Shaare your links...
3325 links
L!NKS Retour au blog Login RSS Feed ATOM Feed Tag cloud Picture wall Daily
Links per page: 20 50 100
◄Older
page 1 / 14
268 results for tags sécurité x
  • GitHub - n1nj4sec/pupy: Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
    voir aussi beRoot : https://github.com/AlessandroZ/BeRoot
    permalink -
    - https://github.com/n1nj4sec/pupy/
    sécurité
  • 0xsp | offensive cheatsheet
    permalink -
    - https://0xsp.com/offensive/offensive-cheatsheet
    sécurité
  • New Windows 10 vulnerability allows anyone to get admin privileges
    permalink -
    - https://www.bleepingcomputer.com/news/microsoft/new-windows-10-vulnerability-allows-anyone-to-get-admin-privileges/
    mimikatz sécurité windows10
  • I Learned - Modèle de sécurité Windows
    permalink -
    - https://ilearned.eu/secu_windows.html
    sécurité windows
  • How to add Kali Linux repositories to another Linux distribution - Ethical hacking and penetration testing
    permalink -
    - https://miloserdov.org/?p=3609
    linux sécurité
  • Mobile forensics: how to identify suspicious network traffic | Andrea Fortuna
    https://github.com/KasperskyLab/TinyCheck

    https://github.com/KasperskyLab/TinyCheck/wiki/TinyCheck-installation
    permalink -
    - https://www.andreafortuna.org/2020/12/14/mobile-forensics-how-to-identify-suspect-network-traffic/
    AP sécurité
  • mimiatz : dump in memory hashes
    permalink -
    - https://github.com/gentilkiwi/mimikatz
    sécurité windows
  • Bypassing AD account lockout for a compromised account
    permalink -
    - https://medium.com/@markmotig/bypassing-ad-account-lockout-for-a-compromised-account-5c908d663de8
    sécurité
  • Remote Code Execution on most Dell computers – Bill Demirkapi's Blog – The adventures of a 17 year old security researcher.
    permalink -
    - https://d4stiny.github.io/Remote-Code-Execution-on-most-Dell-computers/
    sécurité
  • Microsoft PowerPoint - Python's Sinister Side.pptx - summit-archive-1542133788.pdf
    Intervention de Mark Baggett au colloque ISSA d'Augusta sur la sécurité python
    permalink -
    - https://www.sans.org/cyber-security-summit/archives/file/summit-archive-1542133788.pdf
    python sécurité
  • krack Attack Allow to Break WPA2 WiFi Protocol in Any WiFi Modem
    Et donc Krack attack pour WPA2
    permalink -
    - https://gbhackers.com/krack-attack/
    sécurité wifi
  • DragonBlood - Flaw in WPA3 Protocol Let Hackers To Steal WiFi Password
    permalink -
    - https://gbhackers.com/dragonblood-vulnerability-wpa3/
    sécurité wifi
  • DolphinAttack: Inaudible Voice Commands - 50cf379143925a3926298f881d3c19ab-applicationpdf.pdf
    Comment donner des ordres à un téléphone avec des sons inaudbles (>20kHz): "ok google ..., siri,..., cortnana,..."
    Les possibilités sont vastes :
    (1) Visiting a malicious website.
    The device can open a malicious
    website, which can launch a drive-by-download attack or
    exploit a device with 0-day vulnerabilities.
    (2) Spying.
    An adversary can make the victim device initiate
    outgoing video/phone calls, therefore getting access to the
    image/sound of device surroundings.
    (3) Injecting fake information.
    An adversary may instruct the vic-
    tim device to send fake text messages and emails, to publish
    fake online posts, to add fake events to a calendar, etc.
    (4) Denial of service.
    An adversary may inject commands to turn
    on the airplane mode, disconnecting all wireless communi-
    cations.
    (5) Concealing attacks.
    The screen display and voice feedback
    may expose the attacks. The adversary may decrease the
    odds by dimming the screen and lowering the volume

    ;-)
    permalink -
    - https://endchan.xyz/.media/50cf379143925a3926298f881d3c19ab-applicationpdf.pdf
    smartphone sécurité
  • SANS Penetration Testing | SMB Relay Demystified and NTLMv2 Pwnage with Python | SANS Institute
    permalink -
    - https://pen-testing.sans.org/blog/2013/04/25/smb-relay-demystified-and-ntlmv2-pwnage-with-python
    samba sécurité
  • Buffer Overflow & gdb - Part 1 - 0x0ff.info - Liens en vrac de sebsauvage
    liste d'article sur gdf, elf, buffer overflows...
    permalink -
    - http://sebsauvage.net/links/?NUsbww
    hacking reverse sécurité
  • System Hardening Guide
    permalink -
    - https://n0where.net/system-hardening-guide/
    linux sécurité
  • Security Advisories for Firefox — Mozilla
    les correctifs de sécurité apportés aux différentes version de Firefox
    permalink -
    - https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox/#firefox41.0.2
    firefox sécurité
  • Cybereason-Labs-Analysis-Webmail-Sever-APT.pdf
    permalink -
    - http://go.cybereason.com/rs/996-YZT-709/images/Cybereason-Labs-Analysis-Webmail-Sever-APT.pdf
    owa sécurité
  • Un peu plus de sécurité sous Linux - Libwalk.so
    permalink -
    - https://www.libwalk.so/2015/02/15/more-security.html
    linux sécurité
  • Kali 2.0 est dispo ! - Korben
    permalink -
    - http://korben.info/kali-2-0-est-dispo.html
    kali sécurité
Links per page: 20 50 100
◄Older
page 1 / 14
Shaarli 0.0.41 beta - The personal, minimalist, super-fast, no-database delicious clone. By sebsauvage.net. Theme by idleman.fr.