Filtres

Résultats :

Bug Bounty Hunting

Bug bounty hunting platform

https://www.bugbountyhunting.com/

#BugBounty

HackerOne

Bug bounty platform

https://hackerone.com/

#BugBounty

Resources for Beginner Bug Bounty Hunters

GitHub repository with resources for beginners

https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters

#BugBounty

Bugcrowd

Bug bounty platform

https://bugcrowd.com/programs

#BugBounty

BB-legal-FR

French bug bounty legal resources

https://github.com/noraj/BB-legal-FR

#BugBounty

Zapstiko

Bug bounty articles and resources

https://www.zapstiko.com/category/hacking-articles/bug-bounty-hacking-articles/

#BugBounty

Udemy Course

Advanced guide to finding good bugs

https://www.udemy.com/course/bug-bounty-an-advanced-guide-to-finding-good-bugs/

#BugBounty

Twitter Thread

Bug bounty tips and resources

https://twitter.com/therceman/status/1536774501211553793?t=ARu5YSqtCSOb5JNLypCqIA&s=19

#BugBounty

Huntr

Bug bounty platform

https://huntr.dev/

#BugBounty

Advance subdomain recon using subfinder , httpx , waybackurls

Bug bounty tutorial

https://www.youtube.com/watch?v=9mSLSC7aUcY

#Cloud

PowerShell Escape

PowerShell escape sequences

https://www.rlmueller.net/PowerShellEscape.htm

#BugBounty

BugBountyBooks

GitHub repository with bug bounty e-books

https://github.com/akr3ch/BugBountyBooks

#BugBounty

BugBountyScanner

GitHub repository with bug bounty scanner

https://github.com/chvancooten/BugBountyScanner

#BugBounty

Hide and Sec

Bug bounty cheat sheet

https://hideandsec.sh/books/cheatsheets-82c/page/bug-bounty

#BugBounty

Awesome Google VRP Writeups

GitHub repository with Google VRP write-ups

https://github.com/xdavidhu/awesome-google-vrp-writeups

#BugBounty

In Bug Hunters

Getting started in bug bounty

https://medium.com/inbughunters/getting-started-in-bug-bounty-7052da28445a

#BugBounty

The Bug Hunter's Methodology v4.0

Bug bounty tutorial

https://www.youtube.com/watch?v=p4JgIu1mceI

#BugBounty

TBHM

GitHub repository with bug bounty resources

https://github.com/jhaddix/tbhm

#BugBounty

InitigritiFetcher

GitHub repository with bug bounty fetcher

https://github.com/Gomez0015/InitigritiFetcher

#BugBounty

Galer

GitHub repository with bug bounty resources

https://github.com/dwisiswant0/galer

#BugBounty

Awesome Bugbounty Writeups

GitHub repository with bug bounty write-ups

https://github.com/devanshbatham/Awesome-Bugbounty-Writeups

#BugBounty

Zenrows

Bypassing Cloudflare

https://www.zenrows.com/blog/bypass-cloudflare

#BugBounty

PSBDMP

PSBDMP database

https://psbdmp.ws/

#BugBounty

Google Drive

Bug bounty resources

https://drive.google.com/file/d/1wMGITzEtpt_PgDug37NpmihORv4dcxeJ/view

#BugBounty

Bounty Targets Data

GitHub repository with bug bounty targets data

https://github.com/arkadiyt/bounty-targets-data

#BugBounty

Publically Disclosed Bug Bounty POCs by Hackers

Bug bounty tutorials and resources

https://m.youtube.com/@bugbountypocs/featured

#Cloud

Infosec Writeups

Bypassing Google's fix to access their internal admin panels

https://infosecwriteups.com/bypassing-googles-fix-to-access-their-internal-admin-panels-12acd3d821e3

#BugBounty

GitHub Gist

Bug bounty resources

https://gist.github.com/Frycos/62fa664bacd19a85235be19c6e4d7599

#BugBounty

Security Affairs

Facebook and Instagram bug

https://securityaffairs.com/141571/social-networks/facebook-instagram-bug.html?amp=1

#BugBounty

Public Bug Bounty Programs

GitHub repository with public bug bounty programs

https://github.com/projectdiscovery/public-bugbounty-programs

#BugBounty

Twitter Thread

Bug bounty tips and resources

https://twitter.com/hacker_/status/1512552850831851531

#BugBounty

Twitter Thread

Bug bounty tips and resources

https://twitter.com/albinowax/status/925743148600647680

#BugBounty

Twitter Thread

Bug bounty tips and resources

https://twitter.com/d0nutptr/status/1110501209528373248

#BugBounty

Google Dorks

Bug bounty Google dorks

https://taksec.github.io/google-dorks-bug-bounty/

#BugBounty

Nuclei Templates

Nuclei templates for bug bounty

https://templates.nuclei.sh/templates

#BugBounty

BugBounty

GitHub repository with bug bounty resources

https://github.com/00xtrace/BugBounty

#BugBounty

Mind Maps

GitHub repository with mind maps for bug bounty

https://github.com/imran-parray/Mind-Maps

#BugBounty

Yes We Hack

Getting started with smart contract bug bounty

https://blog.yeswehack.com/yeswerhackers/getting-started-smart-contract-bug-bounty/

#BugBounty

Hacky'Nov 0x02 | Introduction au Bug Bounty

Bug bounty tutorial

https://www.youtube.com/watch?v=mifj2NVGjKY

#Cloud

Bug Bounty Cheatsheet

GitHub repository with bug bounty cheat sheet

https://github.com/EdOverflow/bugbounty-cheatsheet

#BugBounty

Keyhacks

GitHub repository with keyhacks

https://github.com/streaak/keyhacks

#BugBounty

Jon Bottarini

Bug bounty articles and resources

https://www.jonbottarini.com/tag/bug-bounty/

#BugBounty

Netspi Blog

Automating Managed Identity Token Extraction in Azure Container Registries

https://www.netspi.com/blog/technical/cloud-penetration-testing/automating-managed-identity-token-extraction-in-azure-container-registries/

#Cloud

WEareTROOPERS

Infosec Exchange

https://infosec.exchange/@WEareTROOPERS

#Cloud

MSOLSpray

MSOLSpray GitHub Repository

https://github.com/dafthack/MSOLSpray

#Cloud

Privilege Escalation via Storage Accounts

Blog post by Rogier Dijkman

https://rogierdijkman.medium.com/privilege-escalation-via-storage-accounts-bca24373cc2e

#Cloud

Thunder CTF

Thunder CTF GitHub Repository

https://github.com/NicholasSpringer/thunder-ctf

#Cloud

Rhinosecuritylabs

Privilege Escalation Google Cloud Platform Part 1

https://rhinosecuritylabs.com/gcp/privilege-escalation-google-cloud-platform-part-1/

#Cloud

PrtToCert

PrtToCert GitHub Repository

https://github.com/morRubin/PrtToCert

#Cloud

Dirkjanm

Obtaining Domain Admin from Azure AD via Cloud Kerberos Trust

https://dirkjanm.io/obtaining-domain-admin-from-azure-ad-via-cloud-kerberos-trust/

#Cloud

Dirkjanm

Digging Further into the Primary Refresh Token

https://dirkjanm.io/digging-further-into-the-primary-refresh-token/

#Cloud

M365 Maps

M365 Maps Website

https://m365maps.com/

#Cloud

365-Stealer

365-Stealer GitHub Repository

https://github.com/AlteredSecurity/365-Stealer

#Cloud

DaemonSet in Kubernetes

YouTube Video

https://www.youtube.com/embed/yYeUic8B6fM

#Cloud

Msportals

Azure IT Admin Portals

https://msportals.io/#azure-it-admin-portals

#Cloud

Wikipedia

French Wikipedia

https://fr.wikipedia.org/

#Cloud

WeirdAAL

WeirdAAL GitHub Repository

https://github.com/carnal0wnage/weirdAAL

#Cloud

SANS Offensive Operations

YouTube Channel

https://www.youtube.com/channel/UCP28F4uf9s2V1_SQwnJST_A

#Cloud

Mike Felch and Beau Bullock

YouTube Video

https://www.youtube.com/watch?v=KTVHLolz6cE

#Cloud

SANS

SANS Workshop Building Azure Pentest Lab Red Teams

https://www.sans.org/webcasts/sans-workshop-building-azure-pentest-lab-red-teams/?msc=OOLP

#Cloud

Awesome Azure Pentest

Awesome Azure Pentest GitHub Repository

https://github.com/Kyuu-Ji/Awesome-Azure-Pentest

#Cloud

Rhinosecuritylabs

Privilege Escalation Google Cloud Platform Part 2

https://rhinosecuritylabs.com/cloud-security/privilege-escalation-google-cloud-platform-part-2/

#Cloud

Aws Consoler

Aws Consoler GitHub Repository

https://github.com/NetSPI/aws_consoler

#Cloud

NCC Group

Post-Exploiting a Compromised etcd: Full Control over the Cluster and its Nodes

https://research.nccgroup.com/2023/11/07/post-exploiting-a-compromised-etcd-full-control-over-the-cluster-and-its-nodes/

#Cloud

PushSecurity

Phishing Microsoft Teams for Initial Access

https://pushsecurity.com/blog/phishing-microsoft-teams-for-initial-access/

#Cloud

CloudVulnDB

CloudVulnDB Website

https://www.cloudvulndb.org/

#Cloud

ScoutSuite

ScoutSuite GitHub Repository

https://github.com/nccgroup/ScoutSuite

#Cloud

John Savill's Technical Training

YouTube Channel

https://www.youtube.com/@NTFAQGuy/videos

#Cloud

Netspi

Netspi Author Karl Fosaaen

https://www.netspi.com/author/karl-fosaaen/

#Cloud

MDSEC

Microsoft Office Online Server Remote Code Execution

https://www.mdsec.co.uk/2022/10/microsoft-office-online-server-remote-code-execution/

#Cloud

Google

Google Search Engine

https://google.com/

#Cloud

HackTheBox

AWS Pentesting Guide

https://www.hackthebox.com/blog/aws-pentesting-guide

#Cloud

Google Cloud Hacking Red Team Perspective!

YouTube Video

https://www.youtube.com/watch?v=SqfDFIQ8kkk

#Cloud

Azure Attack & Defense

YouTube Playlist

https://www.youtube.com/playlist?list=PL__YARLYIdeRDP-KsLIOqnzjc69MvmDde

#Cloud

GCPGoat

GCPGoat GitHub Repository

https://github.com/ine-labs/GCPGoat

#Cloud

Msportals

Msportals Website

https://msportals.io/

#Cloud

AWSGoat

AWSGoat GitHub Repository

https://github.com/ine-labs/AWSGoat

#Cloud

DEF CON 29 - Matthew Bryant - Hacking G Suite

YouTube Video

https://youtu.be/6AsVUS79gLw

#Cloud

MAAD-AF

MAAD-AF GitHub Repository

https://github.com/vectra-ai-research/MAAD-AF

#Cloud

JH Live

JH Live Halborn

https://jh.live/halborn

#Cloud

So You Think You Can Secure Your Cloud

YouTube Video

https://youtu.be/AwXswDg-rKc

#Cloud

CloudVulnDB

CloudVulnDB Website

https://www.cloudvulndb.org

#Cloud

Hausec

AzureHound Cypher Cheatsheet

https://hausec.com/2020/11/23/azurehound-cypher-cheatsheet/

#Cloud

John Hammond

YouTube Channel

https://www.youtube.com/channel/UCVeW9qkBjo3zosnqUbG7CFw

#Cloud

Synacktiv

Azure AD Introduction for Red Teamers

https://www.synacktiv.com/publications/azure-ad-introduction-for-red-teamers.html

#Cloud

ShadowClone

ShadowClone GitHub Repository

https://github.com/fyoorer/ShadowClone

#Cloud

Twitter

Twitter Profile

https://twitter.com/emiliensocchi

#Cloud

Srinath Challa

YouTube Channel

https://www.youtube.com/channel/UCpDWgD1lX0IJHeMd-GLyKOg

#Cloud

ClIam

ClIam GitHub Repository

https://github.com/securisec/cliam/tree/master

#Cloud

AWS

AWS CLI

https://aws.amazon.com/cli/

#Cloud

Azure App Tools

Azure App Tools GitHub Repository

https://github.com/rvrsh3ll/Azure-App-Tools

#Cloud

XPN Security

Azure AD Connect for Red Teamers

https://blog.xpnsec.com/azuread-connect-for-redteam/

#Cloud

Altered Security

365 Stealer Introduction

https://www.alteredsecurity.com/post/introduction-to-365-stealer

#Cloud

How to Build a Cloud Hacking Lab

YouTube Video

https://www.youtube.com/watch?v=4s_3oNwqImo

#Cloud

CloudSecurityPartners

Hack AWS in 60 Minutes GitHub Repository

https://github.com/CloudSecurityPartners/hack-aws-in-60-minutes

#Cloud

BsidesOrl Youtube

YouTube Channel

https://www.youtube.com/channel/UC6avYrvlXYAKHCBdxjj9L0w

#Cloud

NCC Group

NCC Group Research Author NCC Manning

https://research.nccgroup.com/author/nccmanning/

#Cloud

TrustedSec

Hacking Your Cloud Tokens Edition 2.0

https://www.trustedsec.com/blog/hacking-your-cloud-tokens-edition-2-0/

#Cloud

Azure Red Team

Azure Red Team GitHub Repository

https://github.com/rootsecdev/Azure-Red-Team

#Cloud

TROOPERS IT Security Conference

YouTube Channel

https://www.youtube.com/channel/UCPY5aUREHmbDO4PtR6AYLfQ

#Cloud

MFASweep

MFASweep GitHub Repository

https://github.com/dafthack/MFASweep

#Cloud

Sofblocks

Azure Attack Paths

https://sofblocks.github.io/azure-attack-paths/

#Cloud

Google Cloud 4 Words

Google Cloud 4 Words GitHub Repository

https://github.com/priyankavergadia/google-cloud-4-words

#Cloud

Twitter

Twitter Profile

https://twitter.com/_wald0

#Cloud

Checkov

Checkov GitHub Repository

https://github.com/bridgecrewio/checkov

#Cloud

BadOption

MobilePhish Blog Post

https://badoption.eu/blog/2024/01/08/mobilephish.html

#Cloud

NCC Group

Command and Kubectl Talk Follow-up

https://research.nccgroup.com/2020/02/12/command-and-kubectl-talk-follow-up/

#Cloud

Tracebit

Finding AWS Account ID of Any S3 Bucket

https://tracebit.com/blog/2024/02/finding-aws-account-id-of-any-s3-bucket/

#Cloud

Hacking The Cloud

Hacking The Cloud Website

https://hackingthe.cloud

#Cloud

Fireprox

Fireprox GitHub Repository

https://github.com/ustayready/fireprox

#Cloud

Black Hills InfoSec

GraphRunner

https://www.blackhillsinfosec.com/introducing-graphrunner/

#Cloud

Rhinosecuritylabs

Persistent AWS Access with Role Chain Juggling

https://rhinosecuritylabs.com/aws/cloud-container-attack-tool/

#Cloud

Carlospolop

BF My GCP Permissions GitHub Repository

https://github.com/carlospolop/bf_my_gcp_permissions

#Cloud

Synacktiv

Mindmaps GitHub Repository

https://github.com/synacktiv/Mindmaps

#Cloud

CMEPW

Azure Mindmap GitHub Repository

https://github.com/CMEPW/azure-mindmap

#Cloud

CloudSecWiki

CloudSecWiki Website

https://cloudsecwiki.com

#Cloud

Tripla

Certified Azure Red Team Professional CARTP Exam Review

https://tripla.dk/2021/12/29/certified-azure-red-team-professional-cartp-by-pentester-academy-exam-review/

#Cloud

Instagram

Nahamsec Instagram Profile

https://instagram.com/nahamsec

#Cloud

Twitch

Nahamsec Twitch Channel

https://twitch.tv/nahamsec

#Cloud

Red Team Operations

PRTAbuse from Userland with Cobalt Strike

https://red.0xbad53c.com/red-team-operations/azure-and-o365/prt-abuse-from-userland-with-cobalt-strike/

#Cloud

CloudRecon

CloudRecon GitHub Repository

https://github.com/g0ldencybersec/CloudRecon

#Cloud

Finding Secrets in Publicly Exposed Ebs Volumes

YouTube Video

https://www.youtube.com/watch?v=HXM1rBk_wXs

#Cloud

Cobalt.io

Azure AD Pentesting Fundamentals

https://www.cobalt.io/blog/azure-ad-pentesting-fundamentals

#Cloud

Find Privilege Escalation Paths in Microsoft Azure with AzureHound

YouTube Video

https://www.youtube.com/embed/m33VeLRUi4w

#Cloud

Packt Publishing

Penetration Testing Azure for Ethical Hackers GitHub Repository

https://github.com/PacktPublishing/Penetration-Testing-Azure-for-Ethical-Hackers

#Cloud

O365 Blog

O365 Blog Website

https://o365blog.com/

#Cloud

DigitalOcean

DigitalOcean Community Post

https://m.do.co/c/3236319b9d0b

#Cloud

Lutzenfried

OffensiveCloud GitHub Repository

https://github.com/lutzenfried/OffensiveCloud

#Cloud

Cody D Martin

GCP Cloud Function Abuse Blog Post

https://blog.codydmartin.com/gcp-cloud-function-abuse/

#Cloud

Dirkjanm

Abusing Azure AD SSO with the Primary Refresh Token

https://dirkjanm.io/abusing-azure-ad-sso-with-the-primary-refresh

#Cloud

Appetize.io - Online Emulator

Run native mobile apps in your browser using Appetize.io, an online emulator for Android and iOS.

https://appetize.io/

#Mobile

Incinerator - Boschko

Explore Boschko's Incinerator, a powerful tool for analyzing and reversing Android applications.

https://boschko.ca/incinerator/amp/

#Mobile

Twemoji - Thumbs Up

Thumbs Up emoji from the Twemoji project by Twitter.

https://cdn.jsdelivr.net/gh/twitter/twemoji@latest/assets/svg/1f44c.sv

#Mobile

Twemoji - Fire

Fire emoji from the Twemoji project by Twitter.

https://cdn.jsdelivr.net/gh/twitter/twemoji@latest/assets/svg/1f525.sv

#Mobile

Codeshare - Frida

Codeshare for Frida, a dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.

https://codeshare.frida.

#Mobile

Auditer la sécurité d'une application iOS avec Needle

Un guide pour auditer la sécurité des applications iOS en utilisant Needle.

https://connect.ed-diamond.com/MISC/misc-091/auditer-la-securite-d-une-application-ios-avec-needle

#Mobile

Un EDR sous Android

Article détaillant la mise en place d'un EDR (Endpoint Detection and Response) sous Android.

https://connect.ed-diamond.com/misc/misc-116/un-edr-sous-android

#Mobile

Discord Channel

Join the discussion on this specific Discord channel.

https://discord.com/channels/819985942407675945/819988038289588244/1032019602877714473

#Mobile

APKLab - APK Analyzer

APKLab is an integrated solution for Android applications reverse engineering.

https://github.com/APKLab/APKLab

#Mobile

Blabb - MarketStreetCyber

Blabb is a tool for security assessments and analysis by MarketStreetCyber.

https://github.com/MarketStreetCyber/Blabb

#Mobile

Blabber - MarketStreetCyber

Blabber is another security tool developed by MarketStreetCyber.

https://github.com/MarketStreetCyber/Blabber

#Mobile

Mobile Security Framework (MobSF)

An automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis, and security assessment framework.

https://github.com/MobSF/Mobile-Security-Framework-MobSF

#Mobile

Remote Buffer Overflow in Android 11

A detailed analysis of a remote buffer overflow vulnerability in the wifi_stack of Android 11 platform on Samsung A20e.

https://github.com/SpiralBL0CK/Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20e

#Mobile

Android Logs, Events, and Protobuf Parser (ALEAPP)

ALEAPP parses various logs, events, and Protobufs from Android devices.

https://github.com/abrignoni/ALEAPP

#Mobile

iLEAPP - iOS Logs, Events, and Protobuf Parser

iLEAPP is a tool to parse iOS logs, events, and Protobuf data.

https://github.com/abrignoni/iLEAPP

#Mobile

Apple Cloud Notes Parser

A parser for Apple Cloud Notes, extracting and presenting data from iCloud backups.

https://github.com/threeplanetssoftware/apple_cloud_notes_parser

#Mobile

PhoneSploit - Exploitation Framework

PhoneSploit is a framework that utilizes ADB to exploit Android devices.

https://github.com/aerosol-can/PhoneSploit

#Mobile

Frida Snippets

A collection of useful Frida scripts for reverse engineering and instrumentation.

https://github.com/iddoeldor/frida-snippets

#Mobile

Mobile Hacking Cheat Sheet

A comprehensive cheat sheet for mobile hacking and penetration testing.

https://github.com/randorisec/MobileHackingCheatSheet

#Mobile

FriList - Friends List Manager

FriList is a tool for managing friends lists on social media platforms.

https://github.com/rsenet/FriList

#Mobile

APKFram - APK Analysis Framework

APKFram is a framework for the analysis and reverse engineering of APK files.

https://github.com/rsenet/apkfram.git

#Mobile

Objection - Runtime Mobile Exploration

Objection is a runtime mobile exploration toolkit powered by Frida, designed for performing security assessments of mobile applications.

https://github.com/sensepost/objection

#Mobile

Apple BLEEE

Research on Apple's Bluetooth Low Energy Exposé (BLEEE) vulnerabilities.

https://hexway.io/research/apple-bleee/

#Mobile

Android Pentest Lab Guide

A step-by-step guide on building an Android penetration testing lab.

https://medium.com/purplebox/step-by-step-guide-to-building-an-android-pentest-lab-853b4af6945e

#Mobile

SSL Pinning Bypass Guide

The ultimate guide to bypassing SSL pinning, provided by RedHunt Labs.

https://redhuntlabs.com/wp-content/uploads/2021/10/Ultimate-Guide-to-SSL-Pinning-Bypass-RedHunt-Labs-Attack-Surface-Management.pdf

#Mobile

Extracting Android Backup Files

How to extract or unpack an .ab file (Android backup file) from your device.

https://stackoverflow.com/questions/18533567/how-to-extract-or-unpack-an-ab-file-android-backup-file

#Mobile

Aacle on Twitter

Follow Aacle on Twitter for updates and insights.

https://twitter.com/Aacle_

#Mobile

Aacle Twitter Status

Check out this specific tweet from Aacle on Twitter.

https://twitter.com/Aacle_/status/1584916071483858944?s=20&t=_NVI4Fohd_VrJfcOymSCKg

#Mobile

Intro to Mobile Pentesting

An introduction to mobile penetration testing by Hack The Box.

https://www.hackthebox.com/blog/intro-to-mobile-pentesting

#Mobile

Setting Up Mobexler

Guide on setting up Mobexler with VMware and Android Studio.

https://www.randorisec.fr/setting-up-mobexler-vmware-android-studio/

#Mobile

XDA Developers

XDA Developers is a community of developers and enthusiasts focused on Android development.

https://www.xda-developers.com/

#Mobile

Svetius on XDA Developers

Profile of Svetius, a contributor on XDA Developers.

https://www.xda-developers.com/author/svetius

#Mobile

YouTube Channel - Mobile Security

Subscribe to this YouTube channel for videos on mobile security.

https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQ

#Mobile

Intercepting Android App Traffic with BurpSuite

Watch this video on mobile security from YouTube.

https://www.youtube.com/watch?v=xp8ufidc514

#Mobile

Zero Day Hacker Author

Author page on Zero Day Hacker, featuring various articles on mobile security.

https://zerodayhacker.com/author/hjdbvet6z3k

#Mobile

Using an Android Emulator for API Hacking

Learn how to use an Android emulator for API hacking on Zero Day Hacker.

https://zerodayhacker.com/using-an-android-emulator-for-api-hacking/

#Mobile

Les bases du chiffrement RSA | Episode #1 [RSA Series] by express

Introduction to RSA cryptography by express.

https://www.youtube.com/watch?v=RyMmKoSSPN8

#Crypto

Express - YouTube

Express channel for cryptography tutorials and explanations.

https://www.youtube.com/channel/UCFMT8Cx0JO8BRkiZ8vzIa1A

#Crypto

Cryptographie : chiffrement RSA - YouTube

Tutorial on RSA encryption in French language.

https://www.youtube.com/watch?v=KfUrZG6Vo2Q

#Crypto

Tech AB Info - YouTube

Tech AB Info channel with various tech and crypto-related content.

https://www.youtube.com/channel/UCkzVomnoR_X9uE5box2Dw8g

#Crypto

An Introduction to the Arithmetic of Elliptic Curves - YouTube

Educational series on elliptic curves in cryptography.

https://www.youtube.com/playlist?list=PLYpVTXjEi1oe1OeAllJpNhFoI4B7Ws8Yl

#Crypto

Quantum - YouTube

Quantum channel featuring videos on quantum cryptography.

https://www.youtube.com/channel/UCgeO7CtfYSdWt0PPZ3vafqw

#Crypto

Post-quantum cryptography: Supersingular isogenies for beginners

Introduction to supersingular isogenies for post-quantum cryptography.

https://www.youtube.com/watch?v=9B7jq7Mgiwc

#Crypto

Microsoft Research - YouTube

Videos from Microsoft Research covering various aspects of cryptography.

https://www.youtube.com/channel/UCCb9_Kn8F_Opb3UCGm-lILQ

#Crypto

The Mathematics of Lattices I

Lecture on the mathematics of lattices in cryptography.

https://youtu.be/LlPXfy6bKIY

#Crypto

Simons Institute - YouTube

Videos from Simons Institute discussing advanced topics in cryptography.

https://www.youtube.com/channel/UCW1C2xOfXsIzPgjXyuhkw9g

#Crypto

Conférence @BlackRaven - Intro au RSA

Conference introducing RSA cryptography in French.

https://www.youtube.com/watch?v=FiZwf8GfSzo

#Crypto

Joue à la crypto ! (french)

Crypto challenges and tutorials in French language.

