exploration https://github.com/dazzyddos/GraphShell
Показати все...
GitHub - dazzyddos/GraphShell

Contribute to dazzyddos/GraphShell development by creating an account on GitHub.

AMSI Bypass via VEH: A PowerShell AMSI Bypass technique via Vectored Exception Handler (VEH) https://github.com/vxCrypt0r/AMSI_VEH
Показати все...
GitHub - vxCrypt0r/AMSI_VEH: A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, function hooking or Import Address Table (IAT) modification.

A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, function hooking or Import Address Table (IAT) modification. ...

OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator" https://github.com/ic3qu33n/OffensiveCon24-uefi-task-of-the-translator
Показати все...
GitHub - ic3qu33n/OffensiveCon24-uefi-task-of-the-translator: OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"

OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator" - ic3qu33n/OffensiveCon24-uefi-task-of-the-translator

New ransomware group abusing BitLocker https://securelist.com/ransomware-abuses-bitlocker
Показати все...
New ransomware group abusing BitLocker

The Kaspersky GERT has detected a new group that has been abusing Microsoft Windows features by modifying the system to lower the defenses and using the local MS BitLocker utility to encrypt entire drives and demand a ransom.

Injecting code into PPL processes without vulnerable drivers https://github.com/Slowerzs/PPLSystem
Показати все...
GitHub - Slowerzs/PPLSystem

Contribute to Slowerzs/PPLSystem development by creating an account on GitHub.

CVE-2024-4956 Unauthenticated Path Traversal in Nexus Repository Manager 3 https://github.com/erickfernandox/CVE-2024-4956
Показати все...
GitHub - erickfernandox/CVE-2024-4956: Unauthenticated Path Traversal in Nexus Repository 3

Unauthenticated Path Traversal in Nexus Repository 3 - GitHub - erickfernandox/CVE-2024-4956: Unauthenticated Path Traversal in Nexus Repository 3