https://www.youtube.com/watch?v=iIesDpv9F4s

#Crypto

Ange Albertini - YouTube

Videos from Ange Albertini covering various crypto-related topics.

https://www.youtube.com/channel/UCwQvHQ2JdGomedDJFJ9r7DA

#Crypto

[MPSI/PCSI/MP2I] Continuité - 2 exos de khôlle corrigés

Mathematics exercises related to cryptography.

https://www.youtube.com/watch?v=IdchTH9bGOs

#Crypto

Téo VS la prépa

Videos on preparing for cryptography challenges and exams.

https://www.youtube.com/channel/UCn4MPWKkXuS2GlmLH9-Qaew

#Crypto

[TECH] Contrôler un ordi à distance : SSH & Diffie Hellman

Tech tutorial on SSH and Diffie-Hellman key exchange.

https://youtu.be/VXGt12Nioqc

#Crypto

Pour 1nf0 - la Cyber expliquée

Explanation of cybersecurity concepts in French.

https://www.youtube.com/channel/UCHScE3Ck5G6_Cp0BqPM7YTA

#Crypto

AES Explained (Advanced Encryption Standard) - Computerphile

Explanation of the AES encryption algorithm.

https://www.youtube.com/watch?v=O4xNJsjtN6E

#Crypto

Computerphile - YouTube

Computerphile channel with videos on computer science topics including cryptography.

https://www.youtube.com/channel/UC9-y-6csu5WGm29I7JiwpnA

#Crypto

How can you attack an ECB cipher? [Capture The Flag Fundamentals]

Explanation of attacking ECB mode encryption.

https://www.youtube.com/watch?v=unn09JYIjOI

#Crypto

247CTF - YouTube

247CTF channel featuring CTF challenges including cryptography.

https://www.youtube.com/channel/UCtGLeKomT06x3xZ2SZp2l9Q

#Crypto

All-Army CyberStakes! AES-ECB Plaintext Recovery

Demonstration of AES-ECB plaintext recovery in a cyber competition.

https://www.youtube.com/watch?v=f-iz_ZAS258

#Crypto

John Hammond - YouTube

John Hammond channel with tutorials on cybersecurity and cryptography.

https://www.youtube.com/channel/UCVeW9qkBjo3zosnqUbG7CFw

#Crypto

No title found

No description available.

https://www.youtube.com/channel/UCEpTctnbaz_m9DpibqG1siw

#Crypto

Python to decrypt RSA / ChaCha20 ransomware - encryptor [Flare-On 2022]

Demonstration of decrypting RSA and ChaCha20 ransomware.

https://www.youtube.com/watch?v=S9NyJD4LiY0

#Crypto

0xdf - YouTube

0xdf channel featuring cybersecurity and crypto-related content.

https://www.youtube.com/channel/UChO9OAH57Flz35RRX__E25A

#Crypto

Chacha Cipher - Computerphile

Explanation of the ChaCha stream cipher.

https://youtu.be/UeIpq-C-GSA

#Crypto

Deep Dive into Parsing SSH Keys To Exploit Improperly Sanitized Screenshots

Tutorial on exploiting SSH key parsing vulnerabilities.

https://youtu.be/4F1XGsvB2iA

#Crypto

IppSec - YouTube

IppSec channel featuring cybersecurity walkthroughs including cryptographic challenges.

https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA

#Crypto

How We Created the First SHA-1 Collision and What it Means for Hash Security

Explanation of creating the first SHA-1 collision and its implications for hash security.

https://www.youtube.com/watch?v=Zl1TZJGfvPo

#Crypto

Black Hat - YouTube

Black Hat channel featuring presentations on cybersecurity including cryptography.

https://www.youtube.com/channel/UCJ6q9Ie29ajGqKApbLqfBOg

#Crypto

Introduction to LEA Cryptography

Introduction to the LEA cryptographic algorithm.

https://maojui.me/Crypto/LEA/

#Crypto

Elliptic Curve Cryptography (ECC) - Nakov Cryptobook

Explanation of elliptic curve cryptography from the Nakov Cryptobook.

https://cryptobook.nakov.com/asymmetric-key-ciphers/elliptic-curve-cryptography-ecc

#Crypto

Introduction to RSA - SigmaPrime Blog

Introduction to RSA encryption from SigmaPrime Blog.

https://blog.sigmaprime.io/introduction-to-rsa.html

#Crypto

Attacking RSA for Fun and CTF Points (Part 1)

Exploration of attacking RSA for fun and in Capture The Flag competitions (Part 1).

https://bitsdeep.com/posts/attacking-rsa-for-fun-and-ctf-points-part-1/

#Crypto

JA3 Fingerprints

Explanation and usage of JA3 fingerprints in cybersecurity.

https://ja3er.com/

#Crypto

Impersonating JA3 Fingerprints

Techniques for impersonating JA3 fingerprints in cybersecurity.

https://medium.com/cu-cyber/impersonating-ja3-fingerprints-b9f555880e42

#Crypto

Beyond the Hash: How Unsupervised Machine Learning Unlocks the True Power of JA-3

Exploration of unsupervised machine learning and JA-3 in cybersecurity.

https://www.darktrace.com/en/blog/beyond-the-hash-how-unsupervised-machine-learning-unlocks-the-true-power-of-ja-3/

#Crypto

RSA CTF Tool

Tool for conducting RSA-related Capture The Flag challenges.

https://github.com/Ganapati/RsaCtfTool

#Crypto

Bit Flipping Attack on CBC Mode

Explanation and demonstration of bit flipping attacks on CBC mode encryption.

https://crypto.stackexchange.com/questions/66085/bit-flipping-attack-on-cbc-mode

#Crypto

Cryptography and Engineering - Infosec Reference

Reference material on cryptography and engineering.

https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/CandE.md

#Crypto

Introduction to RSA

Introduction to RSA encryption.

https://medium.com/@c0D3M/introduction-to-rsa-e8cb39af508e

#Crypto

CryptoHack Courses

Courses and challenges for learning cryptography.

https://cryptohack.org/courses/

#Crypto

Elliptic Curves Mathematics - Alpertron

Mathematical exploration of elliptic curves in cryptography.

https://www.alpertron.com.ar/ECM.HTM

#Crypto

Basic Notions in Number Theory

Basic notions in number theory related to cryptography.

https://github.com/zademn/EverythingCrypto/blob/master/E1%20Mathematics/Number_theory/Basic_notions.ipynb

#Crypto

Rolling Your Own Crypto: AES

Guide to rolling your own AES encryption implementation.

https://github.com/francisrstokes/githublog/blob/main/2022/6/15/rolling-your-own-crypto-aes.md

#Crypto

Real-World Cryptography

Book covering real-world applications of cryptography.

https://www.amazon.fr/Real-world-Cryptography-David-Wong/dp/1617296716

#Crypto

Crypto: The Handbook

Handbook covering various aspects of cryptography.

https://b-ok.cc/book/17217306/389dcb

#Crypto

JSur

Website or resource related to cryptography.

https://jsur.in/

#Crypto

W3Challs Crypto Challenges

Challenges and exercises related to cryptography.

https://w3challs.com/challenges/list/crypto

#Crypto

Crypto Attacks Repository

Repository of crypto attacks and techniques.

https://github.com/jvdsn/crypto-attacks

#Crypto

RSA Cryptography

Overview of RSA cryptography.

https://vozec.fr/crypto-rsa/

#Crypto

Advanced Military Cryptography

Book on advanced military cryptography.

https://www.amazon.com/Advanced-Military-Cryptography-Cryptographic-Friedman/dp/0894120115

#Crypto

Cryptography Wiki

Wiki resource on cryptography.

https://cryptography.fandom.com/wiki/Crypto_Wiki

#Crypto

Elliptic Curves README

README file on elliptic curves.

https://github.com/ashutosh1206/Crypton/blob/master/Elliptic-Curves/README.md

#Crypto

ChaCha20 Design

Design principles of the ChaCha20 cipher.

https://loup-vaillant.fr/tutorials/chacha20-design

#Crypto

ChaCha20 Key Derivation

Key derivation in ChaCha20 stream cipher.

https://loup-vaillant.fr/articles/chacha20-key-derivation

#Crypto

ChaCha20 Stream Ciphers

Usage of ChaCha20 in stream ciphers.

https://libsodium.gitbook.io/doc/advanced/stream_ciphers/chacha20

#Crypto

AES Square Attack

Attack techniques against AES using square attack.

https://github.com/thomasperrot/aes-square-attack

#Crypto

Cryptologie

Resource or information related to cryptography.

https://www.cryptologie.net/

#Crypto

Movs Like Jagger CA CTF 2022 Crypto Writeup

Writeup of crypto challenge from CA CTF 2022.

https://www.hackthebox.com/blog/movs-like-jagger-ca-ctf-2022-crypto-writeup

#Crypto

Side Channel Attacks Writeup

Writeup on side channel attacks in cryptography.

https://github.com/0x14mth3n1ght/Writeup/tree/master/FCSC/side_chan/

#Crypto

AES Encryption Algorithm Explained

Explanation of the AES encryption algorithm.

https://braincoke.fr/blog/2020/08/the-aes-encryption-algorithm-explained/

#Crypto

Video-Based Cryptanalysis

Cryptanalysis methods using video content.

https://www.nassiben.com/video-based-crypta

#Crypto

Introduction to Lattice Cryptography

Introduction to lattice-based cryptography.

https://vozec.fr/crypto-lattice/lattice-introduction/

#Crypto

ECDSA - Handle with Care

Best practices and handling tips for ECDSA cryptography.

https://blog.trailofbits.com/2020/06/11/ecdsa-handle-with-care/

#Crypto

FCSC 2020 Writeup: Corrumpere

Writeup for the FCSC 2020 challenge "Corrumpere".

https://github.com/Jakobus0/FCSC-2020-write-ups/blob/master/corrumpere_write_up.md

#Crypto

AES Flipper

Tool or technique involving AES encryption.

https://github.com/Vozec/AES-Flipper

#Crypto

PHP mt_rand Prediction

Prediction and analysis of PHP mt_rand function.

https://www.ambionics.io/blog/php-mt-rand-prediction

#Crypto

mt_rand Reverse Engineering

Reverse engineering of the mt_rand function.

https://github.com/ambionics/mt_rand-reverse

#Crypto

Creating the First SHA-1 Collision

Explanation of creating the first SHA-1 collision.

https://www.youtube.com/watch?v=Zl1TZJGfvPo

#Crypto

BinVis

Visualize binary files in interesting ways.

https://binvis.io/#/

#Forensics

EWF Tools

Working with Expert Witness Files in Linux.

https://dfir.science/2017/11/EWF-Tools-working-with-Expert-Witness-Files-in-Linux.html

#Forensics

BMC Tools

Various tools by ANSSI-FR for BIOS Management.

https://github.com/ANSSI-FR/bmc-tools

#Forensics

PCRT

Password Cracking Resource Tools.

https://github.com/sherlly/PCRT

#Forensics

CTF Forensics

Forensics challenges and resources for CTF.

https://trailofbits.github.io/ctf/forensics/

#Forensics

LaZagne Forensic

Tool to retrieve passwords stored on a system.

https://github.com/AlessandroZ/LaZagneForensic

#Forensics

Forensics Spreadsheet

A comprehensive forensics spreadsheet.

https://docs.google.com/spreadsheets/d/1z-44BUA2AVf8uqnoiDDSi7UxbyWy8KJqK4uaYq_0YYg/edit#gid=9

#Forensics

iOS Forensics

HFS file system, partitions, and relevant evidences.

https://www.andreafortuna.org/2020/08/31/ios-forensics-hfs-file-system-partitions-and-relevant-evidences/

#Forensics

iLEAPP

iOS Logs, Events, and Properties Parser.

https://github.com/abrignoni/iLEAPP

#Forensics

iOS Forensics Institute

Resources on iOS forensics.

https://resources.infosecinstitute.com/topic/ios-forensics/

#Forensics

BP Lister

Parse and extract data from BPL files.

https://github.com/threeplanetssoftware/bplister

#Forensics

Frequent Locations Dumper

Dump iOS Frequent Locations data.

https://github.com/mac4n6/iOS-Frequent-Locations-Dumper

#Forensics

Chainbreaker

Decrypt iOS iTunes Backup Keychain.

https://github.com/n0fate/chainbreaker

#Forensics

Forensics Tools

Various forensics tools by Mesquidar.

https://github.com/mesquidar/ForensicsTools

#Forensics

Digital Forensics

Digital forensics resources and tools.

https://www.digitalforensics.com/

#Forensics

DEDA

Data Exfiltration Detection Algorithm.

https://github.com/dfd-tud/deda

#Forensics

Firmadyne

Emulation framework for firmware analysis.

https://github.com/firmadyne/firmadyne/

#Forensics

Conti Ransomware

How I cracked Conti Ransomware Group’s leaked source code.

https://medium.com/@whickey000/how-i-cracked-conti-ransomware-groups-leaked-source-code-zip-file-e15d54663a8

#Forensics

Basic Linux Memory Forensics

Video on Linux memory forensics.

https://www.youtube.com/watch?v=uYWTfWV3dQI&ab_channel=IppSec

#Forensics

VolWeb

Web interface for Volatility.

https://github.com/k1nd0ne/VolWeb

#Forensics

OS Forensics

Complete forensic suite by PassMark Software.

https://www.osforensics.com/

#Forensics

Android Memory Forensics

Memory forensics on Android devices.

https://www.pwc.be/en/FY21/documents/Android_memory_forensics.pdf

#Forensics

Vol-GUI

Graphical user interface for Volatility.

https://github.com/AdityaSec/Vol-GUI

#Forensics

Cobalt Strike Investigation

Part 1 of the Cobalt Strike Investigation series.

https://blog.lexfora.com/Cobalt%20Strike%20Investigation%20Part%201.html

#Forensics

Unhide-NG

Detect hidden processes on Unix-like systems.

https://github.com/YJesus/Unhide-NG

#Forensics

DNSCat Decoder

Decoder for DNSCat protocol.

https://github.com/MicksMix/DNSCatDecoder

#Forensics

Volatility Cheatsheet

Cheatsheet for Volatility framework.

https://k-lfa.info/volatility-cheatsheet/

#Forensics

DNS Implants Detection

Case study on detecting DNS implants.

https://research.nccgroup.com/2022/08/11/detecting-dns-implants-old-kitten-new-tricks-a-saitama-case-study/

#Forensics

Forensics Tools List

List of useful forensics tools.

https://k-lfa.info/quelques-tools-forensics/

#Forensics

DumpZilla

Extract information from Firefox and Thunderbird profiles.

https://github.com/Busindre/dumpzilla

#Forensics

Firefox Decrypt

Decrypt passwords from Firefox.

https://github.com/Unode/firefox_decrypt

#Forensics

Cobalt Strike Attack Analysis

Analyze attacks using Cobalt Strike.

https://connect.ed-diamond.com/misc/misc-116/analyser-une-attaque-utilisant-l-outil-d-intrusion-commercial-cobalt-strike

#Forensics

Chainsaw

Command-line tool for forensics and incident response.

https://github.com/WithSecureLabs/chainsaw

#Forensics

Plaso

Framework for timeline creation.

https://github.com/log2timeline/plaso

#Forensics

MACB Times

Understanding MACB times in Windows Forensic Analysis.

https://andreafortuna.org/2017/10/06/macb-times-in-windows-forensic-analysis/

#Forensics

Recovering Browser History

Recover cleared browser history.

https://www.inversecos.com/2022/10/recovering-cleared-browser-history.html?m=1

#Forensics

MacOS HFS Forensics

Investigation numérique sous macOS HFS.

https://connect.ed-diamond.com/MISC/misc-107/investigation-numerique-sous-macos-hfs

#Forensics

Chainbreaker

Decrypt iOS iTunes Backup Keychain.

https://github.com/n0fate/chainbreaker

#Forensics

EWF Info

Command-line tool to show information about EWF files.

https://command-not-found.com/ewfinfo

#Forensics

EWF Mount

Mount EWF files as a file system.

https://command-not-found.com/ewfmount

#Forensics

Cobalt Strike Scan

Scan for Cobalt Strike beacons.

https://github.com/Apr4h/CobaltStrikeScan

#Forensics

Apple Binary Property List

Understanding Apple’s binary property list format.

https://medium.com/@karaiskc/understanding-apples-binary-property-list-format-281e6da00dbd

#Forensics

CTF Writeup

Writeup for a CTF forensic challenge.

https://ctftime.org/writeup/23198

#Forensics

CTF Writeups

Writeups for FCSC 2021 forensics challenges.

https://github.com/SorCelien/CTF-WRITEUPS/blob/main/FCSC-2021/forensics/ordiphone-2.md

#Forensics

EZDump Writeups

Writeups for SharkyCTF EZDump challenges.

https://www.synacktiv.com/publications/sharkyctf-ezdump-writeups-linux-forensics-introduction.html

#Forensics

Kallsyms Extractor

Extract kallsyms from Linux kernel memory dumps.

https://github.com/pagabuc/kallsyms-extractor

#Forensics

ACM Digital Library

Research paper on forensics.

https://dl.acm.org/doi/fullHtml/10.1145/3485471

#Forensics

Volatility Slides

Slides on Volatility from LSE Summer Week 2016.

https://www.lse.epita.fr/lse-summer-week-2016/slides/lse-summer-week-2016-04-volatility.pdf

#Forensics

Dwarf2JSON

Convert DWARF debugging information to JSON.

https://github.com/volatilityfoundation/dwarf2json

#Forensics

Volatility Profile Creation

Create specific Volatility profile and symbol table.

https://fahriguresci.com/create-specific-volatility-profile-and-symbol-table/

#Forensics

EVTX

Library to work with Windows EVTX event log files.

https://github.com/omerbenamram/evtx

#Forensics

Search Windows EVTX Files

Search Windows EVTX files with precision.

https://bhabeshraj.com/post/search-windows-evtx-files-with-precision/

#Forensics

ExFinder

Forensics tool to find and extract data.

https://github.com/d4rk-d4nph3/exfinder

#Forensics

Windows Event Logs Forensics

Forensic analysis of Windows event logs.

https://andreafortuna.org/2017/10/20/windows-event-logs-in-forensic-analysis/

#Forensics

Chainbreaker

Decrypt iOS iTunes Backup Keychain.

https://github.com/AppLeU0/chainbreaker

#Forensics

Cracking Android PINs

Cracking PIN and password locks on Android.

https://forensics.spreitzenbarth.de/2012/02/28/cracking-pin-and-password-locks-on-android/

#Forensics

Breaking Android Screenlock

Breaking the screenlock on Android devices.

https://forensics.spreitzenbarth.de/2015/08/12/breaking-the-screenlock-a-short-update/

#Forensics

Malware on Memory Dumps

Finding malware on memory dumps using Volatility and YARA rules.

https://andreafortuna.org/2018/07/16/finding-malware-on-memory-dumps-using-volatility-and-yara-rules/

#Forensics

Libzpy

Library for analyzing zip files.

https://github.com/mak/libzpy

#Forensics

UNBUP

Tool to extract files from .bup archives.

https://github.com/OpenSecurityResearch/unbup

#Forensics

ZeusScan

Volatility plugin for scanning Zeus malware.

https://github.com/botherder/volatility/blob/master/contrib/plugins/malware/zeusscan.py

#Forensics

Mimikatz

Post-exploitation tool to extract credentials.

https://github.com/FreeRDP/FreeRDP/wiki/Mimikatz

#Forensics

RDP Replay

Replay RDP sessions.

https://github.com/ctxis/RDP-Replay

#Forensics

Decrypt Stub Data

Decrypt encrypted stub data in Wireshark.

https://medium.com/tenable-techblog/decrypt-encrypted-stub-data-in-wireshark-deb132c076e7

#Forensics

Inverse COS

Research and tools for digital forensics.

https://www.inversecos.com/

#Forensics

LaZagne Forensic

Tool to retrieve passwords stored on a system.

https://github.com/AlessandroZ/LaZagneForensic

#Forensics

SANS Diary

Diary entry on digital forensics.

https://isc.sans.edu/diary/rss/27968

#Forensics

RDP Replay Archive

Archive of RDP replay blog post.

https://web.archive.org/web/20200424034135/https://www.contextis.com/en/blog/rdp-replay

#Forensics

Decrypting IPsec Protocols

Decrypting IPsec protocols ISAKMP.

https://celaldogan2010.medium.com/decrypting-ipsec-protocols-isakmp-and-5a93991

#Forensics

RDP Network Forensics

Writeup on RDP network forensics.

https://res260.medium.com/ihack-2020-monster-inc-the-middle-rdp-network-forensics-writeup-91e2fb0f4287

#Forensics

PyRDP

Python RDP man-in-the-middle and library.

https://github.com/GoSecure/pyrdp

#Forensics

HTB Writeup

Memory forensics writeup on HackTheBox.

https://www.hackthebox.com/blog/memory-forensics-volatility-write-up

#Forensics

LiME on Android

LiME on Android AVDs for Volatility analysis.

https://gabrio-tognozzi.medium.com/lime-on-android-avds-for-volatility-analysis-a3d2d89a9dd0

#Forensics

Speakeasy

Emulation framework for Windows malware.

https://github.com/mandiant/speakeasy

#Forensics

MemProcFS

Memory Process File System.

https://github.com/ufrisk/MemProcFS

#Forensics

Eric Zimmerman Tools

Digital forensics tools by Eric Zimmerman.

https://ericzimmerman.github.io/#!index.md

#Forensics

Volatility Illustrated

Illustrated guide to memory forensics with Volatility.

https://volatility-labs.blogspot.com/2021/10/memory-forensics-r-illustrated.html

#Forensics

WSL Memory Forensics

Memory forensics and the Windows Subsystem for Linux.

https://dfrws.org/wp-content/uploads/2019/06/paper_memory_forensics_and_the_windows_subsystem_for_linux.pdf

#Forensics

FACT Core

Firmware Analysis and Comparison Tool.

https://github.com/fkie-cad/FACT_core

#Forensics

EMBA

Embedded malware binary analysis.

https://github.com/e-m-b-a/emba

#Forensics

HFSleuth

Tool for analyzing HFS file systems.

https://newosxbook.com/tools/hfsleuth.html

#Forensics

Acropalypse

Recover partially overwritten PNG files.

https://acropalypse.app/

#Forensics

Hindsight

Analyze web browser artifacts.

https://github.com/obsidianforensics/hindsight

#Forensics

Memory Forensics Video

Introduction to memory forensics video playlist.

https://www.dfir.training/video-playlists/introduction-to-memory-forensics

#Forensics

Revoke-Obfuscation

PowerShell obfuscation detection framework.

https://github.com/danielbohannon/Revoke-Obfuscation

#Forensics

CanaryToken Scanner

Scan for CanaryTokens in files.

https://github.com/0xNslabs/CanaryTokenScanner

#Forensics

HTB Anti-Forensics

Anti-forensics techniques on HackTheBox.

https://www.hackthebox.com/blog/anti-forensics-techniques

#Forensics

DEF CON 24 - Grant Bugher - Bypassing Captive Portals and Limited Networks

Presentation at DEF CON 24 discussing methods to bypass captive portals and limited networks.

https://www.youtube.com/watch?v=GhUUzGBjhXQ

#Network

Gerald Doussot - State of DNS Rebinding Attacks & Singularity of Origins

Discussion on the current state of DNS rebinding attacks and their origins.

https://www.youtube.com/watch?v=y9-0lICNjOQ

#Network

Sécurisez votre infrastructure mail avec DNS - Bastien Sécher

Conference on securing mail infrastructure using DNS.

https://www.youtube.com/watch?v=C2gy_vITxLA

#Network

Modbus Traffic Analysis | SANS ICS Concepts

Analysis of Modbus traffic focusing on SANS ICS concepts.

https://www.youtube.com/watch?v=OAsLdXzKQo8

#Network

La 5G expliquée avec des petites voitures

Educational video explaining 5G technology using small cars.

https://www.youtube.com/watch?v=ao3jzvDghNI

#Network

Comprehensive Guide to pfSense 2.3 Part 1: The What and Why

Detailed guide to pfSense 2.3 covering its features and benefits.

https://www.youtube.com/watch?v=agieD5uiwYY

#Network

Attacking Real VoIP System with SIPVicious OSS

Article discussing attacks on real VoIP systems using SIPVicious OSS.

https://www.rtcsec.com/article/attacking-real-voip-system-with-sipvicious-oss/

#Network

Beyond the Hash: How Unsupervised Machine Learning Unlocks the True Power of JA3

Exploration of unsupervised machine learning and its impact on JA3 technology.

https://www.darktrace.com/en/blog/beyond-the-hash-how-unsupervised-machine-learning-unlocks-the-true-power-of-ja-3/

#Network

JA3er

Website focusing on JA3 fingerprinting techniques and tools.

https://ja3er.com/

#Network

Impersonating JA3 Fingerprints

Medium article detailing methods for impersonating JA3 fingerprints.

https://medium.com/cu-cyber/impersonating-ja3-fingerprints-b9f555880e42

#Network

Pinterest - Anderson Boschi

Pinterest board related to cybersecurity and technology.

https://www.pinterest.com/anderson_boschi/

#Network

SNMPv3Brute

GitHub repository for SNMPv3Brute tool.

https://github.com/applied-risk/snmpv3brute

#Network

SIPCrack

Tool for cracking SIP authentication.

https://www.kali.org/tools/sipcrack/

#Network

Password Cracker Cookbooks

Recipes and techniques for password cracking.

https://www.ifm.net.nz/cookbooks/passwordcracker.html

#Network

IEEE 802.11 WiFi Security Hacking

Medium article discussing WiFi security hacking in IEEE 802.11 networks.

https://medium.com/@syedhuseyn/ieee-802-11-wifi-security-hacking-149d26a2831

#Network

Meet WiFiDemon: iOS WiFi RCE 0-Day Vulnerability

Research article on the WiFiDemon iOS WiFi RCE 0-day vulnerability.

https://blog.zecops.com/research/meet-wifidemon-ios-wifi-rce-0-day-vulnerability-and-a-zero-click-vulnerability-that-was-silently-patched/

#Network

Palo Alto Warns of Zero-Day Bug in

Alert from Palo Alto Networks regarding a zero-day vulnerability.

https://thehackernews.com/2021/11/palo-alto-warns-of-zero-day-bug-in.html?m=1

#Network

Linux Packet Captures with tcpdump

Guide on performing Linux packet captures using tcpdump.

https://cordero.me/linux-packet-captures-with-tcpdump/

#Network

Author KCordero

Author profile page for KCordero.

https://cordero.me/author/kcordero/

#Network

VLAN Hopping Attack

Blog post detailing VLAN hopping attacks.

https://papehane.blogspot.com/2018/01/vlan-hopping-attack.html

#Network

DNSSEC: What is it? Why Important?

ICANN resource page explaining DNSSEC and its importance.

https://www.icann.org/resources/pages/dnssec-what-is-it-why-important-2019-03-20-fr

#Network

WiFi Hacking MindMap v1

Mind map for WiFi hacking techniques.

https://github.com/koutto/pi-pwnbox-rogueap/blob/main/mindmap/WiFi-Hacking-MindMap-v1.png

#Network

Exploiting AWS: Attackers Perspective

Insights into exploiting AWS vulnerabilities from an attacker's perspective.

https://daycyberwox.com/exploiting-aws-2-attackers-perspective-flaws2cloud

#Network

Twitter - FlashbackPwn

Twitter post from FlashbackPwn.

https://twitter.com/FlashbackPwn

#Network

Hack Protocol Chapter RIPV1

LinkedIn post on hacking protocol chapter RIPV1 by Mike Ghahremani.

https://www.linkedin.com/pulse/hack-protocol-chapter-ripv1-mike-ghahremani/

#Network

Abusing MS Teams Direct Routing

Blog post on abusing Microsoft Teams Direct Routing.

https://blog.syss.com/posts/abusing-ms-teams-direct-routing/

#Network

Decrypt Encrypted Stub Data in Wireshark

Tenable TechBlog article on decrypting encrypted stub data in Wireshark.

https://medium.com/tenable-techblog/decrypt-encrypted-stub-data-in-wireshark-deb132c076e7

#Network

Fluxion

GitHub repository for Fluxion tool.

https://github.com/FluxionNetwork/fluxion

#Network

Analyzing WhatsApp Calls

Medium article analyzing WhatsApp calls.

https://medium.com/@schirrmacher/analyzing-whatsapp-calls-176a9e776213

#Network

WebMap

GitHub repository for WebMap tool.

https://github.com/SabyasachiRana/WebMap

#Network

Twitter - 0xor0ne

Twitter post from 0xor0ne.

https://twitter.com/0xor0ne

#Network

Mama Always Told Me Not to Trust

Blog post from Grimm detailing trust issues.

https://blog.grimm-co.com/2021/09/mama-always-told-me-not-to-trust.html

#Network

Subdomain Enumeration with DNSSEC

Blog post on subdomain enumeration using DNSSEC.

https://www.securesystems.de/blog/subdomain-enumeration-with-DNSSEC/

#Network

Kismet Wireless

Official website of Kismet Wireless tool.

https://www.kismetwireless.net/

#Network

VLAN Hopping

Blog post on VLAN hopping.

https://bwlryq.net/posts/vlan_hopping/

#Network

SeeYouCM Thief

GitHub repository for SeeYouCM Thief tool.

https://github.com/trustedsec/SeeYouCM-Thief

#Network

Unauthenticated Dumping of Usernames via Cisco Unified Call Manager (CUCM)

Blog post on unauthenticated dumping of usernames via Cisco Unified Call Manager.

https://www.n00py.io/2022/01/unauthenticated-dumping-of-usernames-via-cisco-unified-call-manager-cucm/

#Network

Dissecting Exploiting TCP IP RCE Vulnerability

Security Intelligence article dissecting and exploiting TCP/IP RCE vulnerability.

https://securityintelligence.com/posts/dissecting-exploiting-tcp-ip-rce-vulnerability-evilesp/

#Network

PacketTotal

Website for analyzing packet captures.

https://packettotal.com/

#Network

Twitter - Cyb Detective

Twitter post from Cyb Detective.

https://twitter.com/cyb_detective

#Network

Deep Dive into TLS

Medium article diving deep into TLS protocol.

https://medium.com/devops-dudes/deep-dive-into-tls-a9798ac1763a

#Network

Bettercap

Official website of Bettercap tool.

https://www.bettercap.org/

#Network

Nord-Stream

GitHub repository for Nord-Stream tool.

https://github.com/synacktiv/nord-stream

#Network

Yersinia

GitHub repository for Yersinia tool.

https://github.com/tomac/yersinia

#Network

VoIP Hopper

Website for VoIP Hopper tool.

https://voiphopper.sourceforge.net/

#Network

OSPFMD5Crack

GitHub repository for OSPFMD5Crack tool.

https://github.com/c4s73r/OSPFMD5Crack/tree/main

#Network

Comprendre les attaques via ARP Spoofing MITM DoS

French article explaining ARP spoofing, MITM, and DoS attacks.

https://www.it-connect.fr/comprendre-les-attaques-via-arp-spoofing-mitm-dos/

#Network

arpspoof

GitHub repository for arpspoof tool.

https://github.com/byt3bl33d3r/arpspoof

#Network

Wireless Pentesting CheatSheet

GitHub repository for Wireless Pentesting CheatSheet.

https://github.com/V0lk3n/WirelessPentesting-CheatSheet

#Network

Network Segmentation Cheat Sheet

GitHub repository for Network Segmentation Cheat Sheet.

https://github.com/sergiomarotco/Network-segmentation-cheat-sheet

#Network

A Quick Look at QUIC

APNIC blog post providing an overview of QUIC protocol.

https://blog.apnic.net/2019/03/04/a-quick-look-at-quic/

#Network

dns2tcp

GitHub repository for dns2tcp tool.

https://github.com/alex-sector/dns2tcp

#Network

Docker Packet Filtering Firewalls

Docker documentation on packet filtering firewalls.

https://docs.docker.com/network/packet-filtering-firewalls/

#Network

Online SMS PDU Decoder

Tool for decoding online SMS PDU.

https://www.smsdeliverer.com/online-sms-pdu-decoder.aspx

#Network

NMEA Analyser

Tool for analyzing NMEA data.

https://swairlearn.bluecover.pt/nmea_analyser

#Network

OneShot-C

GitHub repository for OneShot-C tool.

https://github.com/nikita-yfh/OneShot-C

#Network

DNS Course

NSLookup.io course on DNS fundamentals.

https://www.nslookup.io/dns-course/

#Network

Investigating Surfshark and NordVPN with JA4T

Medium article investigating Surfshark and NordVPN using JA4T.

https://medium.com/foxio/investigating-surfshark-and-nordvpn-with-ja4t-7bbf5a33aad0

#Network

Jailbreaking an Electric Vehicle in 2023 or What It Means to Hotwir...

Exploring the implications of hotwiring electric vehicles in 2023.

https://www.youtube.com/watch?v=5tLNRk7mZXo

#Hardware

Don't Buy a "Gaming Chair" - Office Chair vs. Gaming Chair Round-Up...

Comparison between office chairs and gaming chairs.

https://www.youtube.com/watch?v=9Yhc6mmdJC4

#Hardware

Gamers Nexus

Channel focusing on gaming hardware and technology reviews.

https://youtube.com/c/GamersNexus

#Hardware

Can You Recover Sound From Images?

Investigating the possibility of recovering sound from images.

https://www.youtube.com/watch?v=eUzB0L0mSCI

#Hardware

Deus Ex Silicium

Videos on technology and electronics.

https://www.youtube.com/user/dexsilicium/videos

#Hardware

SO YOU HACKED A WIFI ROUTER, AND NOW WHAT ?

Exploring post-exploitation scenarios after hacking a WiFi router.

https://www.youtube.com/watch?v=bbZvIXU4laI

#Hardware

Radio Hacking: Cars, Hardware, and more! - Samy Kamkar - AppSec Cal...

Samy Kamkar discussing radio hacking of cars and hardware.

https://www.youtube.com/watch?v=1RipwqJG50c

#Hardware

How We Hacked a TP-Link Router and Took Home $55,000 in Pwn2Own

Discussion on hacking a TP-Link router at Pwn2Own competition.

https://www.youtube.com/watch?v=zjafMP7EgEA

#Hardware

Kiosk BREAKOUT - Web Browser to Command Prompt (Easy Mode)

Demonstration of breaking out of kiosks using web browsers.

https://www.youtube.com/watch?v=R7srpHUshuI

#Hardware

Sécurité iot et systèmes embarqués - Analyse de Firmware

Security analysis of IoT and embedded systems firmware.

https://www.youtube.com/watch?v=9ONXskRt_qQ

#Hardware

PWNING A NETGEAR ROUTER FROM WAN MITM STYLE

Man-in-the-middle style attack on a Netgear router from WAN.

https://www.youtube.com/watch?v=NQrKFeS5YUk

#Hardware

Deus Ex Silicium : Boîtiers EcoOBD & NitroOBD - ATTENTION ARNAQUE !

Discussion on EcoOBD & NitroOBD scam.

https://www.youtube.com/watch?v=fGciVNYHw7U

#Hardware

Clés de véhicules, prix excessifs ou justifiés ?

Analysis of the pricing of vehicle keys.

https://www.youtube.com/watch?v=IBJUh0jr9P0

#Hardware

BlackAlps17: Hydrabus: Lowering the entry fee to the IoT bugfest by...

Lowering the entry fee to IoT bugfest with Hydrabus.

https://www.youtube.com/watch?v=theYbzPhYH8

#Hardware

Jayson E. Street: Keynote [Security Fest 2022]

Keynote speech by Jayson E. Street at Security Fest 2022.

https://www.youtube.com/watch?v=FP5c8_U1G-w

#Hardware

DEF CON 30 - stacksmashing - The Hitchhacker’s Guide to iPhone Lig...

Hitchhacker’s guide to iPhone lightning cable hacking at DEF CON 30.

https://www.youtube.com/watch?v=8p3Oi4DL0eI

#Hardware

4 Gadgets bannis que n'importe qui peut acheter

Discussion on banned gadgets that anyone can buy.

https://www.youtube.com/watch?v=rTmJOkmlzro

#Hardware

Deus Ex Silicium : Analyse du démontage de la PS5 par Sony

Analysis of the PS5 disassembly by Sony.

https://www.youtube.com/watch?v=9ZmKyjpq9jo

#Hardware

retrofixer

Channel focusing on retro electronics and repairs.

https://www.youtube.com/@retrofixer

#Hardware

Flashback Team

Videos from the Flashback Team on various tech topics.

https://youtube.com/c/FlashbackTeam

#Hardware

Ce que nous révèle la puce de silicium d'un permis de conduire

Analysis of silicon chip in a driver's license.

https://www.youtube.com/watch?v=aTpH34Mvg90

#Hardware

Hacker's Guide to UART Root Shells

Guide to UART root shell attacks.

https://www.youtube.com/watch?v=01mw0oTHwxg

#Hardware

SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables

Air-gap exfiltration attack via radio signals from SATA cables.

https://www.youtube.com/watch?v=rlmP-csuFIo

#Hardware

Tom's Hardware France

Site web spécialisé dans les actualités et tests de matériel informatique.

https://tomshardware.fr/

#Hardware

Beapi - Tom's Hardware France

Auteur Beapi sur Tom's Hardware France.

https://www.tomshardware.fr/author/beapi/

#Hardware

NooElec NESDR SMArt - Aluminium & antennes

Produit NooElec NESDR SMArt avec aluminium et antennes.

https://www.amazon.fr/NooElec-NESDR-SMArt-Aluminium-antennes/dp/B01GDN1T4S/

#Hardware

Wireless Collinear Antenna Calculator

Calculateur d'antenne collinéaire sans fil.

https://martybugs.net/wireless/collinear.cgi

#Hardware

BattleChip - CTF 0xff.re 2021

Défi BattleChip du CTF FCSC 2021 sur 0xff.re.

https://ctf.0xff.re/2021/fcsc_2021/battlechip

#Hardware

Writeups - FCSC 2021 Hardware

Writeups pour le CTF FCSC 2021 sur le thème du hardware.

https://github.com/dspiricate/writeups/tree/main/FCSC/2021/hardware

#Hardware

J2000.0 - Wikipedia

Article sur J2000.0 sur Wikipedia.

https://fr.wikipedia.org/wiki/J2000.0

#Hardware

Saleae Support

Ressources de support de Saleae.

https://support.saleae.com/

#Hardware

Tweet - Podalirius

Tweet de Podalirius.

https://twitter.com/podalirius_/status/1434887791536652290

#Hardware

Tweet - Podalirius

Tweet de Podalirius.

https://twitter.com/podalirius_/status/1436420758188838913

#Hardware

RF to Bytes - RTL-SDR

Projet RF to Bytes avec RTL-SDR sur nada-labs.net.

https://nada-labs.net/2017/rf-to-bytes-rtl-sdr/

#Hardware

Nada Labs - Auteur Nada

Auteur Nada sur nada-labs.net.

https://nada-labs.net/author/nada/

#Hardware

Entête Ethernet - FrameIP

Article sur l'entête Ethernet sur FrameIP.

https://www.frameip.com/entete-ethernet/

#Hardware

Sebastien Fontaine - FrameIP

Auteur Sebastien Fontaine sur FrameIP.

https://www.frameip.com/author/sebastien-fontaine/

#Hardware

Universal Radio Hacker (URH) - GitHub

Universal Radio Hacker (URH) sur GitHub.

https://github.com/jopohl/urh

#Hardware

DUMPhfDL - GitHub

DUMPhfDL sur GitHub.

https://github.com/szpajder/dumphfdl

#Hardware

Firmwalker - GitHub

Firmwalker sur GitHub.

https://github.com/craigz28/firmwalker

#Hardware

Firmware Modification Kit - GitHub

Firmware Modification Kit sur GitHub.

https://github.com/rampageX/firmware-mod-kit

#Hardware

Awesome-Hardware-and-IoT-Hacking - GitHub

Awesome-Hardware-and-IoT-Hacking sur GitHub.

https://github.com/CyberSecurityUP/Awesome-Hardware-and-IoT-Hacking

#Hardware

Infrared - Flipper Zero Blog

Article sur l'infrarouge sur le blog de Flipper Zero.

https://blog.flipperzero.one/infrared/amp/

#Hardware

DIY: How to Create Your Own 4G Proxy - BlackHatWorld

Guide DIY pour créer son propre proxy 4G sur BlackHatWorld.

https://www.blackhatworld.com/seo/diy-how-to-create-your-own-4g-proxy.1234185/

#Hardware

Classroom - Flipper Zero Blog

Articles de la catégorie Classroom sur le blog de Flipper Zero.

https://blog.flipperzero.one/tag/classroom/

#Hardware

How I Hacked My Car - Programming With Style

Article sur le piratage de voiture sur Programming With Style.

https://programmingwithstyle.com/posts/howihackedmycar/

#Hardware

Learning Asynchronous Serial - Saleae

Guide d'apprentissage sur les communications série asynchrones sur Saleae.

https://support.saleae.com/tutorials/learning-portal/learning-resources/learn-asynchronous-serial

#Hardware

Flipper Zero Firmware with Plugins - GitHub

Firmware Flipper Zero avec plugins sur GitHub.

https://github.com/RogueMaster/flipperzero-firmware-wPlugins

#Hardware

Gadgets How-To - HackMag

Articles How-To sur les gadgets sur HackMag.

https://hackmag.com/security/gadgets-howto/

#Hardware

Drakylar - HackMag

Auteur Drakylar sur HackMag.

https://hackmag.com/author/drakylar/

#Hardware

DEFPASS

Site DEFPASS.

https://www.defpass.com/

#Hardware

Relaying YubiKeys - Cube0x0

Article sur le relais des YubiKeys par Cube0x0.

https://cube0x0.github.io/Relaying-YubiKeys/

#Hardware

YubiKey Relay - GitHub

YubiKey Relay sur GitHub.

https://github.com/cube0x0/YubiKey-Relay

#Hardware

Firmwalker - GitHub

Firmwalker sur GitHub.

https://github.com/craigz28/firmwalker

#Hardware

Enabot Series Part 2 - DebugMen

Série Enabot Partie 2 sur DebugMen.

https://debugmen.dev/hardware-series/2022/08/01/enabot_series_part_2.html

#Hardware

Enabot Series Part 1 - DebugMen

Série Enabot Partie 1 sur DebugMen.

https://debugmen.dev/hardware-series/2022/02/18/enabot_series_part_1.html

#Hardware

Mindshare: How to Just Emulate It with QEMU - ZDI

Article sur l'émulation avec QEMU sur ZDI.

https://www.zerodayinitiative.com/blog/2020/5/27/mindshare-how-to-just-emulate-it-with-qemu

#Hardware

Amazon - Kit B01MUFRHQ2

Produit Amazon - Kit B01MUFRHQ2.

https://www.amazon.fr/gp/product/B01MUFRHQ2/ref=ppx_yo_dt_b_asin_title_o01_s00?ie=UTF8&psc=1

#Hardware

Amazon - Kit B00TM0W8ZY

Produit Amazon - Kit B00TM0W8ZY.

https://www.amazon.fr/gp/product/B00TM0W8ZY/ref=ppx_yo_dt_b_asin_title_o03_s00?ie=UTF8&psc=1

#Hardware

Kit de électronique Velleman WSG150 - Distrelec

Kit de électronique Velleman WSG150 sur Distrelec.

https://www.distrelec.ch/fr/kit-de-electronique-velleman-wsg150/p/18500308?trackQuery=kit+%c3%a9l%c3%a9ctronique&pos=17&origPos=17&origPageSize=50&track=true

#Hardware

Kit Roue de la Fortune électronique Velleman WSG152 - Distrelec

Kit Roue de la Fortune électronique Velleman WSG152 sur Distrelec.

https://www.distrelec.ch/fr/kit-roue-de-la-fortune-electronique-velleman-wsg152/p/18500324?trackQuery=kit+%c3%a9l%c3%a9ctronique&pos=19&origPos=19&origPageSize=50&track=true

#Hardware

Kit de électronique Velleman WSG113 - Distrelec

Kit de électronique Velleman WSG113 sur Distrelec.

https://www.distrelec.ch/fr/kit-de-electronique-velleman-wsg113/p/18520090?trackQuery=kit+%c3%a9l%c3%a9ctronique&pos=23&origPos=23&origPageSize=50&track=true

#Hardware

JBC BT-2BWA Soldeerstation 140Watt - EleShop

Station de soudage JBC BT-2BWA 140Watt sur EleShop.

https://eleshop.fr/jbc-bt-2bwa-soldeerstation-140watt.html

#Hardware

Pinecil Mini Fer à Souder Portable Intelligent - EleShop

Pinecil Mini Fer à Souder Portable Intelligent sur EleShop.

https://eleshop.fr/pinecil-mini-fer-a-souder-portable-intelligent.html

#Hardware

TomTop - Produit E16951

Produit TomTop - E16951.

https://www.tomtop.com/fr/p-e16951.html

#Hardware

Escaping from GUI Applications - HackTricks

Guide sur l'évasion des applications GUI sur HackTricks.

https://book.hacktricks.xyz/hardware-physical-access/escaping-from-gui-applications

#Hardware

ATM Kiosk Hacking Labs - Boschko

Laboratoires de piratage de kiosques ATM sur Boschko.

https://boschko.ca/atm-kiosk-hacking-labs/amp/

#Hardware

Breaking Out of Windows Kiosks Using Only Microsoft Edge - NVISO Blog

Article sur la sortie des kiosques Windows en utilisant uniquement Microsoft Edge sur le blog NVISO.

https://blog.nviso.eu/2022/05/24/breaking-out-of-windows-kiosks-using-only-microsoft-edge/

#Hardware

Firat Acar - NVISO Blog

Auteur Firat Acar sur le blog NVISO.

https://blog.nviso.eu/author/firat-acar/

#Hardware

Projets - Virtualabs

Projets sur Virtualabs.

https://virtualabs.fr/category/projets.html

#Hardware

Hardware Hacking Experiments - GitHub

Expériences de piratage matériel sur GitHub.

https://github.com/koutto/hardware-hacking/blob/master/Hardware-Hacking-Experiments-Jeremy-Brun-Nouvion-2020.pdf

#Hardware

Practical DMA Attack on Windows 10 - Synacktiv

Attaque DMA pratique sur Windows 10 par Synacktiv.

https://www.synacktiv.com/en/publications/practical-dma-attack-on-windows-10.html

#Hardware

UART, U-Boot, and USB - VoidStar Security

Article sur UART, U-Boot, et USB sur VoidStar Security.

https://voidstarsec.com/blog/uart-uboot-and-usb

#Hardware

HackRF One French - GitHub

HackRF One en français sur GitHub par PierreAdams.

https://github.com/PierreAdams/HackRF-One-French

#Hardware

RTL_433 - GitHub

RTL_433 sur GitHub par merbanan.

https://github.com/merbanan/rtl_433

#Hardware

DSTIKE - Store

Produits DSTIKE sur leur site officiel.

https://dstike.com/

#Hardware

Hardware Implant Attacks Part 1 - CSG GovTech

Attaques par implants matériels - Partie 1 sur CSG GovTech.

https://medium.com/csg-govtech/hardware-implant-attacks-part-1-console-access-attacks-on-vulnerable-iot-devices-104662f472dc

#Hardware

AutoHackOS - GitHub

AutoHackOS sur GitHub.

https://github.com/autohackos

#Hardware

Dronesploit - GitHub

Dronesploit sur GitHub par dhondta.

https://github.com/dhondta/dronesploit

#Hardware

MAME - GitHub

MAME sur GitHub par mamedev.

https://github.com/mamedev/mame

#Hardware

ZeroJay's Blog - Archive

Archive du blog ZeroJay.

https://web.archive.org/web/20201111185235/https://zerojay.com/blog/

#Hardware

VoidStar Security

Site VoidStar Security.

https://voidstarsec.com/

#Hardware

SF Cabinet - GitHub

SF Cabinet sur GitHub par wrongbaud.

https://github.com/wrongbaud/sf-cabinet

#Hardware

Bus Pirate - GitHub

Bus Pirate sur GitHub par BusPirate.

https://github.com/BusPirate/Bus_Pirate

#Hardware

Exploiting Embedded APIs by Dumping Firmware - Dana Epp

Exploitation des APIs embarquées par le dumping de firmware sur Dana Epp.

https://danaepp.com/exploiting-embedded-apis-by-dumping-firmware

#Hardware

Dana Epp - Author Page

Page d'auteur Dana Epp.

https://danaepp.com/author/danaepp42

#Hardware

Ph0wn My First IoT CTF Part 3 - Sébastien Andrivet

Partie 3 du CTF IoT Ph0wn par Sébastien Andrivet.

http://sebastien.andrivet.com/en/posts/ph0wn-my-first-iot-ctf-part-3/

#Hardware

Protocol Depth: USB Physical Layer - Luigi C. Filho

Profondeur du protocole: Couche physique USB par Luigi C. Filho sur LinkedIn.

https://www.linkedin.com/pulse/protocol-depth-usb-physical-layer-luigi-c-filho/

#Hardware

Reverse Engineering Architecture Pinout PLC - SEC Consult

Ingénierie inverse de l'architecture pinout PLC par SEC Consult.

https://sec-consult.com/blog/detail/reverse-engineering-architecture-pinout-plc/

#Hardware

Flash Dumping Part I - Quarkslab

Dumping de flash - Partie I sur Quarkslab.

https://blog.quarkslab.com/flash-dumping-part-i.html

#Hardware

I Hack U-Boot - Synacktiv

Je pirate U-Boot par Synacktiv.

https://www.synacktiv.com/publications/i-hack-u-boot

#Hardware

Dumping Firmware from a Reolink Camera - Micah VanDeusen

Dumping de firmware d'une caméra Reolink par Micah VanDeusen.

https://micahvandeusen.com/dumping-firmware-from-a-reolink-camera/

#Hardware

JTAGenum - GitHub

JTAGenum sur GitHub par cyphunk.

https://github.com/cyphunk/JTAGenum/

#Hardware

Car Hacking 101 - Yogesh Ojha

Guide pratique pour pirater les systèmes CAN Bus à l'aide du simulateur de cluster d'instruments - Partie I par Yogesh Ojha.

https://medium.com/@yogeshojha/car-hacking-101-practical-guide-to-exploiting-can-bus-using-instrument-cluster-simulator-part-i-cd88d3eb4a53

#Hardware

Flipper Zero Brute Force - GitHub

Flipper Zero Brute Force sur GitHub par tobiabocchi.

https://github.com/tobiabocchi/flipperzero-bruteforce

#Hardware

RoboCoffee - Article

Article RoboCoffee.

https://robocoffee.de/?p=436

#Hardware

RoboCoffee - Author Page

Page d'auteur RoboCoffee.

https://robocoffee.de/?author=1

#Hardware

Shooting Yourself in the Flags: Jailbreaking the Sonos Era 100 - NCC Group

Jailbreaking the Sonos Era 100 par NCC Group.

https://research.nccgroup.com/2023/12/04/shooting-yourself-in-the-flags-jailbreaking-the-sonos-era-100/

#Hardware

JTAG iPhone Pico - MattEyeux

JTAG iPhone Pico par MattEyeux.

https://matteyeux.github.io/posts/jtag-iphone-pico/

#Hardware

JTAG HDD - WrongBaud

JTAG HDD par WrongBaud.

https://wrongbaud.github.io/posts/jtag-hdd/

#Hardware

ChatGPT vient de se faire détrôner par des génies français

Vidéo YouTube sur ChatGPT et l'avancée de l'IA.

https://www.youtube.com/watch?v=mc2Qli9ImOI

#IA

Dasha AI - Log Loss Function

Article sur la fonction de perte log.

https://dasha.ai/en-us/blog/log-loss-function

#IA

GeeksforGeeks - Deep Learning Tutorial

Tutoriel sur l'apprentissage profond.

https://www.geeksforgeeks.org/deep-learning-tutorial/

#IA

Machine Learning Security - DeepExploit

Projet DeepExploit pour la sécurité en apprentissage automatique.

https://github.com/13o-bbr-bbq/machine_learning_security/tree/master/DeepExploit

#IA

Descript

Descript - Outil d'édition audio et vidéo.

https://www.descript.com/

#IA

Netflix Tech Blog - Machine Learning for Fraud Detection

Article sur la détection de fraude avec l'apprentissage automatique chez Netflix.

https://netflixtechblog.com/machine-learning-for-fraud-detection-in-streaming-services-b0b4ef3be3f6

#IA

Hacktback - Exploitation des modèles GPT personnalisés

Article sur l'exploitation des modèles GPT personnalisés.

https://hacktback.fr/nos-ressources/exploitation-des-modeles-gpt-personnalises/

#IA

FlowGPT - DarkGPT Official Edition

DarkGPT Official Edition par FlowGPT.

https://flowgpt.com/p/darkgpt-official-edition

#IA

Mistral AI

Plateforme Mistral AI.

https://mistral.ai/

#IA

Clubic - Des chercheurs créent le tout premier ver informatique capable de se répandre dans les syst

Article sur le premier ver informatique pour les systèmes d'IA.

https://www.clubic.com/actualite-520456-des-chercheurs-creent-le-tout-premier-ver-informatique-capable-de-se-repandre-dans-les-systemes-d-ia.html

#IA

Cursor.sh

Site web Cursor.sh.

https://cursor.sh/

#IA

Autogluon

Autogluon sur GitHub.

https://github.com/autogluon/autogluon

#IA

SpecterOps - Summoning Ragnarok with Your Nemesis

Article sur l'invocation de Ragnarok avec votre Némésis.

https://posts.specterops.io/summoning-ragnarok-with-your-nemesis-7c4f0577c93b

#IA

Trail of Bits - Exploiting ML Models with Pickle File Attacks Part 1

Article sur l'exploitation des modèles ML avec des attaques de fichiers Pickle (partie 1).

https://blog.trailofbits.com/2024/06/11/exploiting-ml-models-with-pickle-file-attacks-part-1/

#IA

Trail of Bits - Sarah Miller

Articles par Sarah Miller sur Trail of Bits.

https://blog.trailofbits.com/author/sarahmiller239

#IA

OSINT Origins #1 - Jean-Marc Manach/@manhack

Conférence sur les origines de l'OSINT par Jean-Marc Manach.

https://www.youtube.com/watch?v=XrTFzZ77eEI

#Osint

LinkedIn OSINT Techniques feat. Mishaal Khan

Techniques avancées d'OSINT sur LinkedIn avec Mishaal Khan.

https://www.youtube.com/watch?v=bz4oZBR3LEk

#Osint

Titre non disponible

Conférence sur OSINT par une chaîne YouTube non identifiée.

https://www.youtube.com/channel/UCSxk_CUfES4ly5Sspc0Vorw

#Osint

🇫🇷[Workshop] OSINT par mot de passe avec h8mail - Khast3x

Atelier en français sur l'OSINT par mot de passe avec h8mail par Khast3x.

https://www.youtube.com/watch?v=u1frAWJE5_Q

#Osint

OSINT Origins #2 - _IntelligenceX/Peter Kleissner

Deuxième partie des origines de l'OSINT par _IntelligenceX/Peter Kleissner.

https://www.youtube.com/watch?v=UsRAziRLsY8

#Osint

Google Hacking Techniques

Techniques de piratage Google pour l'OSINT.

https://securitytrails.com/blog/google-hacking-techniques

#Osint

SocialPwned

Outil pour la recherche de fuites de données sociales.

https://github.com/MrTuxx/SocialPwned

#Osint

Yandex Search Operators

Guide des opérateurs de recherche sur Yandex.

https://yandex.com/support/search/query-language/search-operators.html

#Osint

PhoneInfoga

Outil d'OSINT pour la recherche d'informations téléphoniques.

https://github.com/sundowndev/PhoneInfoga

#Osint

GHunt

Outil d'OSINT pour l'investigation sur Google Workspace.

https://github.com/mxrch/GHunt

#Osint

Tweet par AFP Factuel

Tweet par AFP Factuel concernant l'actualité.

https://twitter.com/afpfactuel/status/1413862177304350722?s=21

#Osint

Google Lens

Application Google Lens pour l'analyse d'images.

https://lens.google/

#Osint

DumpsterDiver

Outil pour la recherche de données sensibles dans les dépôts de déchets.

https://github.com/securing/DumpsterDiver

#Osint

OSINT Flight Tracking Challenge

Défi de suivi de vols pour l'OSINT.

https://haax.fr/fr/writeups/osint-geoint/osint-flight-tracking-challenge/

#Osint

SunCalc

Calculateur de position du soleil et de la lune.

http://suncalc.net/

#Osint

Facebook/Instagram OSINT

Extension Firefox pour l'OSINT sur Facebook et Instagram.

https://addons.mozilla.org/fr/firefox/addon/facebook-instagram-osint/

#Osint

OSINT 101

Introduction à l'OSINT et ses principes de base.

https://0xraven.fr/articles/osint-101/

#Osint

TGStat

Moteur de recherche et d'analyse de statistiques Telegram.

https://tgstat.ru/en/search

#Osint

Osintgram

Outil d'OSINT pour Instagram.

https://github.com/Datalux/Osintgram

#Osint

EPIEOS Tools

Outils pour l'OSINT.

https://tools.epieos.com/

#Osint

Pentesting Kubernetes from the Outside

Guide de pentesting Kubernetes depuis l'extérieur.

https://book.hacktricks.xyz/pentesting/pentesting-kubernetes/pentesting-kubernetes-from-the-outside

#Osint

Using Shadows and Optics to Geolocate a Photo in a US Military Base

Méthodes pour géolocaliser une photo sur une base militaire US.

https://medium.com/@drstache/using-shadows-and-optics-to-geolocate-a-photo-in-a-us-military-base-29bd3086283c

#Osint

MarineTraffic

Suivi des navires et données maritimes.

https://www.marinetraffic.com/

#Osint

WiGLE

Base de données de réseaux sans fil mondiaux.

https://www.cqcore.uk/the-world-of-wigle/

#Osint

Auteur sur CQCore

Articles par l'auteur sur CQCore.

https://www.cqcore.uk/author/cq21_pqp8gp56

#Osint

SteamID Finder

Recherche d'informations sur les identifiants Steam.

https://www.steamidfinder.com/

#Osint

Censys

Recherche et analyse des appareils connectés à Internet.

https://censys.io/

#Osint

IntelX

Moteur de recherche pour les données d'intelligence.

https://intelx.io/

#Osint

Enigma

Base de données pour l'intelligence et la recherche de données.

https://enigma.com/

#Osint

OpenCorporates

Base de données sur les entreprises mondiales.

https://opencorporates.com/

#Osint

LittleSis

Base de données pour explorer les relations de pouvoir.

https://littlesis.org/

#Osint

Lampyre

Outil pour l'analyse des réseaux et la recherche d'informations.

https://lampyre.io/

#Osint

Ransom Wiki

Wiki sur les informations relatives aux ransomwares.

https://ransom.wiki/

#Osint

The Ultimate OSINT Collection

Collection ultime d'outils d'OSINT.

https://start.me/p/DPYPMz/the-ultimate-osint-collection

#Osint

Tweet par Podalirius

Tweet par Podalirius sur un sujet non précisé.

https://twitter.com/podalirius_/status/1481670627048132608

#Osint

PimEye

Outil de recherche d'images en ligne.

https://pimeye

#Osint

Watools

Outils pour WhatsApp.

https://watools.io/

#Osint

ProtOSINT

Outil pour la recherche et l'exploitation d'informations.

https://github.com/pixelbubble/ProtOSINT

#Osint

Search by Image

Extension Firefox pour la recherche par image.

https://addons.mozilla.org/en-US/firefox/addon/search_by_image/

#Osint

JTAGenum

Outil pour l'exploration des dispositifs JTAG.

https://github.com/novitae/sterraxcyl

#Osint

LinkedInt

Outil pour la collecte d'informations LinkedIn.

https://github.com/vysecurity/LinkedInt

#Osint

SIV-Auto

SIV-Auto pour les informations sur les véhicules.

https://siv-auto.fr/

#Osint

AviarLabs

AviarLabs pour les solutions de cybersécurité.

https://fr.aviarlabs.com/

#Osint

DMS Decimal

Système de décimalisation des coordonnées DMS.

https://www.fcc.gov/media/radio/dms-decimal

#Osint

GEOINT - Frontières sino-birmanes

Analyse GEOINT des frontières sino-birmanes.

https://medium.com/@meakaaet/geoint-1-fronti%C3%A8res-sino-birmanes-f77bdfb581ae

#Osint

GeoTips

Conseils et astuces pour l'analyse géospatiale.

https://geotips.net/

#Osint

Auteur sur GeoTips

Articles par l'auteur sur GeoTips.

https://geotips.net/author/admin

#Osint

Discord ID

Recherche d'informations sur l'ID Discord.

https://discord.id/

#Osint

GitRob

Outil pour la recherche de secrets dans les dépôts Git.

https://github.com/michenriksen/gitrob

#Osint

GitLeaks

Outil pour la recherche de fuites d'informations sensibles dans les dépôts Git.

https://github.com/zricethezav/gitleaks

#Osint

TheHarvester

Outil pour la collecte d'informations sur les courriels, les sous-domaines, etc.

https://github.com/laramies/theHarvester

#Osint

LinkedIn2Username

Outil pour la recherche de noms d'utilisateur LinkedIn à partir d'adresses électroniques.

https://github.com/initstring/linkedin2username

#Osint

Awesome Hacker Search Engines

Liste des moteurs de recherche pour hackers.

https://github.com/edoardottt/awesome-hacker-search-engines

#Osint

Depix

Outil pour récupérer du texte à partir d'images floutées.

https://github.com/beurtschipper/Depix

#Osint

BlackSide

Présentation sur BlackSide.

https://www.beautiful.ai/player/-MsnhEMkgvXsZpppPkNM/BlackSide

#Osint

Skype Hidden OSINT Goldmine

Guide sur l'extraction de données cachées sur Skype.

https://whitehatinspector.blogspot.com/2021/03/skype-hidden-osint-goldmine.html

#Osint

IBAN Calculator

Calculateur IBAN en ligne.

https://www.ibancalculator.com/

#Osint

OSINT Collection

Collection d'outils OSINT.

https://github.com/Ph055a/OSINT_Collection

#Osint

Mailfoguess

Outil pour deviner les adresses e-mail.

https://github.com/WildSiphon/Mailfoguess

#Osint

Ozint

Guide des outils d'OSINT.

https://ozint.eu/

#Osint

Overpass Turbo

Outil pour interroger les données OpenStreetMap.

https://overpass-turbo.eu/

#Osint

Geoportail

Service de cartographie en ligne du gouvernement français.

https://www.geoportail.gouv.fr/

#Osint

CachedView

Affichage de la version en cache d'une page Web.

http://cachedview.com/

#Osint

Décès en France

Base de données des décès en France.

https://www.deces-en-france.fr/

#Osint

Annuaire des Entreprises

Base de données des entreprises en France.

https://annuaire-entreprises.data.gouv.fr/

#Osint

Societe Ninja

Outils pour l'investigation sur les entreprises.

https://www.societe.ninja/index.html

#Osint

GitFive

Outil pour analyser les dépôts Git.

https://github.com/mxrch/gitfive

#Osint

Emdofi

Outil pour l'enquête sur les domaines Internet.

https://github.com/novitae/emdofi

#Osint

Grabbing Old Bitmoji Outfits with Backmoji

Technique pour récupérer des tenues Bitmoji anciennes.

https://webbreacher.com/2022/10/24/grabbing-old-bitmoji-outfits-with-backmoji/

#Osint

WebBreacher

Articles par WebBreacher.

https://webbreacher.com/author/webbreacher

#Osint

Gau

Outil pour l'extraction et l'analyse des URL.

https://github.com/lc/gau

#Osint

H8Mail v1.7.2

Outil pour l'OSINT par courriel.

https://github.com/khast3x/h8mail

#Osint

GHunt v2.0.1

Outil pour la recherche d'informations sur Google Workspace.

https://github.com/mxrch/GHunt/releases/tag/v2.0.1

#Osint

Email Headers Analyzer

Analyseur de en-têtes de courriel.

https://mxtoolbox.com/EmailHeaders.aspx

#Osint

Google Vous Connaissez

Article sur Google par Elsicarius.

https://elsicarius.fr/google-vous-connaissez

#Osint

Elsicarius

Articles par Elsicarius.

https://elsicarius.fr/author/s3cur3_tr4a4xx_adm1n_acc0un

#Osint

LeakPeek

Outil pour rechercher des fuites de données.

https://leakpeek.com/

#Osint

Six Tools to Help with Geolocation

Six outils pour aider à la géolocalisation.

https://nixintel.info/osint-tools/six-tools-to-help-with-geolocation/

#Osint

NixIntel

Articles par NixIntel.

https://nixintel.info/author/nixintel

#Osint

Peasant

Outil pour le test de sécurité de serveurs.

https://github.com/arch4ngel/peasant

#Osint

NQNTNQNQMB

Outil pour le recensement d'informations.

https://github.com/megadose/nqntnqnqmb

#Osint

LinkedInt

Outil pour la collecte d'informations LinkedIn.

https://github.com/vysecurity/LinkedInt

#Osint

Understanding and Using Google IDs in an OSINT Strategy

Guide pour comprendre et utiliser les identifiants Google dans une stratégie OSINT.

https://www.eduba.school/blog/comment-comprendre-et-utiliser-les-google-id-dans-une-strategie-osint

#Osint

Xeuledoc

Documentation sur Xeuledoc par Malfrats.

https://github.com/Malfrats/xeuledoc

#Osint

Public Intelligence Feeds

Alimentation publique de l'intelligence.

https://github.com/CriticalPathSecurity/Public-Intelligence-Feeds

#Osint

DeepDarkCTI

Centre de cyber renseignement.

https://github.com/fastfire/deepdarkCTI

#Osint

OnionSearchtion

Outil pour la recherche sur le Dark Web.

https://github.com/megadose/OnionSearchtion

#Osint

SpiderFoot

Outil pour l'analyse des menaces et de l'intelligence.

https://www.spiderfoot.net/

#Osint

SpiderFoot

Articles par Steve sur SpiderFoot.

https://www.spiderfoot.net/author/steve

#Osint

HexaCTF

Capture du drapeau hexagonal.

https://github.com/1sis/HexaCTF

#Osint

Favicon to MurmurHash

Extension Firefox pour convertir le favicon en MurmurHash.

https://addons.mozilla.org/fr/firefox/addon/favicon-to-murmurhash/

#Osint

Tweet par EPCyber

Tweet par EPCyber sur un sujet non précisé.

https://twitter.com/epcyber/status/1630207876382744584?t=LE4pnzCmIpedmrZag1qdrg&s=19

#Osint

OSINT Tracker

Outil pour le suivi et l'analyse de l'OSINT.

https://www.osintracker.com/

#Osint

Cloud OSINT

Outil pour l'analyse et la collecte d'informations dans le cloud.

https://github.com/7WaySecurity/cloud_osint

#Osint

Wholeaked

Outil pour la collecte d'informations exposées.

https://github.com/utkusen/wholeaked

#Osint

SpiderFoot

Outil pour l'analyse des menaces et de l'intelligence.

https://github.com/smicallef/spiderfoot

#Osint

Gvision

Outil pour l'analyse d'images.

https://github.com/GONZOsint/gvision

#Osint

Postmaniac

Outil pour l'analyse de courriels.

https://github.com/boringthegod/postmaniac

#Osint

Google Patents

Recherche de brevets Google.

https://patents.google.com/

#Osint

Carto Graou

Outil pour la visualisation de données.

https://carto.graou.info/

#Osint

0t.rocks

Moteur de recherche OSINT.

https://search.0t.rocks/

#Osint

Search By Image

Outil pour la recherche par image.

https://github.com/dessant/search-by-image

#Osint

DeepDarkCTI

Centre de cyber renseignement.

https://github.com/fastfire/deepdarkCTI

#Osint

OSINT Industries

Ressources et outils OSINT.

http://osint.industries/

#Osint

PimEyes Crack UserStyle

Personnalisation de PimEyes pour contourner les restrictions.

https://github.com/ItsIgnacioPortal/PimEyes-Crack-UserStyle

#Osint

EagleEye

Outil pour l'enquête numérique.

https://github.com/ThoughtfulDev/EagleEye

#Osint

Pinterest Lens

Outil de recherche visuelle de Pinterest.

https://help.pinterest.com/fr/article/pinterest-lens

#Osint

LinkedIn

Profil LinkedIn de recherche.

https://lnkd.in/gs9dFrke

#Osint

Fuzzing Labs

Articles par Fuzzing Labs.

https://fuzzinglabs.com/author/admin8913

#Osint

Dork Generator

Générateur de dorks pour les recherches Google.

https://yuraloginoff.github.io/dork-generator/

#Osint

EmploLeaks

Outil pour la recherche de fuites d'informations sur les employés.

https://github.com/infobyte/emploleaks

#Osint

Telegram Get Remote IP

Outil pour obtenir l'adresse IP distante d'un utilisateur Telegram.

https://github.com/lleon1435/telegram-get-remote-ip

#Osint

PSBDMP

Recherche de données publiques.

https://psbdmp.ws/

#Osint

CTI

Articles par Sam0x90 sur le renseignement sur les menaces.

https://github.com/Sam0x90/CTI

#Osint

Tweet URL

Tweet non spécifié.

https://t.co/3lGXepf041

#Osint

OhShINT

Guide de l'outil OhShINT.

https://github.com/OhShINT/ohshint.gitbook.io/

#Osint

Graph-Based Intelligence Analysis

Analyse du renseignement basée sur les graphes.

https://linkurious.com/blog/graph-based-intelligence-analysis/

#Osint

Linkurious

Plateforme pour l'analyse des graphes.

https://linkurious.com/

#Osint

Gephi

Outil pour l'analyse des graphes.

https://gephi.org/

#Osint

i2 Analyst's Notebook

Outil d'analyse de données.

https://i2group.com/i2-analysts-notebook

#Osint

APIs for OSINT

Collection d'API pour l'OSINT.

https://github.com/cipher387/API-s-for-OSINT

#Osint

WhatsApp OSINT

Outil pour la collecte d'informations sur WhatsApp.

https://github.com/jasperan/whatsapp-osint

#Osint

Well-Known.dev

Outil pour l'exploration de ressources .well-known.

https://well-known.dev/

#Osint

PyMeta

Outil pour l'analyse de métadonnées.

https://github.com/m8sec/pymeta

#Osint

Memory.lol

Outil pour la recherche de mémoires compromis.

https://github.com/travisbrown/memory.lol

#Osint

BushidoToken Blog

Articles par BushidoToken.

https://blog.bushidotoken.net/

#Osint

Censys

Plateforme pour l'exploration de l'Internet.

https://censys.com/

#Osint

CTI Fundamentals

Fondamentaux du renseignement sur les menaces.

https://github.com/curated-intel/CTI-fundamentals

#Osint

Web Check

Outil pour la vérification des sites Web.

https://web-check.xyz/

#Osint

Beneficial Ownership Registers Interconnection System

Système d'interconnexion des registres de propriété bénéficiaire.

https://e-justice.europa.eu/38590/EN/beneficial_ownership_registers_interconnection_system_boris?EUROPEAN_UNION&action=maximize&idSubpage=1

#Osint

BODACC

Base de données des avis au BODACC.

https://www.bodacc.fr/

#Osint

OSINT Stuff Tool Collection

Collection d'outils OSINT.

https://github.com/cipher387/osint_stuff_tool_collection

#Osint

Noobox 2

Extension Firefox pour la gestion de notes.

https://addons.mozilla.org/fr/firefox/addon/noobox_2/

#Osint

Multi-Account Containers

Extension Firefox pour la gestion de comptes.

https://addons.mozilla.org/fr/firefox/addon/multi-account-containers/

#Osint

MySudo

Service pour la gestion de l'identité.

https://mysudo.com/

#Osint

InfoTracer

Service de recherche d'informations en ligne.

https://infotracer.com/

#Osint

Deepware Scanner

Outil pour l'analyse de l'information en ligne.

https://scanner.deepware.ai/

#Osint

Breach Forums

Forum pour la discussion des violations de données.

https://breachforums.is/showthread.php?tid=97611

#Osint

CartoRadio

Base de données sur la couverture radio.

https://www.cartoradio.fr/

#Osint

SondeHub

Plateforme pour l'exploitation de données.

https://sondehub.org/

#Osint

QRZ Lookup

Recherche de données radioamateurs.

https://www.qrz.com/lookup/

#Osint

Societe Ninja

Outils pour l'investigation sur les entreprises.

https://www.societe.ninja/index.html

#Osint

ExtPose

Extension pour la gestion des onglets Chrome.

https://extpose.com/ext/haogkfoekgcdihiijdhjnpnbbodkgfmb

#Osint

Anonymous Planet Guide

Guide pour l'anonymat en ligne.

https://anonymousplanet.org/guide.html

#Osint

OSINT Tool

Outils pour l'investigation en ligne.

https://www.osint-tool.com/

#Osint

OSINT Tool

Articles sur les outils OSINT.

https://www.osint-tool.com/author/wordpress

#Osint

MetaDetective

Outil pour l'analyse des métadonnées.

https://github.com/franckferman/MetaDetective

#Osint

Awesome Browser Extensions for OSINT

Liste d'extensions de navigateur pour l'OSINT.

https://github.com/osintambition/Awesome-Browser-Extensions-for-OSINT

#Osint

GeoSpy

Outil pour l'analyse et la collecte de données géospatiales.

https://geospy.ai/

#Osint

Introduction to fuzzing

Introduction to fuzzing - YouTube

https://www.youtube.com/watch?v=o-3c2OGsxlk

#Programming

Neso Academy

Chaîne YouTube Neso Academy

https://www.youtube.com/@nesoacademy/videos

#Programming

Array Map in 100 Seconds

Array Map in 100 Seconds - YouTube

https://www.youtube.com/watch?v=DC471a9qrU4

#Programming

Low Level Learning

Chaîne YouTube Low Level Learning

https://www.youtube.com/@LowLevelLearning

#Programming

DATA STRUCTURES you MUST know (as a Software Developer)

DATA STRUCTURES you MUST know (as a Software Developer) - YouTube

https://www.youtube.com/watch?v=sVxBVvlnJsM

#Programming

Brackeys

Chaîne YouTube Brackeys

https://www.youtube.com/@Brackeys

#Programming

LLVM et les runtime modernes

LLVM et les runtime modernes - YouTube

https://www.youtube.com/watch?v=AeQzAfrxbe4

#Programming

Pyrser Selector Language par Lionel Auroux

Pyrser Selector Language par Lionel Auroux - YouTube

https://www.youtube.com/watch?v=POk5X6QGRRU

#Programming

COMMENT DEVELOPPER UN INTERPRÉTEUR ASSEMBLEUR EN GOLANG #golangtuto

COMMENT DEVELOPPER UN INTERPRÉTEUR ASSEMBLEUR EN GOLANG #golangtuto - YouTube

https://www.youtube.com/watch?v=FcTAHvmGxf8

#Programming

Créer un compilateur avec LLVM et ANTLR4

Créer un compilateur avec LLVM et ANTLR4 - YouTube

https://www.youtube.com/watch?v=2teHuAAvQeI

#Programming

LSE Week - Discovery of Pyrser - Lionel Auroux

LSE Week - Discovery of Pyrser - Lionel Auroux - YouTube

https://www.youtube.com/watch?v=FY4U2gQcoXo

#Programming

OCR with Tesseract

Utilisation de Tesseract pour l'OCR

https://nanonets.com/blog/ocr-with-tesseract/

#Programming

Docker Remove Cheatsheet

Cheat sheet pour supprimer des conteneurs Docker

https://shisho.dev/blog/posts/docker-remove-cheatsheet/

#Programming

Golang Runtime Hacking

Guide de piratage du runtime Golang

https://github.com/golang/go/blob/master/src/runtime/HACKING.md

#Programming

Les Threads en C/C++

Introduction aux threads en C/C++

https://ocamil.com/index.php/c-c/c-c-les-thread

#Programming

AI For Beginners by Microsoft

AI For Beginners par Microsoft

https://github.com/microsoft/AI-For-Beginners

#Programming

Shellcoding CTF Writeups

Writeups de CTF sur le shellcoding

https://github.com/VulnHub/ctf-writeups/blob/master/2015/ringzer0/shellcoding.md

#Programming

Nouvelle méthode de calcul matriciel en IA

Nouvelle méthode de calcul matriciel en IA

https://trustmyscience.com/intelligence-artificielle-nouvelle-methode-calcul-matriciel-acceleration-ordinateurs/

#Programming

Articles par Trust My Science

Articles par Moles sur Trust My Science

https://trustmyscience.com/author/moles/

#Programming

Python Regex sur W3Schools

Guide sur les expressions régulières en Python sur W3Schools

https://www.w3schools.com/python/python_regex.asp

#Programming

Introduction to Machine Learning

Introduction to Machine Learning - Partie 1

https://ahampriyanshu.com/blog/intro-to-ml-part-1-introduction/

#Programming

TheAlgorithms GitHub Repository

TheAlgorithms GitHub Repository

https://github.com/TheAlgorithms

#Programming

Empire Listeners Library

Bibliothèque Empire Listeners

https://github.com/EmpireProject/Empire/blob/master/lib/listeners/

#Programming

BetterTUI Python Package

Package Python BetterTUI

https://pypi.org/project/betterTUI/

#Programming

Memory Management and Garbage Collection in Python

Gestion de la mémoire et collecte des déchets en Python

https://towardsdatascience.com/memory-management-and-garbage-collection-in-python-c1cb51d1612c

#Programming

PyDoc Python Documentation

Documentation PyDoc pour Python

https://docs.python.org/fr/3/library/pydoc.html

#Programming

Z3 Playground by 0vercl0k

Z3 Playground par 0vercl0k

https://github.com/0vercl0k/z3-playground

#Programming

CryptoZombies Blockchain Course

Cours CryptoZombies sur la blockchain

https://cryptozombies.io/en/course/

#Programming

Unwrapping Rust's Errors

Décodage des erreurs de Rust

https://medium.com/swlh/unwrapping-rusts-errors-552e583e2963

#Programming

Typage en Python

Typage en Python

https://techblog.deepki.com/typage-en-python/

#Programming

Refactoring Guru

Site sur les techniques de refactoring

https://refactoring.guru/

#Programming

Rust for Noobs Course

Cours Rust pour débutants

https://training.zeropointsecurity.co.uk/courses/rust-for-n00bs

#Programming

Intel Intrinsics Guide

Guide des intrinsics Intel

https://www.intel.com/content/www/us/en/docs/intrinsics-guide/index.html

#Programming

LazyGit GitHub Repository

LazyGit GitHub Repository

https://github.com/jesseduffield/lazygit

#Programming

Offensive Rust Course

Cours Rust offensif

https://redteamsorcery.teachable.com/p/offensive-rust

#Programming

Rust Tips and Tricks by Kudaes

Rust Tips and Tricks par Kudaes

https://github.com/Kudaes/rust_tips_and_tricks

#Programming

Flask Examples by Swafox

Exemples Flask par Swafox

https://github.com/Swafox/Flask-examples

#Programming

Inox Programming Language

Langage de programmation Inox

https://github.com/inoxlang/inox

#Programming

What I've Learned About Formal Methods

Ce que j'ai appris sur les méthodes formelles

https://jakob.space/blog/what-ive-learned-about-formal-methods.html

#Programming

Mmap-Go by Edsrzf

Mmap-Go par Edsrzf

https://github.com/edsrzf/mmap-go

#Programming

Py-Tree-Sitter by Tree-Sitter

Py-Tree-Sitter par Tree-Sitter

https://github.com/tree-sitter/py-tree-sitter

#Programming

Exercism Programming Exercises

Exercices de programmation Exercism

https://exercism.org/

#Programming

Deep Dive Into Python's VM Story of Load Const Bug

Plongée profonde dans le VM de Python - Load Const Bug

https://doar-e.github.io/blog/2014/04/17/deep-dive-into-pythons-vm-story-of-load_const-bug/

#Programming

Coroutines in C

Coroutines en C

https://cyp.sh/blog/coroutines-in-c

#Programming

OS Development with Rust

Développement OS avec Rust

https://os.phil-opp.com/fr/

#Programming

Paging Introduction

Introduction à la pagination

https://os.phil-opp.com/paging-introduction/

#Programming

Writing Windows Debugger Part 2

Écriture d'un débogueur Windows - Partie 2

https://www.codeproject.com/Articles/132742/Writing-Windows-Debugger-Part-2

#Programming

Compilers Principles Techniques and Tools

Compilers: Principles, Techniques, and Tools

https://a.co/d/hUXgWDr

#Programming

LLVM Obfuscation Tutorial

Tutoriel sur l'obfuscation avec LLVM

https://github.com/quarkslab/llvm-passes/blob/master/doc/llvm_obfuscation_tutorial.rst

#Programming

j5afe GitHub Repository

j5afe GitHub Repository

https://github.com/Lexterl33t/j5afe

#Programming

Bachelor's Thesis by Marius Schulz

Bachelor's Thesis by Marius Schulz

https://github.com/mariusschulz/bachelors-thesis/blob/master/thesis.pdf

#Programming

CLOC GitHub Repository

CLOC (Count Lines of Code) GitHub Repository

https://github.com/AlDanial/cloc

#Programming

Martin Heinz Blog Post

Martin Heinz Blog Post

https://martinheinz.dev/blog/24

#Programming

Software Engineering Notes - Clean Architecture

Software Engineering Notes - Clean Architecture

https://github.com/LordNoteworthy/software-engineering-notes/blob/main/Clean-Architecture.md

#Programming

JSON Crack

JSON Crack

https://jsoncrack.com/

#Programming

Intro to C for Windows Developers - SANS Webcast

Intro to C for Windows Developers - SANS Webcast

https://www.sans.org/webcasts/intro-c-windows-devs/

#Programming

LIEF GitHub Repository

LIEF (Library to Instrument Executable Formats) GitHub Repository

https://github.com/lief-project/LIEF

#Programming

Writing a Windows Fuzzer from Scratch

Writing a Windows Fuzzer from Scratch

https://www.legacyy.xyz/vr/windows/2023/10/23/writing-a-windows-fuzzer-from-scratch.html

#Programming

Gephi GitHub Repository

Gephi (Graph Visualization and Manipulation Software) GitHub Repository

https://github.com/gephi/gephi

#Programming

Graph Databases with Neo4j

Graph Databases with Neo4j

https://www.infoq.com/fr/articles/graph-nosql-neo4j/

#Programming

Neo4rs Rust Library

Neo4rs Rust Library

https://docs.rs/neo4rs/latest/neo4rs/

#Programming

Neo4j Labs GitHub Repository

Neo4j Labs GitHub Repository

https://github.com/neo4j-labs/neo4rs

#Programming

Aura Graph Database by Neo4j

Aura Graph Database by Neo4j

https://neo4j.com/cloud/platform/aura-graph-database/?ref=nav-get-started-cta

#Programming

Raspberry Pi OS Tutorials with Rust

Raspberry Pi OS Tutorials with Rust

https://github.com/rust-embedded/rust-raspberrypi-OS-tutorials

#Programming

Binary Tree on Wikipedia

Binary Tree on Wikipedia

https://fr.wikipedia.org/wiki/Arbre_binaire

#Programming

Awesome Rust GitHub Repository

Awesome Rust GitHub Repository

https://github.com/rust-unofficial/awesome-rust

#Programming

Write a C Interpreter Tutorial

Write a C Interpreter Tutorial

https://github.com/lotabout/write-a-C-interpreter/tree/master/tutorial/en

#Programming

Compilers: Principles, Techniques, and Tools

Compilers: Principles, Techniques, and Tools

https://www.amazon.com/Compilers-Principles-Techniques-Tools-2nd/dp/0321486811

#Programming

Bell Labs on Wikipedia

Bell Labs on Wikipedia

https://fr.wikipedia.org/wiki/Laboratoires_Bell

#Programming

Sigma.js Official Website

Sigma.js Official Website

https://www.sigmajs.org/

#Programming

Learn C Programming

Learn C Programming

https://www.learn-c.org/

#Programming

Bifrost GitHub Repository

Bifrost GitHub Repository

https://github.com/its-a-feature/bifrost

#Programming

Docker Update Container on Code Change

Docker Update Container on Code Change

https://stackoverflow.com/questions/63279765/docker-how-to-update-your-container-when-your-code-changes

#Programming

Unreal Engine C++ Quick Start Guide

Unreal Engine C++ Quick Start Guide

https://docs.unrealengine.com/5.3/en-US/unreal-engine-cpp-quick-start/

#Programming

Computation Subtyping

Computation Subtyping

https://okmij.org/ftp/Computation/Subtyping/

#Programming

Blog by Daniel Lemire

Blog by Daniel Lemire

https://lemire.me/blog/2024/

#Programming

Social Engineering the Windows Kernel - James Forshaw, Google

Vidéo sur l'ingénierie sociale dans le noyau Windows

https://www.youtube.com/watch?v=eF-nJnPycXs

#Pwn

[FSOP / heap exploitation - SECCON Quals] babyfile - _IO_obstack_ju...

Vidéo sur l'exploitation de heap

https://www.youtube.com/watch?v=1xGss7qd6oA

#Pwn

Heap Overflow on iOS/Android ARM64

Vidéo sur le dépassement de tampon dans les environnements iOS/Android ARM64

https://www.youtube.com/watch?v=CmTA05bcawk

#Pwn

OffSec Club

Vidéo du club OffSec

https://youtube.com/channel/UCODQhmnWoV4Qg3KBJLwHT4Q

#Pwn

Windows kernel exploitation techniques - Adrien Garin - LSE Week 2016

Vidéo sur les techniques d'exploitation du noyau Windows

https://www.youtube.com/watch?v=f8hTwFpRphU

#Pwn

DEF CON 25 - Morten Schenk - Taking Windows 10 Kernel Exploitation ...

Vidéo sur l'exploitation du noyau Windows 10

https://www.youtube.com/watch?v=Gu_5kkErQ6Y

#Pwn

Rowhammer attacks explained simply

Explication simple des attaques Rowhammer

https://www.youtube.com/watch?v=rGaF15-ko5w

#Pwn

Temple Of Pwn 12 - Ret2DlResolve

Vidéo sur le Temple Of Pwn 12 - Ret2DlResolve

https://www.youtube.com/watch?v=6qMabyX0yPw

#Pwn

Heap BINARY EXPLOITATION w/ Matt E!

Vidéo sur l'exploitation binaire de heap avec Matt E!

https://www.youtube.com/watch?v=Im1SqwOVsEQ

#Pwn

Intro to Heap Exploitation

Introduction à l'exploitation de heap

https://www.youtube.com/watch?v=nnF4Avttbns

#Pwn

Binary exploitation : The raiders of the lost chunk - Thomas DUBIER

Exploitation binaire : Les raiders du chunk perdu par Thomas DUBIER

https://www.youtube.com/watch?v=zcLQ4YrgfNQ

#Pwn

Race Conditions and Time of Check to Time of Use TOCTTOU Vulnerabil...

Conditions de course et vulnérabilité Time of Check to Time of Use (TOCTTOU)

https://www.youtube.com/watch?v=PH73lpG2B1M

#Pwn

Heap Exploitation

Exploitation de heap

https://www.youtube.com/watch?v=A-Qf_Q_AeFw

#Pwn

Using Seccomp to Limit the Kernel Attack Surface - Michael Kerrisk

Utilisation de Seccomp pour limiter la surface d'attaque du noyau

https://www.youtube.com/watch?v=q6n4Q3lgjSA

#Pwn

Qu'est ce que le ROP (Return Oriented Programming) ?

Explication sur le ROP (Return Oriented Programming)

https://www.youtube.com/watch?v=zRI8diZTEB0

#Pwn

Exploitation binaire - Heap-Based Partie 2 - Double free

Exploitation binaire - Heap-Based Partie 2 - Double free

https://www.youtube.com/watch?v=NTSiUtzbWQs

#Pwn

Buffer Overflows Part 5 - Heap Overflow Basics

Introduction aux bases du dépassement de tampon de heap

https://www.youtube.com/watch?v=LsA-bYhPS6s

#Pwn

Billy Ellis

Chaîne de Billy Ellis

https://www.youtube.com/c/BillyEllis/videos

#Pwn

Stack Frames (System V AMD64 ABI)

Cadres de pile (System V AMD64 ABI)

https://www.youtube.com/watch?v=JO6GkjJvkTk

#Pwn

My little pwnie | Découverte de pwntools - switch & masterfox

Découverte de pwntools avec switch & masterfox

https://www.youtube.com/watch?v=y5gsiVjfPHg

#Pwn

Glibc Heap Exploitation for fun and profit

Exploitation de heap Glibc pour le plaisir et le profit

https://www.youtube.com/watch?v=U7EwhCQBRZM

#Pwn

[Live] A basic Heap Feng Shui intro - 33c3ctf babyfengshui (pwn 150)

Introduction basique à Heap Feng Shui

https://www.youtube.com/watch?v=zWgS6fTw4Ts

#Pwn

Pwn - Binary exploitation

Exploitation binaire Pwn

https://www.youtube.com/playlist?list=PL1-BhNrIYWnm3HK-8PBL-qhHwWjI-mjb8

#Pwn

1, 2, 3, PWNED ! - Louka Jacques-Chevallier

1, 2, 3, PWNED ! par Louka Jacques-Chevallier

https://www.youtube.com/watch?v=hmt8M9YLwTg

#Pwn

Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges

Exploitation de la faille DRAM Rowhammer pour obtenir des privilèges noyau

https://www.youtube.com/watch?v=0U7511Fb4to

#Pwn

Finding Buffer Overflow with Fuzzing

Trouver le dépassement de tampon avec le fuzzing

https://www.youtube.com/watch?v=Do1Ri8TCF0Q

#Pwn

François Boisson : Buffer Overflow ou explication de «une faille d...

François Boisson : Buffer Overflow ou explication de «une faille d...

https://www.youtube.com/watch?v=u-OZQkv2ebw&start=1s

#Pwn

Exploitation binaire - Buffer overflow Heap Based partie 1

Exploitation binaire - Buffer overflow Heap Based partie 1

https://www.youtube.com/watch?v=PFqEKkj7wWs

#Pwn

Information & Systems Security Society

Société de sécurité de l'information et des systèmes

https://youtube.com/channel/UCofdfNbVHmhmYhSQriJhLag

#Pwn

37C3 - Operation Triangulation: What You Get When Attack iPhones o...

37C3 - Operation Triangulation: What You Get When Attack iPhones o...

https://www.youtube.com/watch?v=1f6YyH62jFE

#Pwn

The Heap: what does malloc() do? - bin 0x14

The Heap: what does malloc() do? - bin 0x14

https://www.youtube.com/watch?v=HPDBOhiKaD8

#Pwn

HEXACON2022 - Life and death of an iOS attacker by Luca Todesco

HEXACON2022 - Life and death of an iOS attacker by Luca Todesco

https://www.youtube.com/watch?v=8mQAYeozl5I

#Pwn

Blind Buffer Overflow exploitation to leak secret data - rhme2 Anim...

Blind Buffer Overflow exploitation to leak secret data - rhme2 Anim...

https://www.youtube.com/watch?v=SstD1O4_kwc

#Pwn

Row Hammer: Flipping Bits in Memory Without Accessing Them - Papers...

Flipping Bits in Memory Without Accessing Them - Papers...

https://www.youtube.com/watch?v=1iBpLhFN_OA

#Pwn

The Heap: How do use-after-free exploits work? - bin 0x16

How do use-after-free exploits work? - bin 0x16

https://www.youtube.com/watch?v=ZHghwsTRyzQ

#Pwn

28c3: String Oriented Programming

String Oriented Programming

https://www.youtube.com/watch?v=DvtBCSYwTiA

#Pwn

[FCSC 2021 - Blind Date] Write Up - Blind rop

Write Up - Blind rop

https://www.youtube.com/watch?v=pGOGITkVzuM

#Pwn

Kernel Exploitation

Kernel Exploitation

https://www.youtube.com/watch?v=HtdriW7KVNE

#Pwn

Qu'est ce que le Heap Spray ?

Qu'est ce que le Heap Spray ?

https://www.youtube.com/watch?v=woKGxIrKFBc

#Pwn

Hacking Livestream #25: Blind ROP

Hacking Livestream #25: Blind ROP

https://www.youtube.com/watch?v=OAk23u9b-88

#Pwn

Reverse Engineering #0 - Reverse un programme (cracking dynamique a...

Reverse Engineering #0 - Reverse un programme (cracking dynamique a...

https://www.youtube.com/watch?v=kyq4V3UtA5w

#Pwn

Pwn - Bypass NX/ASLR via leak de la libc

Bypass NX/ASLR via leak de la libc

https://www.youtube.com/watch?v=8skdPGCEuxE

#Pwn

Browser Exploitation

Browser Exploitation

https://youtube.com/playlist?list=PLhixgUqwRTjwufDsT1ntgOY9yjZgg5H_t

#Pwn

Browser Exploitation - Max Zinkus

Browser Exploitation - Max Zinkus

https://www.youtube.com/watch?v=3szZpS58Dqg

#Pwn

OCR with Tesseract - NanoNets Blog

OCR with Tesseract - NanoNets Blog

https://nanonets.com/blog/ocr-with-tesseract/

#Pwn

Docker Remove Cheatsheet

Docker Remove Cheatsheet

https://shisho.dev/blog/posts/docker-remove-cheatsheet/

#Pwn

Go Runtime Hacking

Go Runtime Hacking

https://github.com/golang/go/blob/master/src/runtime/HACKING.md

#Pwn

C/C++ Les Thread - Ocamil

C/C++ Les Thread - Ocamil

https://ocamil.com/index.php/c-c/c-c-les-thread

#Pwn

AI For Beginners - Microsoft

AI For Beginners - Microsoft

https://github.com/microsoft/AI-For-Beginners

#Pwn

Nouvelle Méthode Calcul Matriciel - Trust My Science

Nouvelle Méthode Calcul Matriciel - Trust My Science

https://trustmyscience.com/intelligence-artificielle-nouvelle-methode-calcul-matriciel-acceleration-ordinateurs/

#Pwn

Auteur Moles - Trust My Science

Auteur Moles - Trust My Science

https://trustmyscience.com/author/moles/

#Pwn

Python Regex - W3Schools

Python Regex - W3Schools

https://www.w3schools.com/python/python_regex.asp

#Pwn

Introduction to Machine Learning - Ahampriyanshu

Introduction to Machine Learning - Ahampriyanshu

https://ahampriyanshu.com/blog/intro-to-ml-part-1-introduction/

#Pwn

The Algorithms

The Algorithms

https://github.com/TheAlgorithms

#Pwn

betterTUI

betterTUI

https://pypi.org/project/betterTUI/

#Pwn

Memory Management in Python

Memory Management in Python

https://towardsdatascience.com/memory-management-and-garbage-collection-in-python-c1cb51d1612c

#Pwn

Z3 Playground

Z3 Playground

https://github.com/0vercl0k/z3-playground

#Pwn

CryptoZombies

CryptoZombies

https://cryptozombies.io/en/course/

#Pwn

Martin Heinz Blog

Martin Heinz Blog

https://martinheinz.dev/blog/24

#Pwn

JSON Crack

JSON Crack

https://jsoncrack.com/

#Pwn

Intro to C for Windows Devs

Intro to C for Windows Devs

https://www.sans.org/webcasts/intro-c-windows-devs/

#Pwn

LIEF Project

LIEF Project

https://github.com/lief-project/LIEF

#Pwn

Writing a Windows Fuzzer from Scratch

Writing a Windows Fuzzer from Scratch

https://www.legacyy.xyz/vr/windows/2023/10/23/writing-a-windows-fuzzer-from-scratch.html

#Pwn

Graph NoSQL - Neo4j

Graph NoSQL - Neo4j

https://www.infoq.com/fr/articles/graph-nosql-neo4j/

#Pwn

Neo4j Aura Graph Database

Neo4j Aura Graph Database

https://neo4j.com/cloud/platform/aura-graph-database/?ref=nav-get-started-cta

#Pwn

Raspberry Pi OS Tutorials

Raspberry Pi OS Tutorials

https://github.com/rust-embedded/rust-raspberrypi-OS-tutorials

#Pwn

Binary Tree - Wikipedia FR

Binary Tree - Wikipedia FR

https://fr.wikipedia.org/wiki/Arbre_binaire

#Pwn

Awesome Rust

Awesome Rust

https://github.com/rust-unofficial/awesome-rust

#Pwn

Write a C Interpreter

Write a C Interpreter

https://github.com/lotabout/write-a-C-interpreter/tree/master/tutorial/en

#Pwn

Compilers: Principles, Techniques, and Tools

Compilers: Principles, Techniques, and Tools

https://www.amazon.com/Compilers-Principles-Techniques-Tools-2nd/dp/0321486811

#Pwn

Bell Labs - Wikipedia FR

Bell Labs - Wikipedia FR

https://fr.wikipedia.org/wiki/Laboratoires_Bell

#Pwn

SigmaJS

SigmaJS

https://www.sigmajs.org/

#Pwn

Learn C

Learn C

https://www.learn-c.org/

#Pwn

Docker Update Container on Code Change

Docker Update Container on Code Change

https://stackoverflow.com/questions/63279765/docker-how-to-update-your-container-when-your-code-changes

#Pwn

Unreal Engine C++ Quick Start

Unreal Engine C++ Quick Start

https://docs.unrealengine.com/5.3/en-US/unreal-engine-cpp-quick-start/

#Pwn

Subtyping in C23

Subtyping in C23

https://okmij.org/ftp/Computation/Subtyping/

#Pwn

C23: A Slightly Better C

C23: A Slightly Better C

https://lemire.me/blog/2024/01/21/c23-a-slightly-better-c/

#Pwn

Author: Daniel Lemire

Author: Daniel Lemire

https://lemire.me/blog/author/lemire/

#Pwn

LVGL Monthly Newsletter

LVGL Monthly Newsletter

https://blog.lvgl.io/2024-01-23/monthly-newsletter

#Pwn

You Probably Don't Need to Learn C

You Probably Don't Need to Learn C

https://nedbatchelder.com/blog/202401/you_probably_dont_need_to_learn_c.html

#Pwn

SpaceVim

SpaceVim

https://spacevim.org/

#Pwn

Astronvim

Astronvim

https://astronvim.com/

#Pwn

Lord of the Ring0 Part 1

Lord of the Ring0 Part 1

https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html

#Pwn

Slint

Slint

https://slint.dev/

#Pwn

Z3 Guide - Microsoft

Z3 Guide - Microsoft

https://microsoft.github.io/z3guide/

#Pwn

How do use-after-free exploits work? - bin 0x16

How do use-after-free exploits work? - bin 0x16

https://www.youtube.com/watch?v=ZHghwsTRyzQ

#Pwn

The Heap: How does malloc() work? - bin 0x14

The Heap: How does malloc() work? - bin 0x14

https://www.youtube.com/watch?v=HPDBOhiKaD8

#Pwn

Optimize Python

Optimize Python - Lightender Blog

https://blog.lightender.fr/articles/optimizePython

#Pwn

BROP-102 - Oddcoder

BROP-102 - Oddcoder

https://oddcoder.com/BROP-102/

#Pwn

Guy in a Tuxedo

Guy in a Tuxedo

https://guyinatuxedo.github.io/index.html

#Pwn

Null Byte Poisoning - 0x00sec

Null Byte Poisoning - 0x00sec

https://0x00sec.org/t/null-byte-poisoning-the-magic-byte/3874

#Pwn

Signal Oriented Programming - Development

Signal Oriented Programming - Development

https://devel0pment.de/?p=688

#Pwn

Author 1 - Development

Author 1 - Development

https://devel0pment.de/?author=1

#Pwn

Pwn College

Pwn College

https://pwn.college/

#Pwn

Pwn Adventure

Pwn Adventure

https://www.pwnadventure.com/

#Pwn

ROPemporium

ROPemporium

https://github.com/0xSoEasY/ROPemporium

#Pwn

Finding Badchars

Finding Badchars

https://github.com/Snifer/Finding-Badchars/

#Pwn

Zero to Hero

Zero to Hero

https://r4j.dev/zero-to-hero.html

#Pwn

The Heap: How do use-after-free exploits work? - bin 0x16

The Heap: How do use-after-free exploits work? - bin 0x16

https://www.youtube.com/watch?v=ZHghwsTRyzQ

#Pwn

Browser Exploitation

Browser Exploitation

https://www.youtube.com/watch?v=HPDBOhiKaD8

#Pwn

Introduction to the Heap

Introduction to the Heap - Ir0nstone

https://ir0nstone.gitbook.io/notes/types/heap/introduction-to-the-heap

#Pwn

Heap-Based Buffer Overflow

Heap-Based Buffer Overflow

https://www.0x0ff.info/2014/heap-based-buffer-overflow/

#Pwn

Linux Heap Exploitation - Sensepost

Linux Heap Exploitation - Sensepost

https://sensepost.com/blog/2018/linux-heap-exploitation-intro-series-set-you-free-part-1/

#Pwn

Signal Oriented Programming - Development

Signal Oriented Programming - Development

https://devel0pment.de/?p=688

#Pwn

Author 1 - Development

Author 1 - Development

https://devel0pment.de/?author=1

#Pwn

Return-Oriented Programming (ROP) - InfoSecFrench

Return-Oriented Programming (ROP) - InfoSecFrench

https://www.youtube.com/watch?v=Do1Ri8TCF0Q

#Pwn

Linux Heap Exploitation

Linux Heap Exploitation

https://courseupload.com/linux-heap-exploitation-200321/

#Pwn

Sypro - Courseupload

Sypro - Courseupload

https://courseupload.com/author/sypro/

#Pwn

Heap Exploitation

Heap Exploitation

https://heap-exploitation.dhavalkapil.com/

#Pwn

How to Heap

How to Heap

http://blog.fxiao.me/how-to-heap/

#Pwn

PicoCTF 2019 Heap Challenges

PicoCTF 2019 Heap Challenges

https://faraz.faith/2019-10-12-picoctf-2019-heap-challs/

#Pwn

Signal-Oriented Programming - Stormshield

Signal-Oriented Programming - Stormshield

https://thisissecurity.stormshield.com/2015/01/03/playing-with-signals-an-overview-on-sigreturn-oriented-programming/

#Pwn

Mehdi Talbi - Stormshield

Mehdi Talbi - Stormshield

https://thisissecurity.stormshield.com/author/mehditalbi/

#Pwn

Awesome Browser Exploit

Awesome Browser Exploit

https://github.com/Escapingbug/awesome-browser-exploit

#Pwn

Browser Exploitation

Browser Exploitation

https://www.youtube.com/watch?v=nnF4Avttbns

#Pwn

Binary Exploitation - Welchbj

Binary Exploitation - Welchbj

https://github.com/welchbj/ctf/blob/master/docs/binary-exploitation.md

#Pwn

Linux/Unix Privilege Escalation - HackTricks

Linux/Unix Privilege Escalation - HackTricks

https://book.hacktricks.xyz/linux-unix/privilege-escalation/seccomp

#Pwn

Google Project Zero

Google Project Zero

https://googleprojectzero.blogspot.com/

#Pwn

Getting into Browser Exploitation

Getting into Browser Exploitation

https://liveoverflow.com/getting-into-browser-exploitation-new-series-introduction-browser-0x00/

#Pwn

Shellcoding Cheatsheet - Sec4Us

Shellcoding Cheatsheet - Sec4Us

https://sec4us.com.br/cheatsheet/shellcoding

#Pwn

PBCTF 2021 Nightclub Writeup

PBCTF 2021 Nightclub Writeup

https://www.willsroot.io/2021/10/pbctf-2021-nightclub-writeup-more-fun.html

#Pwn

FILE Structure Exploitation

FILE Structure Exploitation - Perfect Blue Blog

https://blog.perfect.blue/FILE-Structure-Exploitation/

#Pwn

Browser Exploitation

Browser Exploitation - Connor McGarr

https://connormcgarr.github.io/browser1/

#Pwn

HackSys Extreme Vulnerable Driver

HackSys Extreme Vulnerable Driver - GitHub

https://github.com/hacksysteam/HackSysExtremeVulnerableDriver

#Pwn

Corelan

Corelan

https://www.corelan.be/

#Pwn

Memory Corruption

Memory Corruption - HackMD

https://hackmd.io/@express/HkXgZJFe9

#Pwn

Stack Buffer Overflow

Stack Buffer Overflow - HackMD

https://hackmd.io/DTa_wd3aSo2WDXrFfLyuDg

#Pwn

Heap Exploitation

Heap Exploitation

https://heap-exploitation.dhavalkapil.com/

#Pwn

ROP Exploitation

ROP Exploitation - HackMD

https://hackmd.io/ShdZvRpwROO6NRuNGe2phA?view

#Pwn

Buffer Overflow Guide

Buffer Overflow Guide - Alomancy

https://alomancy.gitbook.io/guides/guides/bof

#Pwn

Stack Buffer Overflow - Complete Guide

Complete Guide to Stack Buffer Overflow - Steflan Security

https://steflan-security.com/complete-guide-to-stack-buffer-overflow-oscp/

#Pwn

Stefano Lanaro

Stefano Lanaro - Steflan Security

https://steflan-security.com/author/stefano-lanaro96/

#Pwn

Heap Exploitation Video

Heap Exploitation Video - Tenor

https://media.tenor.co/videos/52d59aa7bbbb13d7e964f0267c618fb8/mp4

#Pwn

Heap Exploitation

Heap Exploitation

https://heap-exploitation.dhavalkapil.com/

#Pwn

Browser Exploitation Video

Browser Exploitation Video

https://www.youtube.com/watch?v=kyq4V3UtA5w

#Pwn

Browser Exploitation Channel

Browser Exploitation Channel - InfoSec

https://www.youtube.com/channel/UC7iUQz7WRKyJFn6p51tJwfQ

#Pwn

x86 Assembly

x86 Assembly - C9X

https://c9x.me/x86/

#Pwn

RET2 Blog

RET2 Blog - ret2.io

https://blog.ret2.io/

#Pwn

ret2dl_resolve

ret2dl_resolve - Syst3mFailure

https://syst3mfailure.io/ret2dl_resolve

#Pwn

Understanding GLIBC Malloc

Understanding GLIBC Malloc - SploitFun

https://sploitfun.wordpress.com/2015/02/10/understanding-glibc-malloc/

#Pwn

Hacking Book

Hacking Book - No Starch Press

https://nostarch.com/hacking2.htm

#Pwn

Race Condition

Race Condition - Veracode

https://www.veracode.com/security/race-condition

#Pwn

Write-Ups

Write-Ups - nobodyisnobody

https://github.com/nobodyisnobody/write-ups

#Pwn

Safe Linking Mitigation

Safe Linking Mitigation - Research Innovations

https://www.researchinnovations.com/post/bypassing-the-upcoming-safe-linking-mitigation

#Pwn

Tweet - Podalirius

Tweet - Podalirius

https://twitter.com/podalirius_/status/1433367842582405122

#Pwn

Twitter - Podalirius

Twitter - Podalirius

https://twitter.com/podalirius_

#Pwn

Null Pointer Bypass

Null Pointer Bypass - cr0 Blog

https://blog.cr0.org/2009/06/bypassing-linux-null-pointer.html

#Pwn

NES Console Writing

NES Console Writing - Copetti

https://www.copetti.org/writings/consoles/nes/

#Pwn

Console Writings

Console Writings - Copetti

https://www.copetti.org/writings/consoles/

#Pwn

Dropping SUID Rights in Shellcodes

Dropping SUID Rights in Shellcodes - Podalirius

https://podalirius.net/fr/articles/unix-shells-dropping-suid-rights-in-shellcodes/

#Pwn

Writing Your First Shellcode

Writing Your First Shellcode - Zeste de Savoir

https://zestedesavoir.com/articles/158/ecrivez-votre-premier-shellcode-en-asm-x86/

#Pwn

SMEP Bypass Techniques

SMEP Bypass Techniques - Vitaly Nikolenko

https://fr.slideshare.net/VitalyNikolenko/linux-smep-bypass-techniques

#Pwn

Modern Binary Exploitation

Modern Binary Exploitation - RPISEC

https://github.com/RPISEC/MBE

#Pwn

Hardened Flag Store

Hardened Flag Store - Bruce30262

https://bruce30262.github.io/hxp-CTF-2017-hardened-flag-store/

#Pwn

Linux/Unix Privilege Escalation

Linux/Unix Privilege Escalation - HackTricks

https://book.hacktricks.xyz/linux-unix/privilege-escalation/seccomp

#Pwn

ROPing on Aarch64

ROPing on Aarch64 - Perfect Blue Blog

https://blog.perfect.blue/ROPing-on-Aarch64

#Pwn

FILE Structure Exploitation

FILE Structure Exploitation - Dhaval Kapil

https://dhavalkapil.com/blogs/FILE-Structure-Exploitation/

#Pwn

Tweet - CyberWarship

Tweet - CyberWarship

https://twitter.com/CyberWarship/status/1455545245513527298/photo/1

#Pwn

FILE Structure Exploitation

FILE Structure Exploitation - Perfect Blue Blog

https://blog.perfect.blue/FILE-Structure-Exploitation/

#Pwn

Browser Exploitation

Browser Exploitation - Connor McGarr

https://connormcgarr.github.io/browser1/

#Pwn

HackSys Extreme Vulnerable Driver

HackSys Extreme Vulnerable Driver - GitHub

https://github.com/hacksysteam/HackSysExtremeVulnerableDriver

#Pwn

Corelan

Corelan

https://www.corelan.be/

#Pwn

Memory Corruption

Memory Corruption - HackMD

https://hackmd.io/@express/HkXgZJFe9

#Pwn

Stack Buffer Overflow

Stack Buffer Overflow - HackMD

https://hackmd.io/DTa_wd3aSo2WDXrFfLyuDg

#Pwn

Heap Exploitation

Heap Exploitation

https://heap-exploitation.dhavalkapil.com/

#Pwn

ROP Exploitation

ROP Exploitation - HackMD

https://hackmd.io/ShdZvRpwROO6NRuNGe2phA?view

#Pwn

Buffer Overflow Guide

Buffer Overflow Guide - Alomancy

https://alomancy.gitbook.io/guides/guides/bof

#Pwn

Stack Buffer Overflow - Complete Guide

Complete Guide to Stack Buffer Overflow - Steflan Security

https://steflan-security.com/complete-guide-to-stack-buffer-overflow-oscp/

#Pwn

Stefano Lanaro

Stefano Lanaro - Steflan Security

https://steflan-security.com/author/stefano-lanaro96/

#Pwn

Heap Exploitation Video

Heap Exploitation Video - Tenor

https://media.tenor.co/videos/52d59aa7bbbb13d7e964f0267c618fb8/mp4

#Pwn

Heap Exploitation

Heap Exploitation

https://heap-exploitation.dhavalkapil.com/

#Pwn

Browser Exploitation Video

Browser Exploitation Video

https://www.youtube.com/watch?v=kyq4V3UtA5w

#Pwn

Browser Exploitation Channel

Browser Exploitation Channel - InfoSec

https://www.youtube.com/channel/UC7iUQz7WRKyJFn6p51tJwfQ

#Pwn

x86 Assembly

x86 Assembly - C9X

https://c9x.me/x86/

#Pwn

RET2 Blog

RET2 Blog - ret2.io

https://blog.ret2.io/

#Pwn

ret2dl_resolve

ret2dl_resolve - Syst3mFailure

https://syst3mfailure.io/ret2dl_resolve

#Pwn

Understanding GLIBC Malloc

Understanding GLIBC Malloc - SploitFun

https://sploitfun.wordpress.com/2015/02/10/understanding-glibc-malloc/

#Pwn

Hacking Book

Hacking Book - No Starch Press

https://nostarch.com/hacking2.htm

#Pwn

Race Condition

Race Condition - Veracode

https://www.veracode.com/security/race-condition

#Pwn

Write-Ups

Write-Ups - nobodyisnobody

https://github.com/nobodyisnobody/write-ups

#Pwn

Safe Linking Mitigation

Safe Linking Mitigation - Research Innovations

https://www.researchinnovations.com/post/bypassing-the-upcoming-safe-linking-mitigation

#Pwn

Tweet - Podalirius

Tweet - Podalirius

https://twitter.com/podalirius_/status/1433367842582405122

#Pwn

Twitter - Podalirius

Twitter - Podalirius

https://twitter.com/podalirius_

#Pwn

Null Pointer Bypass

Null Pointer Bypass - cr0 Blog

https://blog.cr0.org/2009/06/bypassing-linux-null-pointer.html

#Pwn

NES Console Writing

NES Console Writing - Copetti

https://www.copetti.org/writings/consoles/nes/

#Pwn

Console Writings

Console Writings - Copetti

https://www.copetti.org/writings/consoles/

#Pwn

Dropping SUID Rights in Shellcodes

Dropping SUID Rights in Shellcodes - Podalirius

https://podalirius.net/fr/articles/unix-shells-dropping-suid-rights-in-shellcodes/

#Pwn

Writing Your First Shellcode

Writing Your First Shellcode - Zeste de Savoir

https://zestedesavoir.com/articles/158/ecrivez-votre-premier-shellcode-en-asm-x86/

#Pwn

SMEP Bypass Techniques

SMEP Bypass Techniques - Vitaly Nikolenko

https://fr.slideshare.net/VitalyNikolenko/linux-smep-bypass-techniques

#Pwn

Modern Binary Exploitation

Modern Binary Exploitation - RPISEC

https://github.com/RPISEC/MBE

#Pwn

Hardened Flag Store

Hardened Flag Store - Bruce30262

https://bruce30262.github.io/hxp-CTF-2017-hardened-flag-store/

#Pwn

Linux/Unix Privilege Escalation

Linux/Unix Privilege Escalation - HackTricks

https://book.hacktricks.xyz/linux-unix/privilege-escalation/seccomp

#Pwn

ROPing on Aarch64

ROPing on Aarch64 - Perfect Blue Blog

https://blog.perfect.blue/ROPing-on-Aarch64

#Pwn

FILE Structure Exploitation

FILE Structure Exploitation - Dhaval Kapil

https://dhavalkapil.com/blogs/FILE-Structure-Exploitation/

#Pwn

Tweet - CyberWarship

Tweet - CyberWarship

https://twitter.com/CyberWarship/status/1455545245513527298/photo/1

#Pwn

Kernel Setup

Kernel Setup - Rootkits

https://rootkits.xyz/blog/2017/06/kernel-setting-up/

#Pwn

Linux Kernel Pwn Basics

Linux Kernel Pwn Basics - MEM2019

https://mem2019.github.io/jekyll/update/2019/01/11/Linux-Kernel-Pwn-Basics.html

#Pwn

ROPUTILS

ROPUTILS - inaz2

https://github.com/inaz2/roputils/

#Pwn

CCSC 2021 Writeups

CCSC 2021 Writeups - Csotiriou

https://blog.csotiriou.com/post/ccsc-2021-writeups/

#Pwn

Thalium Blog

Thalium Blog

https://thalium.github.io/blog/

#Pwn

Format String Attack

Format String Attack - OWASP

https://owasp.org/www-community/attacks/Format_string_attack

#Pwn

Exploit Papers

Exploit Papers - Exploit-DB

https://www.exploit-db.com/papers/23985

#Pwn

Exploiting DRAM Rowhammer Bug

Exploiting DRAM Rowhammer Bug - Google Project Zero

https://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html

#Pwn

Rowhammer Overview

Rowhammer Overview - Daily Security

https://www.dailysecurity.fr/rowhammer/

#Pwn

Rampage Attack Explained

Rampage Attack Explained - Cyber.tn

https://cyber.tn/rampage-attack-explained-exploiting-rowhammer-on-android-again/

#Pwn

Rowhammering

Rowhammering - Hammertux

https://github.com/hammertux/rowhammering

#Pwn

FCSC 2020 Writeups

FCSC 2020 Writeups - GW3L

https://github.com/gw3l/FCSC-2020-Writeups/blob/master/HelloRootkitty.md

#Pwn

Write-Ups

Write-Ups - nobodyisnobody

https://github.com/nobodyisnobody/write-ups

#Pwn

Exploit Mitigations Disabled

Exploit Mitigations Disabled - red0xff

https://red0xff.github.io/posts/when_exploit_mitigations_are_disabled_on_modern_systems/

#Pwn

Hello Rootkitty

Hello Rootkitty - Hug0 Vincent

https://hug0vincent.github.io/2020/05/hello-rootkitty/

#Pwn

Sandsifter

Sandsifter - xoreaxeaxeax

https://github.com/xoreaxeaxeax/sandsifter

#Pwn

Seccomp Tools

Seccomp Tools - david942j

https://github.com/david942j/seccomp-tools

#Pwn

TokyoWesterns CTF 2018

TokyoWesterns CTF 2018 Write-Up - david942j

https://david942j.blogspot.com/2018/09/write-up-tokyowesterns-ctf-2018.html

#Pwn

Exploit Courses

Exploit Courses

https://exploit.courses/

#Pwn

Linux Kernel Exploitation

Linux Kernel Exploitation - xairy

https://github.com/xairy/linux-kernel-exploitation

#Pwn

Exploitation Video

Exploitation Video

https://www.youtube.com/watch?v=y5gsiVjfPHg

#Pwn

ROPStar

ROPStar - XCT

https://github.com/xct/ropstar

#Pwn

Azeria Labs Cheatsheet

Azeria Labs Cheatsheet

https://azeria-labs.com/downloads/cheatsheetv1.1-1920x1080.png

#Pwn

Nightmare

Nightmare - Guy in a Tuxedo

https://github.com/guyinatuxedo/nightmare

#Pwn

Ret2ZP

Ret2ZP - Attify Blog

https://blog.attify.com/demystifying-ret2zp/

#Pwn

Windows Memory Corruption Exploits Part I

Windows Memory Corruption Exploits Part I - CyberArk

https://www.cyberark.com/resources/threat-research-blog/a-modern-exploration-of-windows-memory-corruption-exploits-part-i-stack-overflows

#Pwn

Fuzzy Security Tutorials

Fuzzy Security Tutorials

https://www.fuzzysecurity.com/tutorials.html

#Pwn

Linux Kernel Pwn

Linux Kernel Pwn - Efiens Blog

https://blog.efiens.com/post/midas/linux-kernel-pwn-modprobe/

#Pwn

Exploitation Video

Exploitation Video

https://www.youtube.com/watch?v=Gu_5kkErQ6Y

#Pwn

Exploitation Video

Exploitation Video

https://www.youtube.com/watch?v=eF-nJnPycXs

#Pwn

Binary Function Analysis

Binary Function Analysis - Quarkslab

https://blog.quarkslab.com/weisfeiler-lehman-graph-kernel-for-binary-function-analysis.html

#Pwn

UAF Mitigation and Bypass

UAF Mitigation and Bypass - Yumpu

https://www.yumpu.com/en/document/read/35526819/demott-uaf-migitation-and-bypass/64

#Pwn

Vergilius Project

Vergilius Project

https://www.vergiliusproject.com/

#Pwn

Browser Exploitation

Browser Exploitation - Connor McGarr

https://connormcgarr.github.io/browser1/

#Pwn

HackSys Extreme Vulnerable Driver

HackSys Extreme Vulnerable Driver - GitHub

https://github.com/hacksysteam/HackSysExtremeVulnerableDriver

#Pwn

Corelan

Corelan

https://www.corelan.be/

#Pwn

Memory Corruption

Memory Corruption - HackMD

https://hackmd.io/@express/HkXgZJFe9

#Pwn

Heap Exploitation

Heap Exploitation

https://heap-exploitation.dhavalkapil.com/

#Pwn

ROP Exploitation

ROP Exploitation - HackMD

https://hackmd.io/ShdZvRpwROO6NRuNGe2phA?view

#Pwn

Buffer Overflow Guide

Buffer Overflow Guide - Alomancy

https://alomancy.gitbook.io/guides/guides/bof

#Pwn

Stack Buffer Overflow - Complete Guide

Complete Guide to Stack Buffer Overflow - Steflan Security

https://steflan-security.com/complete-guide-to-stack-buffer-overflow-oscp/

#Pwn

Archives

Archives - Etenal.me

https://etenal.me/archives/1825

#Pwn

Splitmind

Splitmind - Jerdna Regeiz

https://github.com/jerdna-regeiz/splitmind

#Pwn

Linux Insides Theory

Linux Insides Theory - 0xAX

https://0xax.gitbooks.io/linux-insides/content/Theory/linux-theory-1.html

#Pwn

GDB Debugging Guide

GDB Debugging Guide - anvbis

https://gist.github.com/anvbis/64907e4f90974c4bdd930baeb705dedf

#Pwn

Rappel

Rappel - YRP604

https://github.com/yrp604/rappel

#Pwn

Source Engine RCE

Source Engine RCE - Secret Club

https://secret.club/2021/05/13/source-engine-rce-join.html

#Pwn

Linux Insides Theory

Linux Insides Theory - 0xAX

https://0xax.gitbooks.io/linux-insides/content/Theory/linux-theory-1.html

#Pwn

Decomp2Dbg

Decomp2Dbg - Mahaloz

https://github.com/mahaloz/decomp2dbg

#Pwn

TempleOfPwn Exploit

TempleOfPwn Exploit - GitHub

https://github.com/LMS57/TempleOfPwn/blob/main/fsop/exploit.py

#Pwn

Format Strings GOT Overwrite

Format Strings GOT Overwrite - Ret2ROP Blog

https://ret2rop.blogspot.com/2018/10/format-strings-got-overwrite-remote.html?m=1

#Pwn

RP Tool

RP Tool - GitHub

https://github.com/0vercl0k/rp

#Pwn

Exploitation Stack Buffer Overflow

Exploitation Stack Buffer Overflow - Zenika Blog

https://blog.zenika.com/2021/02/22/exploitation-stack-buffer-overflow-blind-return-oriented-programming/amp/

#Pwn

Pwn Adventure

Pwn Adventure

https://www.pwnadventure.com/

#Pwn

Memory Corruption Without Corruption

Memory Corruption Without Corruption - GitHub Blog

https://github.blog/2022-07-27-corrupting-memory-without-memory-corruption/

#Pwn

SLUB Refresher

SLUB Refresher - Paolo Monti

https://github.com/PaoloMonti42/salt/blob/master/docs/0x00_SLUB_refresher.md

#Pwn

Heap Overflow Study

Heap Overflow Study - Samsung KSPP

https://samsung.github.io/kspp-study/heap-ovfl.html

#Pwn

Pwn Browser

Pwn Browser

https://pwn.browser.rip/

#Pwn

Exploit Development

Exploit Development - Devel0pment

https://devel0pment.de/?p=688

#Pwn

CTF Writeup

CTF Writeup - CTFtime

https://ctftime.org/writeup/34827

#Pwn

Braindead Buffer Overflow Guide

Braindead Buffer Overflow Guide - Boschko

https://boschko.ca/braindead-buffer-overflow-guide-to-pass-the-oscp-blindfolded/

#Pwn

Linux Kernel Exploitation CTF

Linux Kernel Exploitation CTF - 0x434b

https://0x434b.dev/dabbling-with-linux-kernel-exploitation-ctf-challenges-to-learn

#Pwn

FCSC 2022 Writeup

FCSC 2022 Writeup - Voydstack

https://github.com/voydstack/FCSC2022/blob/main/pwn/formatage/README.md

#Pwn

Learning Browser Exploitation

Learning Browser Exploitation - Bruce30262

https://bruce30262.github.io/Learning-browser-exploitation-via-33C3-CTF-feuerfuchs-challenge/

#Pwn

Paracosme

Paracosme - 0vercl0k

https://github.com/0vercl0k/paracosme

#Pwn

Villoc

Villoc - GitHub

https://github.com/wapiflapi/villoc

#Pwn

GEF Extras

GEF Extras - Hugsy

https://github.com/hugsy/gef-extras

#Pwn

Linux Source Scripts

Linux Source Scripts - Elixir

https://elixir.bootlin.com/linux/latest/source/scripts

#Pwn

Linux Kernel Blog

Linux Kernel Blog - Guillaume Gomez

https://blog.guillaume-gomez.fr/Linux-kernel/1/1

#Pwn

StarCTF OOB V8

StarCTF OOB V8 - Faraz Faiz

https://faraz.faith/2019-12-13-starctf-oob-v8-indepth/

#Pwn

LiveOverflow Browser Exploitation

LiveOverflow Browser Exploitation

https://liveoverflow.com/topic/browser-exploitation/

#Pwn

Format String Notes

Format String Notes - ir0nstone

https://github.com/ir0nstone/pwn-notes/blob/master/types/stack/format-string.md

#Pwn

Exploit 101 Format Strings

Exploit 101 Format Strings - Axcheron

https://axcheron.github.io/exploit-101-format-strings/

#Pwn

64marsh Exploit Guide

64marsh Exploit Guide

https://0x64marsh.com/?p=314

#Pwn

64marsh Author Page

64marsh Author Page

https://0x64marsh.com/?author=1

#Pwn

House of Corrosion

House of Corrosion - CptGibbon

https://github.com/CptGibbon/House-of-Corrosion

#Pwn

Return to VDSO

Return to VDSO - Void Security

https://www.voidsecurity.in/2014/12/return-to-vdso-using-elf-auxiliary.html

#Pwn

Windows Kernel Exploitation

Windows Kernel Exploitation - VulnDev

https://vulndev.io/2022/09/24/windows-kernel-exploitation-arbitrary-memory-mapping-x64/

#Pwn

Firefox OOB to RCE

Firefox OOB to RCE - VulnDev

https://vulndev.io/2022/09/09/browser-exploitation-firefox-oob-to-rce/

#Pwn

HEVD Use After Free

HEVD Use After Free - VulnDev

https://vulndev.io/2022/07/14/windows-kernel-exploitation-hevd-x64-use-after-free/

#Pwn

VulnDev

VulnDev

https://vulndev.io/

#Pwn

CS6265 Tutorial

CS6265 Tutorial - Georgia Tech

https://tc.gts3.org/cs6265/2019/tut/tut01-warmup1.html

#Pwn

CTF Wiki ROP

CTF Wiki ROP - Cougar Kim

https://cougar.kim/posts/ctf_wiki_rop/

#Pwn

Chrome Browser Exploitation

Chrome Browser Exploitation - Jhalon

https://jhalon.github.io/chrome-browser-exploitation-1/

#Pwn

WinPwn

WinPwn - Byzero512

https://github.com/Byzero512/winpwn

#Pwn

Guy in a Tuxedo Blog

Guy in a Tuxedo Blog

https://guyinatuxedo.github.io/

#Pwn

Integer Overflow Attack

Integer Overflow Attack - Comparitech

https://www.comparitech.com/blog/information-security/integer-overflow-attack/

#Pwn

FUSE Exploit

FUSE Exploit - Exploiter Blog

http://exploiter.dev/blog/2022/FUSE-exploit.html

#Pwn

House of Gods

House of Gods - Milo-D

https://github.com/Milo-D/house-of-gods

#Pwn

0poss Blog

0poss Blog

https://0poss.github.io/

#Pwn

Zeratool

Zeratool - ChrisTheCoolHut

https://github.com/ChrisTheCoolHut/Zeratool

#Pwn

1Day Dev

1Day Dev

https://1day.dev/

#Pwn

Exploiting C++ VTables

Exploiting C++ VTables - Defuse.ca

https://defuse.ca/exploiting-cpp-vtables.htm

#Pwn

Pwn SCFA

Pwn SCFA - Own2Pwn

http://own2pwn.fr/pwn-scfa

#Pwn

Apocalypse CTF Writeup

Apocalypse CTF Writeup - Dplastico

https://dplastico.github.io/2022/05/25/Apocalypse_ctf.html

#Pwn

Stack Alignment Ubuntu 18.04

Stack Alignment Ubuntu 18.04 - Cameron Wickes

https://www.cameronwickes.co.uk/stack-alignment-ubuntu-18-04-movaps/

#Pwn

HackMD Guide

HackMD Guide - Pepsipu

https://hackmd.io/@pepsipu/ry-SK44pt

#Pwn

Security Insecurity Blog

Security Insecurity Blog

https://securityinsecurity.github.io/

#Pwn

FSOP Lazynote

FSOP Lazynote - Faraz Faiz

https://faraz.faith/2020-10-13-FSOP-lazynote/

#Pwn

Playing with PCI Device Memory

Playing with PCI Device Memory - NixHacker

https://nixhacker.com/playing-with-pci-device-memory/

#Pwn

Exploiting Off-by-One Buffer Overflow

Exploiting Off-by-One Buffer Overflow - NixHacker

https://nixhacker.com/exploiting-off-by-one-buffer-overflow/

#Pwn

SploitFun Blog

SploitFun Blog

https://sploitfun.wordpress.com/

#Pwn

Heap Exploit Intro

Heap Exploit Intro - TyeYeah

https://tyeyeah.github.io/2021/05/12/2021-05-12-Heap-Exploit-Intro/

#Pwn

Linux Kernel Building Exploit Preparation

Linux Kernel Building Exploit Preparation - TyeYeah

https://tyeyeah.github.io/2021/04/20/2021-04-20-Linux-Kernel-Building-Exploit-Preparation/

#Pwn

Heap Exploitation in Real World

Heap Exploitation in Real World - hac425xxx

https://github.com/hac425xxx/heap-exploitation-in-real-world

#Pwn

Angrop Tool

Angrop Tool - Angr

https://github.com/angr/angrop

#Pwn

CTF Wiki User Mode

CTF Wiki User Mode

https://ctf-wiki.org/pwn/linux/user-mode/environment/

#Pwn

Bropper Tool

Bropper Tool - Hakumarachi

https://github.com/Hakumarachi/Bropper

#Pwn

Gadget Sequence for x86_64 ROP

Gadget Sequence for x86_64 ROP - Void Security

https://www.voidsecurity.in/2013/07/some-gadget-sequence-for-x8664-rop.html

#Pwn

Linux Kernel Blog

Linux Kernel Blog - Pawnyable Cafe

https://pawnyable.cafe/linux-kernel/

#Pwn

GIT Rekt

GIT Rekt - Firzen

https://firzen.de/git-rekt-1-siim-ftp

#Pwn

BootHole GitHub

BootHole GitHub - Eclypsium

https://github.com/eclypsium/BootHole

#Pwn

Exploit Development Playlist

Exploit Development Playlist - YouTube

https://www.youtube.com/playlist?list=PL1-BhNrIYWnm3HK-8PBL-qhHwWjI-mjb8

#Pwn

HEVD Kernel Exploit

HEVD Kernel Exploit - MGeeky

https://github.com/mgeeky/HEVD_Kernel_Exploit

#Pwn

HEVD Stackoverflow SMEP Bypass

HEVD Stackoverflow SMEP Bypass - H0mbre

https://h0mbre.github.io/HEVD_Stackoverflow_SMEP_Bypass_64bit/

#Pwn

Pwnable.tw

Pwnable.tw

https://pwnable.tw/

#Pwn

Kernel Exploit Practice

Kernel Exploit Practice - pr0cf5

https://github.com/pr0cf5/kernel-exploit-practice/blob/master/return-to-user/README.md

#Pwn

Linux Kernel Modprobe

Linux Kernel Modprobe - Lkmidas

https://lkmidas.github.io/posts/20210223-linux-kernel-pwn-modprobe/

#Pwn

Exploitation Series

Exploitation Series - Blahcat

https://blahcat.github.io/pages/exploitation-series.html

#Pwn

ARM Exploitation Guide

ARM Exploitation Guide - AD2001

https://ad2001.gitbook.io/a-noobs-guide-to-arm-exploitation/

#Pwn

Abusing Exceptions Part 2

Abusing Exceptions Part 2 - Bill Demirkapi

https://billdemirkapi.me/abusing-exceptions-for-code-execution-part-2/

#Pwn

Echo Exploit

Echo Exploit - Arget

https://arget.cc/2023/01/01/echo

#Pwn

Exploit Development Playlist

Exploit Development Playlist - YouTube

https://www.youtube.com/playlist?list=PL1-BhNrIYWnm3HK-8PBL-qhHwWjI-mjb8

#Pwn

FS Library

FS Library - MiaouPlop

https://github.com/miaouPlop/fs

#Pwn

LibFormatStr

LibFormatStr - Hellman

https://github.com/hellman/libformatstr

#Pwn

Eternal Blog

Eternal Blog

https://etenal.me/archives/1825

#Pwn

Exploitation Series

Exploitation Series - Blahcat

https://blahcat.github.io/pages/exploitation-series.html

#Pwn

Heap Exploitation

Heap Exploitation - Dvorhack

https://github.com/Dvorhack/Heap_exploitation

#Pwn

OpenSSH Pre-Auth Double Free

OpenSSH Pre-Auth Double Free - JFrog

https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/

#Pwn

HTB Playertwo

HTB Playertwo - 0xdf

https://0xdf.gitlab.io/2020/06/27/htb-playertwo.html

#Pwn

Fastbin Attack Tutorial

Fastbin Attack Tutorial - 0x00sec

https://0x00sec.org/t/heap-exploitation-fastbin-attack/3627

#Pwn

ROPing on Aarch64

ROPing on Aarch64 - Perfect Blue

https://blog.perfect.blue/ROPing-on-Aarch64

#Pwn

Linux Kernel Modprobe

Linux Kernel Modprobe - Lkmidas

https://lkmidas.github.io/posts/20210223-linux-kernel-pwn-modprobe/

#Pwn

ROP Bypass NX ASLR PIE Canary

ROP Bypass NX ASLR PIE Canary - IronHackers

https://ironhackers.es/en/tutoriales/pwn-rop-bypass-nx-aslr-pie-y-canary/

#Pwn

Memory Protections Guide

Memory Protections Guide - MDanilor

https://mdanilor.github.io/posts/memory-protections/

#Pwn

ROP ARM32

ROP ARM32 - Azeria Labs

https://azeria-labs.com/return-oriented-programming-arm32/

#Pwn

Nintendo DSi Browser Hack

Nintendo DSi Browser Hack - Farlow

https://farlow.dev/2023/03/02/hacking-the-nintendo-dsi-browser

#Pwn

ARM IoT Exploit Lab

ARM IoT Exploit Lab - Ringzer0

https://www.ringzer0.training/archive/2022-august/arm-iot-exploitlab.html

#Pwn

HackSecureIMS

HackSecureIMS - Lexterl33t

https://github.com/Lexterl33t/hacksecureims/blob/main/README.md

#Pwn

Xarch Shellcode

Xarch Shellcode - Ixty

https://github.com/ixty/xarch_shellcode

#Pwn

One Shellcode to Rule Them All

One Shellcode to Rule Them All - Shane Wilton

https://www.slideshare.net/ShaneWilton/one-shellcode-to-rule-them-all

#Pwn

Heap Viewer

Heap Viewer - Dani Gargu

https://github.com/danigargu/heap-viewer

#Pwn

QEMU iPod Touch

QEMU iPod Touch - Part 2

https://devos50.github.io/blog/2022/ipod-touch-qemu-pt2/

#Pwn

Glibc Heap Exploitation Basics

Glibc Heap Exploitation Basics

http://blog.k3170makan.com/2018/12/glibc-heap-exploitation-basics.html

#Pwn

CSGO Fuzzing BSP

CSGO Fuzzing BSP - Phoenhex

https://phoenhex.re/2018-08-26/csgo-fuzzing-bsp

#Pwn

Ret2ASLR

Ret2ASLR - Google Security Research

https://github.com/google/security-research/tree/master/pocs/cpus/ret2aslr

#Pwn

Honggfuzz

Honggfuzz - Google

https://github.com/google/honggfuzz

#Pwn

Windows 10 NT Heap Exploitation

Windows 10 NT Heap Exploitation - AngelBoy

https://www.slideshare.net/AngelBoy1/windows-10-nt-heap-exploitation-english-version

#Pwn

Linux Kernel Exploit Development

Linux Kernel Exploit Development - Breaking Bits

https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development

#Pwn

Chrome Browser Exploitation

Chrome Browser Exploitation - Jhalon

https://jhalon.github.io/chrome-browser-exploitation-1/

#Pwn

WTF Tool

WTF Tool - 0vercl0k

https://github.com/0vercl0k/wtf

#Pwn

Heepy Tool

Heepy Tool - Novafacing

https://github.com/novafacing/heepy

#Pwn

Payload Injection Management

Managing Inputs for Payload Injection - StackExchange

https://reverseengineering.stackexchange.com/questions/13928/managing-inputs-for-payload-injection

#Pwn

LLEF Tool

LLEF Tool - Foundry Zero

https://github.com/foundryzero/llef

#Pwn

Pwn Adventure 3

Pwn Adventure 3 - Jaiminton

https://www.jaiminton.com/Game-Hacking/Pwn-Adventure-3

#Pwn

Null Dereferences Exploitation

Null Dereferences Exploitation - Google Project Zero

https://googleprojectzero.blogspot.com/2023/01/exploiting-null-dereferences-in-linux.html

#Pwn

IKE Tool

IKE Tool - Mahaloz

https://ike.mahaloz.re/

#Pwn

Attacking JS Engines

Attacking JS Engines - Side Channel Blog

https://www.sidechannel.blog/en/attacking-js-engines/

#Pwn

Chrome Browser Exploitation

Chrome Browser Exploitation - Jhalon

https://jhalon.github.io/chrome-browser-exploitation-1/

#Pwn

Re-enabling FSOP on Libc 2.35

Re-enabling FSOP on Libc 2.35 - Mymaqn

https://github.com/Mymaqn/reenabling_fsop_on_libc2_35

#Pwn

Android Kernel Exploitation

Android Kernel Exploitation - CloudFuzz

https://cloudfuzz.github.io/android-kernel-exploitation/chapters/environment-setup.html

#Pwn

Dimitri Fourny Blog

Dimitri Fourny Blog

https://dimitrifourny.github.io/

#Pwn

Glibc Heap Exploitation Techniques

Glibc Heap Exploitation Techniques - 0x434b

https://0x434b.dev/overview-of-glibc-heap-exploitation-techniques/

#Pwn

GTIRB Stack Stamp

GTIRB Stack Stamp - GrammaTech

https://github.com/GrammaTech/gtirb-stack-stamp

#Pwn

Silifuzz

Silifuzz - Google

https://github.com/google/silifuzz

#Pwn

OpenSecurityTraining Vulns1001

OpenSecurityTraining Vulns1001

https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Vulns1001_C-family+2023_v1/about

#Pwn

VDR Tool

VDR Tool - Takahiro Haruyama

https://github.com/TakahiroHaruyama/VDR

#Pwn

Windows Kernel Wild Copy Exploit

Windows Kernel Wild Copy Exploit - Theori

https://blog.theori.io/exploiting-windows-kernel-wild-copy-with-user-fault-handling-cve-2023-28218-89f5189d0926

#Pwn

House of Rust

House of Rust - C4ebt

https://c4ebt.github.io/2021/01/22/House-of-Rust.html

#Pwn

HackMD Guide

HackMD Guide - Pepsipu

https://hackmd.io/@pepsipu/SyqPbk94a

#Pwn

Far Out Man

Far Out Man - DF Sec

https://blog.dfsec.com/ios/2023/11/19/thats-far-out-man/

#Pwn

Shogun Tool

Shogun Tool - Guy in a Tuxedo

https://github.com/guyinatuxedo/Shogun

#Pwn

0CTF-TCTF 2023 Writeup

0CTF-TCTF 2023 Writeup - Chovid99

https://chovid99.github.io/posts/0ctf-tctf-2023/

#Pwn

Overflow

Overflow - Punkx

https://punkx.org/overflow/

#Pwn

Libc GOT Chain

Libc GOT Chain - ThisUsernameIsTaken

https://github.com/thisusernameistaken/LibcGOTchain

#Pwn

Preeny

Preeny - Zardus

https://github.com/zardus/preeny

#Pwn

RWCTF Writeup

RWCTF Writeup - HackCyom

https://www.hackcyom.com/2024/01/rwctf-lets-party-in-the-house-wu/

#Pwn

Awesome Browser Exploit

Awesome Browser Exploit - EscapingBug

https://github.com/Escapingbug/awesome-browser-exploit/blob/master/README.md

#Pwn

CTF 2019 OOB V8 Challenge

CTF 2019 OOB V8 Challenge - Ir0nstone

https://ir0nstone.gitbook.io/notes/types/browser-exploitation/ctf-2019-oob-v8/the-challenge

#Pwn

StarCTF OOB V8 Writeup

StarCTF OOB V8 Writeup - Faraz

https://faraz.faith/2019-12-13-starctf-oob-v8-indepth/

#Pwn

Simple Bugs Complex Exploits

Simple Bugs Complex Exploits - Elttam

https://www.elttam.com/blog/simple-bugs-with-complex-exploits/

#Pwn

Exploits Collection

Exploits Collection - R3tr074

https://github.com/R3tr074/exploits

#Pwn

Operation Triangulation

Operation Triangulation - Securelist

https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/

#Pwn

Triangulation Validators

Triangulation Validators - Securelist

https://securelist.com/triangulation-validators-modules/110847/

#Pwn

Operation Triangulation Overview

Operation Triangulation Overview - Securelist

https://securelist.com/operation-triangulation/109842/

#Pwn

TriangleDB Implant

TriangleDB Implant - Securelist

https://securelist.com/triangledb-triangulation-implant/110050/

#Pwn

Google VRP Bug Report

Google VRP Bug Report

https://bughunters.google.com/reports/vrp/38FmYpr1h

#Pwn

Heap Management Gist

Heap Management Gist - Theldus

https://gist.github.com/Theldus/4e1efc07ec13fb84fa10c2f3d054dccd

#Pwn

Villoc Tool

Villoc Tool - Wapiflapi

https://github.com/wapiflapi/villoc

#Pwn

Heaptrace Tool

Heaptrace Tool - Tsheinen

https://github.com/tsheinen/heaptrace

#Pwn

Zeratool

Zeratool - ChrisTheCoolHut

https://github.com/ChrisTheCoolHut/Zeratool

#Pwn

Halfempty Tool

Halfempty Tool - Google Project Zero

https://github.com/googleprojectzero/halfempty

#Pwn

Boofuzz

Boofuzz - Jtpereyda

https://github.com/jtpereyda/boofuzz

#Pwn

Moyix Twitter

Moyix Twitter

https://twitter.com/moyix/status/1765967602982027550

#Pwn

TP-Link Buffer Overflow

TP-Link Buffer Overflow - Boschko

https://boschko.ca/tp-link-tddp-bof/amp/

#Pwn

Gofetch

Gofetch

https://gofetch.fail/

#Pwn

Pixel 8 Kernel Code Execution

Pixel 8 Kernel Code Execution - Github Blog

https://github.blog/2024-03-18-gaining-kernel-code-execution-on-an-mte-enabled-pixel-8/

#Pwn

Flower Tool

Flower Tool - Xrombar

https://github.com/xrombar/flower

#Pwn

NFTables

NFTables - Pwning.Tech

https://pwning.tech/nftables/

#Pwn

American Conquest Exploit

American Conquest Exploit - Synacktiv

https://www.synacktiv.com/publications/exploiting-american-conquest

#Pwn

Fuzzing XML and JSON

Fuzzing XML and JSON - GNUCitizen

https://www.gnucitizen.org/blog/fuzzing-xml-and-json-pt-1/

#Pwn

Nautilus Fuzzer

Nautilus Fuzzer

https://github.com/nautilus-fuzz/nautilus

#Pwn

Ret2 Systems Wargames

Ret2 Systems Wargames

https://wargames.ret2.systems/

#Pwn

Heap Diagram

Heap Diagram - Cloudburst

https://raw.githubusercontent.com/cloudburst/libheap/master/heap.png

#Pwn

RopView Tool

RopView Tool - Elbee-Cyber

https://github.com/elbee-cyber/RopView

#Pwn

GWPSAN

GWPSAN - Google

https://github.com/google/gwpsan/

#Pwn

Intro to V8 Exploitation

Intro to V8 Exploitation - Matteo Malvica

https://www.matteomalvica.com/blog/2024/06/05/intro-v8-exploitation-maglev/

#Pwn

Fortigate RCE with CVE-2024-21762

Fortigate RCE with CVE-2024-21762 - AssetNote

https://www.assetnote.io/resources/research/two-bytes-is-plenty-fortigate-rce-with-cve-2024-21762

#Pwn

GDB Static

GDB Static - Hugsy

https://github.com/hugsy/gdb-static

#Pwn

Aperi'Solve

Aperi'Solve

https://www.aperisolve.fr/

#Stegano

stegoVeritas

Steganography Tool - stegoVeritas

https://github.com/bannsec/stegoVeritas

#Stegano

Sonic Visualiser

Sonic Visualiser

https://www.sonicvisualiser.org/

#Stegano

dhondta - gist 1

dhondta - gist 1

https://gist.github.com/dhondta/d2151c82dcd9a610a7380df1c6a0272c

#Stegano

dhondta - gist 2

dhondta - gist 2

https://gist.github.com/dhondta/feaf4f5fb3ed8d1eb7515abe8cde4880

#Stegano

dhondta - gist 3

dhondta - gist 3

https://gist.github.com/dhondta/30abb35bb8ee86109d17437b11a1477a

#Stegano

woodruffw/steg86

woodruffw/steg86

https://github.com/woodruffw/steg86

#Stegano

rw/plainsight

rw/plainsight

https://github.com/rw/plainsight

#Stegano

How to Convert/Decode a Slow Scan Television (SSTV) Audio File to Images using QSSTV in Ubuntu 18.04

How to Convert/Decode a Slow Scan Television (SSTV) Audio File to Images using QSSTV in Ubuntu 18.04

https://ourcodeworld.com/articles/read/956/how-to-convert-decode-a-slow-scan-television-transmissions-sstv-audio-file-to-images-using-qsstv-in-ubuntu-18-04

#Stegano

keyunluo/pkcrack

keyunluo/pkcrack

https://github.com/keyunluo/pkcrack

#Stegano

Hiding Messages in x86 Binaries Using Semantic Duals

Hiding Messages in x86 Binaries Using Semantic Duals

https://blog.yossarian.net/2020/08/16/Hiding-messages-in-x86-binaries-using-semantic-duals

#Stegano

woodruffw/steg86

woodruffw/steg86

https://github.com/woodruffw/steg86

#Stegano

Plainsight Enciphering Demo

Plainsight Enciphering Demo

https://www.jamieweb.net/blog/plainsight-enciphering-demo/

#Stegano

Tools Stegano

Tools Stegano

https://k-lfa.info/tools-stegano/

#Stegano

dhondta/python-tinyscript

dhondta/python-tinyscript

https://github.com/dhondta/python-tinyscript

#Stegano

Hiding Information by Changing an Image's Height

Hiding Information by Changing an Image's Height

https://blog.cyberhacktics.com/hiding-information-by-changing-an-images-height/

#Stegano

Paddinganography

Paddinganography

https://inshallhack.org/paddinganography/

#Stegano

dhondta - gist 4

dhondta - gist 4

https://gist.github.com/dhondta/90a07d9d106775b0cd29bb51ffe15954

#Stegano

jsummers/tweakpng

jsummers/tweakpng

https://github.com/jsummers/tweakpng

#Stegano

Les Images PNG : Comment ça marche ? Comment corriger manuellement les erreurs ?

Les Images PNG : Comment ça marche ? Comment corriger manuellement les erreurs ?

https://elsicarius.fr/les-images-png-comment-ca-marche-comment-corriger-manuellement-les-erreurs

#Stegano

ElSicarius - S3cur3_tr4a4xx_adm1n_acc0unt

ElSicarius - S3cur3_tr4a4xx_adm1n_acc0unt

https://elsicarius.fr/author/s3cur3_tr4a4xx_adm1n_acc0unt

#Stegano

Cloakify

Cloakify

https://github.com/TryCatchHCF/Cloakify

#Stegano

Chaîne YouTube nanobyte

Chaîne YouTube nanobyte

https://www.youtube.com/channel/UCSPIuWADJIMIf9Erf--XAsA/videos

#Ring0

DEF CON 29 - Guillaume Fournier, Sylvain Afchain, Sylvain Baubeau

DEF CON 29 - Guillaume Fournier, Sylvain Afchain, Sylvain Baubeau

https://www.youtube.com/watch?v=5zixNDolLrg

#Ring0

[Linux Kernel Exploitation] NULL pointer dereference bypass smep / ...

[Linux Kernel Exploitation] NULL pointer dereference bypass smep / ...

https://www.youtube.com/watch?v=Rx3sRn5garA

#Ring0

WTF is ACPI ? - LSE Week 2012

WTF is ACPI ? - LSE Week 2012

https://www.youtube.com/watch?v=iHuo-y1gFAs

#Ring0

Breaking the x86 Instruction Set

Breaking the x86 Instruction Set

https://www.youtube.com/watch?v=KrksBdWcZgQ

#Ring0

Write your own Operating System

Write your own Operating System

https://www.youtube.com/channel/UCQdZltW7bh1ta-_nCH7LWYw/featured

#Ring0

Conférence @Elf - de Kernel Module à eBPF

Conférence @Elf - de Kernel Module à eBPF

https://www.youtube.com/watch?v=FTdrqxf4loE

#Ring0

How Do Linux Kernel Drivers Work? - Learning Resource

How Do Linux Kernel Drivers Work? - Learning Resource

https://www.youtube.com/watch?v=juGNPLdjLH4

#Ring0

OffensiveCon20 - Alexander Popov - Exploiting a Linux Kernel Vulner...

OffensiveCon20 - Alexander Popov - Exploiting a Linux Kernel Vulnerability

https://www.youtube.com/watch?v=J6xIohyARSU

#Ring0

Temple Of PWN 13 - Kernel Exploitation

Temple Of PWN 13 - Kernel Exploitation

https://www.youtube.com/watch?v=dZgvLbuJiQ4

#Ring0

Kernel Exploitation

Kernel Exploitation

https://www.youtube.com/watch?v=HtdriW7KVNE

#Ring0

Race Conditions and Time of Check to Time of Use TOCTTOU Vulnerabil...

Race Conditions and Time of Check to Time of Use TOCTTOU Vulnerabilities

https://www.youtube.com/watch?v=PH73lpG2B1M

#Ring0

Hacking - Rootkit Development 09 - Hooking SysCall Read

Hacking - Rootkit Development 09 - Hooking SysCall Read

https://www.youtube.com/watch?v=_BSZKj_rF5A

#Ring0

Hacking - Rootkit Development 01

Hacking - Rootkit Development 01

https://www.youtube.com/watch?v=8dZFJEc-8uI

#Ring0

Virtual Memory: 3 What is Virtual Memory?

Virtual Memory: 3 What is Virtual Memory?

https://www.youtube.com/watch?v=qlH4-oHnBb8

#Ring0

Linux Kernel Pwning

Linux Kernel Pwning

https://www.youtube.com/watch?v=EoU3sXP2IH8

#Ring0

devse.wiki

devse.wiki

https://devse.wiki/

#Ring0

Create Your Own Kernel In C++

Create Your Own Kernel In C++

https://www.codeproject.com/Articles/1225196/Create-Your-Own-Kernel-In-C-2

#Ring0

Linux Insides - Booting

Linux Insides - Booting

https://0xax.gitbooks.io/linux-insides/content/Booting/linux-bootstrap-1.html

#Ring0

Modules Kernel Linux - Kali Linux

Modules Kernel Linux - Kali Linux

https://www.kali-linux.fr/hacking/modules-kernel-linux

#Ring0

8086 BIOS and DOS Interrupts

8086 BIOS and DOS Interrupts

http://www.ablmcc.edu.hk/~scy/CIT/8086_bios_and_dos_interrupts.htm

#Ring0

Linux Kernel System Map

Linux Kernel System Map

https://rlworkman.net/system.map/

#Ring0

CTF Writeups - Kernel

CTF Writeups - Kernel

https://ctftime.org/writeups?tags=kernel&hidden-tags=kernel

#Ring0

Linux Kernel Exploitation by xairy

Linux Kernel Exploitation by xairy

https://github.com/xairy/linux-kernel-exploitation

#Ring0

A Guide to Kernel Exploitation - l34n

A Guide to Kernel Exploitation - l34n

https://github.com/l34n/CySecBooks/blob/master/A%20Guide%20to%20Kernel%20Exploitation%20Attacking%20the%20Core.pdf

#Ring0

Le Monde du Kernel - Hackndo

Le Monde du Kernel - Hackndo

https://beta.hackndo.com/le-monde-du-kernel/

#Ring0

Les Failles Kernel - Hackndo

Les Failles Kernel - Hackndo

https://beta.hackndo.com/les-failles-kernel/

#Ring0

Kern Emporium

Kern Emporium

https://kernemporium.github.io/

#Ring0

Hotrod - syst3mfailure

Hotrod - syst3mfailure

https://syst3mfailure.io/hotrod

#Ring0

Exploit Database - Linux Kernel

Exploit Database - Linux Kernel

https://www.exploit-db.com/exploits/45045

#Ring0

Linux Kernel Pwn Part 1 - lkmidas

Linux Kernel Pwn Part 1 - lkmidas

https://lkmidas.github.io/posts/20210123-linux-kernel-pwn-part-1/

#Ring0

Understanding the Linux Kernel - wogh8732

Understanding the Linux Kernel - wogh8732

https://wogh8732.tistory.com/323

#Ring0

How2Kernel - R3x

How2Kernel - R3x

https://github.com/R3x/How2Kernel

#Ring0

Introduction to Kernel - Kern Emporium

Introduction to Kernel - Kern Emporium

https://kernemporium.github.io/kernel/intro/

#Ring0

Null Pointer Dereference - bases-hacking.org

Null Pointer Dereference - bases-hacking.org

https://bases-hacking.org/null-pointer-dereference.html

#Ring0

Kernel Play Guide - NSKernel

Kernel Play Guide - NSKernel

https://nskernel.gitbook.io/kernel-play-guide/

#Ring0

TutoOS - A. Michelizza

TutoOS - A. Michelizza

http://a.michelizza.free.fr/pmwiki.php?n=TutoOS.TutoOS

#Ring0

Kernel 101 - Arjun Sreedharan

Kernel 101 - Arjun Sreedharan

https://arjunsreedharan.org/post/82710718100/kernel-101-lets-write-a-kernel

#Ring0

Arjun Sreedharan Blog

Arjun Sreedharan Blog

https://arjunsreedharan.org/

#Ring0

Learning KVM - David942j

Learning KVM - David942j

https://david942j.blogspot.com/2018/10/note-learning-kvm-implement-your-own.html

#Ring0

Pentester.blog

Pentester.blog

https://pentester.blog/?p=598

#Ring0

Create Your Own OS Blog

Create Your Own OS Blog

https://createyourownos.blogspot.com/

#Ring0

Introduction to eBPF - Zenika Blog

Introduction to eBPF - Zenika Blog

https://blog.zenika.com/2019/07/15/decouverte-ebpf/

#Ring0

Anatomy of a BzImage - LWN.net

Anatomy of a BzImage - LWN.net

https://lwn.net/Articles/717293/

#Ring0

C++ Virtual Machine - 0xNinja

C++ Virtual Machine - 0xNinja

https://0xninja.fr/c-vm/

#Ring0

Kernel ROP - hxp CTF 2020 Writeup

Kernel ROP - hxp CTF 2020 Writeup

https://hxp.io/blog/81/hxp-CTF-2020-kernel-rop/

#Ring0

Windows Kernel Exploitation - m101

Windows Kernel Exploitation - m101

https://m101.github.io/binholic/2018/04/28/windows-kernel-exploitation-token.html

#Ring0

Lord of the Ring0 - Idov31

Lord of the Ring0 - Idov31

https://idov31.github.io/2022-07-14-lord-of-the-ring0-p1/

#Ring0

Linux Kernel Hacking - Yardenshafir

Linux Kernel Hacking - Yardenshafir

https://github.com/yardenshafir/IoRingReadWritePrimitive

#Ring0

MiniOS Kernel - 0xMirasio

MiniOS Kernel - 0xMirasio

https://github.com/0xMirasio/kernel-MiniOS

#Ring0

Linux Kernel - Xcellerator

Linux Kernel - Xcellerator

https://xcellerator.github.io/categories/linux/

#Ring0

Linux Kernel Hacking - Xcellerator

Linux Kernel Hacking - Xcellerator

https://github.com/xcellerator/linux_kernel_hacking

#Ring0

Linux Kernel Defence Map - a13xp0p0v

Linux Kernel Defence Map - a13xp0p0v

https://github.com/a13xp0p0v/linux-kernel-defence-map

#Ring0

Sandsifter - Battelle

Sandsifter - Battelle

https://github.com/Battelle/sandsifter

#Ring0

Conférence @TheLaluka - Pentest Web 101

Conférence @TheLaluka - Pentest Web 101

https://www.youtube.com/watch?v=gPsm_Iz_yak

#Web

It's a PHP Unserialization Vulnerability Jim, but Not as We Know It

It's a PHP Unserialization Vulnerability Jim, but Not as We Know It

https://www.youtube.com/watch?v=OrEar0TiS90

#Web

Hacking Modern Desktop apps with XSS and RCE Workshop

Hacking Modern Desktop apps with XSS and RCE Workshop

https://www.youtube.com/watch?v=xILfQGkLXQo

#Web

🇫🇷 PROTOTYPE POLLUTION

🇫🇷 PROTOTYPE POLLUTION

https://www.youtube.com/watch?v=vZlP4I7yhI4

#Web

#HITB2017AMS D2T1 - Everybody Wants SOME: Advance Same Origin Methods

#HITB2017AMS D2T1 - Everybody Wants SOME: Advance Same Origin Methods

https://www.youtube.com/watch?v=OvarkOxxdic

#Web

Backslash Powered Scanning: Hunting Unknown Vulnerability Classes

Backslash Powered Scanning: Hunting Unknown Vulnerability Classes

https://www.youtube.com/watch?v=apOLZ67TZd0

#Web

Club EH RM 05 - Intro to JSON Web Token Exploitation

Club EH RM 05 - Intro to JSON Web Token Exploitation

https://www.youtube.com/watch?v=d7wmUz57Nlg

#Web

HTTP Request Smuggling

HTTP Request Smuggling

https://www.youtube.com/watch?v=okV4i19eCAg

#Web

Sql injection in SOAP API (API testing )

Sql injection in SOAP API (API testing )

https://www.youtube.com/watch?v=UINLbiq19NQ

#Web

Présentation - Modèle de classification XSS

Présentation - Modèle de classification XSS

https://www.youtube.com/watch?v=a0KUWOfXC_I

#Web

CORS in 100 Seconds

CORS in 100 Seconds

https://www.youtube.com/watch?v=4KHiSt0oLJ0

#Web

Les bonnes pratiques OAuth2/OIDC conjuguées au présent, passé simple et futur

Les bonnes pratiques OAuth2/OIDC conjuguées au présent, passé simple et futur

https://www.youtube.com/watch?v=PhQJKKrV5i0

#Web

Advanced PHP Deserialization - Phar Files

Advanced PHP Deserialization - Phar Files

https://www.youtube.com/watch?v=fHZKSCMWqF4

#Web

Burpsuite tricks - xanhacks

Burpsuite tricks - xanhacks

https://www.youtube.com/watch?v=1Ae94tigBiM

#Web

Edge Side Include Injection: Abusing Caching Servers into SSRF and Local File Inclusion

Edge Side Include Injection: Abusing Caching Servers into SSRF and Local File Inclusion

https://www.youtube.com/watch?v=6t50uRAxFT8

#Web

Two Bugs To Rule Them All: Taking Over The PHP Supply Chain by Thomas Orlita

Two Bugs To Rule Them All: Taking Over The PHP Supply Chain by Thomas Orlita

https://www.youtube.com/watch?v=RLcK0kRGpjw

#Web

Olivier Arteau -- Prototype pollution attacks in NodeJS applications

Olivier Arteau -- Prototype pollution attacks in NodeJS applications

https://www.youtube.com/watch?v=LUsiFV3dsK8

#Web

Intro to PHP Deserialization / Object Injection

Intro to PHP Deserialization / Object Injection

https://www.youtube.com/watch?v=HaW15aMzBUM

#Web

PHP Type Juggling - Why === is Important - Sponsored Content

PHP Type Juggling - Why === is Important - Sponsored Content

https://www.youtube.com/watch?v=idC5SAsKhlE

#Web

Hack A Blazor WASM App (At Your Own Risk)

Hack A Blazor WASM App (At Your Own Risk)

https://www.youtube.com/watch?v=Xx1eMlscXrQ

#Web

Relative Path Overwrite XSS - Baptiste Moine

Relative Path Overwrite XSS - Baptiste Moine

https://www.youtube.com/watch?v=Ama6jrsjRlM

#Web

HackTheBox "Business CTF" - discordvm - Node.js Sandbox Escape

HackTheBox "Business CTF" - discordvm - Node.js Sandbox Escape

https://www.youtube.com/watch?v=pzh6--wIp24

#Web

Hacking ELECTRON: JavaScript Desktop Applications w/ 7aSecurity

Hacking ELECTRON: JavaScript Desktop Applications w/ 7aSecurity

https://www.youtube.com/watch?v=P8QvSjL8F9w

#Web

Creating Custom Nuclei Templates and Workflows

Creating Custom Nuclei Templates and Workflows

https://www.youtube.com/watch?v=bHXkQjtBOLo

#Web

XSS Filter Bypass | Escape Quotes | Part 9

XSS Filter Bypass | Escape Quotes | Part 9

https://www.youtube.com/watch?v=DOLb_hNOpXk

#Web

OAUTH 2.1 expliqué simplement (même si tu n'es pas dev) ! (Julien Tasso)

OAUTH 2.1 expliqué simplement (même si tu n'es pas dev) ! (Julien Tasso)

https://www.youtube.com/watch?v=YdShQveywpo

#Web

Web Security Academy Thèmes

Explorez différents thèmes de sécurité web sur Hackitude

https://www.hackitude.in/labs-web-security-academy-th%C3%A8mes

#Web

AWAE Preparation

Préparation pour l'Offensive Security Web Expert (AWAE)

https://z-r0crypt.github.io/blog/2020/01/22/oswe/awae-preparation/

#Web

H2C Smuggler

Tool for HTTP/2 cleartext (h2c) smuggling

https://github.com/BishopFox/h2csmuggler

#Web

Impersonated Brave.com pushes Malware

Google assists in the detection of malware on Brave.com

https://arstechnica.com/gadgets/2021/07/with-help-from-google-impersonated-brave-com-website-pushes-malware/

#Web

Twitter Post - Podalirius

Twitter post discussing a security topic by Podalirius

https://twitter.com/podalirius_/status/1420072160450785280

#Web

PortSwigger Web Security Labs

Interactive labs to learn web security on PortSwigger

https://portswigger.net/web-security/all-labs

#Web

Gist by terjanq

Gist repository with security-related content by terjanq

https://gist.github.com/terjanq/458d8ec1148e96f7ccbdccfd908c56f6

#Web

FCSC 2021 Web Writeups

Writeups from FCSC 2021 related to web security challenges

https://github.com/dspiricate/writeups/tree/main/FCSC/2021/web/Shared%20notes

#Web

Bezkoder

Website featuring tutorials and resources for developers

https://www.bezkoder.com/

#Web

Polyglot Files - A Hacker's Best Friend

Exploration of polyglot files in hacking scenarios

https://medium.com/swlh/polyglot-files-a-hackers-best-friend-850bf812dd8a

#Web

NoSQL Injections: Classic & Blind

Overview of classic and blind NoSQL injection techniques

https://www.dailysecurity.fr/nosql-injections-classique-blind/

#Web

Web Checklist - Pentestbook

Checklist for web penetration testing from Pentestbook

https://pentestbook.six2dez.com/others/web-checklist

#Web

Pourquoi Next.js?

Article in French discussing the benefits of Next.js

https://practicalprogramming.fr/pourquoi-next-js

#Web

CSP Evaluator

Tool to evaluate Content Security Policy headers

https://csp-evaluator.withgoogle.com/

#Web

JSONBee

Tool for blind JSON injection testing

https://github.com/zigoo0/JSONBee

#Web

Twitter Post - Podalirius

Another Twitter post discussing a security topic by Podalirius

https://twitter.com/podalirius_/status/1447455234071146497

#Web

0xHorizon Articles

Articles related to cybersecurity and web topics on 0xHorizon

https://0xhorizon.eu/articles/

#Web

HTTP Request Smuggling - Bachelor's Thesis

Research on HTTP request smuggling

https://github.com/mattiasgrenfeldt/bachelors-thesis-http-request-smuggling/

#Web

HTTP Response Splitting - SlideShare

SlideShare presentation on HTTP response splitting

https://fr.slideshare.net/h4xorhead/http-response-splitting-39437258

#Web

HTTP Response Splitting - OWASP

OWASP guide on HTTP response splitting attacks

https://owasp.org/www-community/attacks/HTTP_Response_Splitting

#Web

PHP Exploit - GitList

Exploit for bypassing PHP escapeshellarg and escapeshellcmd

https://github.com/kacperszurek/exploits/blob/master/GitList/exploit-bypass-php-escapeshellarg-escapeshellcmd.md

#Web

Python Deserialization Attack Payload Generator

Tool for generating payloads for Python deserialization attacks

https://github.com/j0lt-github/python-deserialization-attack-payload-generator

#Web

PHP-FPM Local Root Exploit

Blog post detailing a PHP-FPM local root exploit

https://www.ambionics.io/blog/php-fpm-local-root

#Web

JavaScript Prototype Pollution - Exploitation

Article on finding and exploiting JavaScript prototype pollution vulnerabilities

https://infosecwriteups.com/javascript-prototype-pollution-practice-of-finding-and-exploitation-f97284333b2

#Web

HTTP Response Splitting Attack - Infosec Institute

Information on conducting HTTP response splitting attacks

https://resources.infosecinstitute.com/topic/http-response-splitting-attack/

#Web

Cross-Site WebSocket Hijacking (CSWSH)

Explanation and mitigation techniques for CSWSH attacks

https://infosecwriteups.com/cross-site-websocket-hijacking-cswsh-ce2a6b0747fc

#Web

Exploiting PHP Deserialization

Techniques for exploiting PHP deserialization vulnerabilities

https://medium.com/swlh/exploiting-php-deserialization-56d71f03282a

#Web

PHP Serialization Format - Wikipedia

Information about the PHP serialization format

https://en.wikipedia.org/wiki/PHP_serialization_format

#Web

Web Application Wordlists - GitHub

Collection of wordlists for web applications

https://github.com/p0dalirius/webapp-wordlists

#Web

Rusty Joomla RCE - Hacktive Security Blog

Blog post detailing a remote code execution vulnerability in Joomla

https://blog.hacktivesecurity.com/index.php/2019/10/03/rusty-joomla-rce/

#Web

RequestBin

Tool for inspecting HTTP requests

https://requestbin.com/

#Web

XSS Reflected - 0xHorizon

Article on reflected XSS vulnerabilities

https://0xhorizon.eu/fr/articles/xss-reflected/

#Web

IP Source Bypass - GitHub

Tool for bypassing IP source restrictions

https://github.com/p0dalirius/ipsourcebypass

#Web

PHP Stream Wrappers and Filters

Exploration of PHP stream wrappers and filters

https://blog.eleven-labs.com/fr/php-stream-wrappers-filters/

#Web

Expressitoo

Website featuring security-related content

https://expressitoo.github.io/

#Web

PIL RCE Ghostscript CVE-2018-16509 - GitHub

Exploit for CVE-2018-16509 affecting Ghostscript in PIL

https://github.com/farisv/PIL-RCE-Ghostscript-CVE-2018-16509

#Web

Vaadata Blog

Articles and insights on cybersecurity from Vaadata

https://www.vaadata.com/blog/fr/

#Web

Twitter Post - Podalirius

Twitter post discussing a security topic by Podalirius

https://twitter.com/podalirius_/status/1488921781637365771

#Web

CSPass - GitHub

Tool for generating Content Security Policy (CSP) headers

https://github.com/Ruulian/CSPass

#Web

React GitHub Issue #3473

GitHub issue discussing React framework

https://github.com/facebook/react/issues/3473

#Web

Wizdler Firefox Add-on

Firefox add-on for viewing and editing web API definitions

https://addons.mozilla.org/fr/firefox/addon/wizdler/

#Web

PimpMyBurp - YesWeHack Blog

Articles and tips on enhancing Burp Suite functionality

https://blog.yeswehack.com/category/yeswerhackers/pimpmyburp/

#Web

OWASP Cheat Sheet Series

Cheat sheets for various web application security topics from OWASP

https://cheatsheetseries.owasp.org/index.html

#Web

CSS Data Theft Techniques - Sekurak Blog

Techniques for data theft using CSS attacks on web applications

https://sekurak.pl/wykradanie-danych-w-swietnym-stylu-czyli-jak-wykorzystac-css-y-do-atakow-na-webaplikacje/

#Web

HackMD - Chivato

Document on a web security topic on HackMD

https://hackmd.io/@Chivato/HyWsJ31dI

#Web

New XSS Vectors - PortSwigger Research

Research on new cross-site scripting (XSS) attack vectors

https://portswigger.net/research/new-xss-vectors

#Web

Symfony Secret Fragment - Ambionics Blog

Exploration of Symfony secret fragment vulnerabilities

https://www.ambionics.io/blog/symfony-secret-fragment

#Web

Looting Symfony with EOS - Synacktiv

Research on exploiting Symfony vulnerabilities with EOS

https://www.synacktiv.com/en/publications/looting-symfony-with-eos.html

#Web

Web Pentest Cheat Sheet - Haax.fr

Cheat sheet for web penetration testing

https://cheatsheet.haax.fr/web-pentest/

#Web

From LFI to RCE via PHP Sessions - RCESecurity

Exploiting PHP sessions for local file inclusion (LFI) to remote code execution (RCE)

https://www.rcesecurity.com/2017/08/from-lfi-to-rce-via-php-sessions/

#Web

SSRFmap - GitHub

Tool for scanning SSRF vulnerabilities

https://github.com/swisskyrepo/SSRFmap

#Web

Finding Unique Values in JavaScript Arrays

Technique for finding unique values in JavaScript arrays

https://levelup.gitconnected.com/how-to-find-unique-values-by-property-in-an-array-of-objects-in-javascript-50ca23db8ccc

#Web

CRLFsuite - GitHub

Tool for testing HTTP response splitting vulnerabilities

https://github.com/Nefcore/CRLFsuite

#Web

Ysomap - GitHub

Tool for automating exploitation of deserialization vulnerabilities

https://github.com/wh1t3p1g/ysomap

#Web

XXEinjector - GitHub

Tool for exploiting XXE (XML External Entity) vulnerabilities

https://github.com/enjoiz/XXEinjector

#Web

SSRF Server-Side Request Forgery - HackTricks

Guide on SSRF vulnerabilities and exploitation

https://book.hacktricks.xyz/pentesting-web/ssrf-server-side-request-forgery

#Web

Gopherus - GitHub

Tool for exploiting SSRF via Gopher protocol

https://github.com/tarunkant/Gopherus

#Web

Weevely3 - GitHub

Tool for web application exploitation

https://github.com/epinna/weevely3

#Web

All About Bug Bounty - GitHub

Comprehensive guide and resources for bug bounty hunting

https://github.com/daffainfo/AllAboutBugBounty

#Web

Bug Bounty - GitHub

Guide and resources for bug bounty programs

https://github.com/Anlominus/Bug-Bounty

#Web

Twitter Post - MeAsHacker_HNA

Twitter post discussing a security topic by MeAsHacker_HNA

https://twitter.com/MeAsHacker_HNA/status/1538862575617814528

#Web

Twitter Post - Podalirius

Another Twitter post discussing a security topic by Podalirius

https://twitter.com/podalirius_/status/1554132093608804354

#Web

Node.Js Security Course - NodeJS Shell

Python shell script for Node.js security testing

https://github.com/ajinabraham/Node.Js-Security-Course/blob/master/nodejsshell.py

#Web

HTTP Response Splitting - 0xHorizon

Article on HTTP response splitting vulnerabilities

https://0xhorizon.eu/fr/articles/http-response-splitting/

#Web

Bit Shifting Blind Injection Simplified - Blog

Simplified explanation of bit-shifting blind SQL injection

http://blog.k3170makan.com/2012/01/bit-shifting-blind-injection-simplified.html

#Web

Damn Vulnerable Web Application (DVWA) - Walkthroughs

Walkthrough of Damn Vulnerable Web Application

https://sharpforce.gitbook.io/cybersecurity/walkthroughs/damn-vulnerable-web-application/damn-vulnerable-web-application-dvwa

#Web

LFI to RCE via PHP Filters - HackTricks

Exploiting LFI to RCE via PHP filters

https://book.hacktricks.xyz/pentesting-web/file-inclusion/lfi2rce-via-php-filters

#Web

Awesome ElectronJS Hacking - GitHub

Resources and tools for ElectronJS security testing

https://github.com/doyensec/awesome-electronjs-hacking

#Web

Cent - GitHub

Container orchestration security tools

https://github.com/xm1k3/cent

#Web

Wapiti - GitHub

Web application vulnerability scanner

https://github.com/devl00p/wapiti

#Web

The Secret Parameter LFR and Potential RCE in NodeJS Apps - Blog

Discussion on parameter tampering and RCE in Node.js applications

https://blog.shoebpatel.com/2021/01/23/The-Secret-Parameter-LFR-and-Potential-RCE-in-NodeJS-Apps/

#Web

NodeJS Red Team Cheat Sheet - GitHub

Cheat sheet for Node.js red team operations

https://github.com/aadityapurani/NodeJS-Red-Team-Cheat-Sheet

#Web

Sandboxing Node.js is Hard - Pwnisher Blog

Challenges and techniques for sandboxing Node.js applications

https://pwnisher.gitlab.io/nodejs/sandbox/2019/02/21/sandboxing-nodejs-is-hard.html

#Web

PHP Object Injection Exploitation Notes - GitHub Gist

Notes on exploiting PHP object injection vulnerabilities

https://gist.github.com/jcreedcmu/4f6e6d4a649405a9c86bb076905696af?permalink_comment_id=3846798

#Web

Introduction to Prototype Pollution - Shieldfy

Introduction to prototype pollution vulnerabilities

https://shieldfy.io/security-wiki/prototype-pollution/introduction-to-prototype-pollution/

#Web

DOM Clobbering - It's Clobbering Time - Medium

Article on DOM clobbering vulnerabilities

https://medium.com/@shilpybanerjee/dom-clobbering-its-clobbering-time-f8dd5c8fbc4b

#Web

Twitter Silhouette - Twitter Engineering Blog

Blog post from Twitter on Twitter Silhouette

https://blog.twitter.com/engineering/en_us/topics/insights/2018/twitter_silhouette

#Web

XS-Leaks - AppSec Monkey Blog

Exploration of cross-site leaks vulnerabilities

https://www.appsecmonkey.com/blog/xs-leaks

#Web

Pop Chains - Insecure Deserialization

Exploiting insecure deserialization vulnerabilities

https://vickieli.dev/insecure%20deserialization/pop-chains/

#Web

Diving into Unserialize - Medium

Exploration of PHP unserialize function and vulnerabilities

https://medium.com/swlh/diving-into-unserialize-3586c1ec97e

#Web

JWTweak - GitHub

Tool for JWT token manipulation

https://github.com/rishuranjanofficial/JWTweak

#Web

JWTSWISSKNIFE - GitHub

Tool for JWT token analysis and manipulation

https://github.com/TRIKKSS/JWTSWISSKNIFE

#Web

Path Truncations - DailySecurity

Exploiting path truncation vulnerabilities

https://www.dailysecurity.fr/les-path-truncations/

#Web

RSA Sign2n - GitHub

Tool for RSA signature forgery

https://github.com/silentsignal/rsa_sign2n

#Web

LFIDump - GitHub

Tool for dumping Local File Inclusion (LFI) vulnerabilities

https://github.com/p0dalirius/LFIDump

#Web

Blog on Gopherus - SpyClub

Blog post discussing the Gopherus tool

https://spyclub.tech/2018/08/14/2018-08-14-blog-on-gopherus/

#Web

GraphQL Common Vulnerabilities - Medium

Common vulnerabilities and exploitation in GraphQL

https://the-bilal-rizwan.medium.com/graphql-common-vulnerabilities-how-to-exploit-them-464f9fdce696

#Web

How to Exploit GraphQL Endpoint - YesWeHack Blog

Guide on exploiting GraphQL endpoints for bug bounty

https://blog.yeswehack.com/yeswerhackers/how-exploit-graphql-endpoint-bug-bounty/

#Web

GraphQL Vulnerabilities - Cheat Sheet

Cheat sheet for GraphQL vulnerabilities

https://0xn3va.gitbook.io/cheat-sheets/web-application/graphql-vulnerabilities

#Web

Param Miner - GitHub

Tool for mining parameters from web applications

https://github.com/PortSwigger/param-miner

#Web

SSLScan - GitHub

Tool for testing SSL/TLS vulnerabilities

https://github.com/rbsec/sslscan

#Web

PHP Object Injection Exploitation - SnoopySecurity

Exploiting PHP object injection vulnerabilities

https://snoopysecurity.github.io/web-application-security/2021/01/08/02_php_object_injection_exploitation-notes.html

#Web

Remote Code Execution via PHP Unserialize - NotSoSecure

Techniques for exploiting PHP unserialize for RCE

https://notsosecure.com/remote-code-execution-php-unserialize

#Web

Exploiting Memory Corruption Bugs - BleepingComputer

Exploiting memory corruption bugs in JavaScript

https://www.bleepingcomputer.com/news/security/invisible-characters-could-be-hiding-backdoors-in-your-javascript-code/

#Web

Atlas - GitHub

Tool for targeted scanning and exploitation

https://github.com/m4ll0k/Atlas

#Web

Twitter Post - Bughunter

Twitter post discussing a security topic by Bughunter

https://twitter.com/_bughunter/status/1577622994897215488?t=3PEK40bh0MBAVIMHl-OaaQ&s=19

#Web

VAF - GitHub

Tool for exploiting vulnerable access points

https://github.com/d4rckh/vaf

#Web

Intigriti Twitter Post

Twitter post discussing a security topic by Intigriti

https://twitter.com/intigriti/status/1582334895405531137?s=46&t=cTpgYzx6oqBSszNo0uvpDQ

#Web

PHP Filter Chain Generator - Synacktiv

Tool for generating PHP filter chains

https://github.com/synacktiv/php_filter_chain_generator

#Web

Server-Side Request Forgery - Cheat Sheet

Cheat sheet for server-side request forgery (SSRF)

https://0xn3va.gitbook.io/cheat-sheets/web-application/server-side-request-forgery

#Web

P0wny Shell - GitHub

Web shell for penetration testing

https://github.com/flozz/p0wny-shell/

#Web

Vercel Twitter Post

Twitter post discussing a security topic by Vercel

https://twitter.com/vercel/status/1584964835984703491?t=BfM8iyBIAYaCLsvHuCdRhQ&s=19

#Web

Backslash-Powered Scanning - PortSwigger Research

Research on using backslash for scanning and vulnerability hunting

https://portswigger.net/research/backslash-powered-scanning-hunting-unknown-vulnerability-classes

#Web

Nuclei Templates Creation - Andy Svints Blog

Experience in creating Nuclei templates for security testing

https://www.andysvints.com/nuclei-templates-creation-my-experience/

#Web

Hacker Tools: Nuclei - Intigriti Blog

Overview of hacker tools like Nuclei for security testing

https://blog.intigriti.com/2021/05/10/hacker-tools-nuclei/

#Web

Burp Suite Extension - BAppStore

Burp Suite extension for security testing

https://portswigger.net/bappstore/526f5564b7414bfe978e650d8ea6567b

#Web

Dfunc Bypasser - GitHub

Tool for bypassing security controls in web applications

https://github.com/teambi0s/dfunc-bypasser

#Web

Bypassing PHP disable_functions with Chankro - 0xdf Blog

Techniques for bypassing PHP disable_functions with Chankro

https://0xdf.gitlab.io/2019/08/02/bypassing-php-disable_functions-with-chankro.html

#Web

Rengine - GitHub

Tool for reconnaissance and intelligence gathering

https://github.com/yogeshojha/rengine

#Web

Galer - GitHub

Tool for security analysis of APIs

https://github.com/dwisiswant0/galer

#Web

API Security Checklist - Pentest-Tools

Checklist for API security testing

https://gitlab.com/pentest-tools/API-Security-Checklist

#Web

Time-Based Data Exfiltration - Security Cafe Blog

Techniques for time-based data exfiltration

https://securitycafe.ro/2017/02/28/time-based-data-exfiltration/

#Web

FFUF Advanced Tricks - Acceis Blog

Advanced usage tricks for FFUF tool

https://www.acceis.fr/ffuf-advanced-tricks/

#Web

XS-Leaks - Official Website

Information on cross-site leaks and vulnerabilities

https://xsleaks.dev/

#Web

Pwnfox - Mozilla Firefox Addon

Addon for security testing and exploitation

https://addons.mozilla.org/fr/firefox/addon/pwnfox/

#Web

WebSec - Resources and Information

Resource hub for web security enthusiasts

https://websec.fr/

#Web

Using an Android Emulator for API Hacking - ZeroDayHacker

Using Android emulator for API security testing

https://zerodayhacker.com/using-an-android-emulator-for-api-hacking/

#Web

URI Explained - Elsicarius Blog

Exploration of URIs and their security implications

https://elsicarius.fr/les-uri-vous-connaissez

#Web

Blind SQLi over WebSocket Automation - Rayhan0x01 Blog

Automation techniques for blind SQL injection over WebSocket

https://rayhan0x01.github.io/ctf/2021/04/02/blind-sqli-over-websocket-automation.html

#Web

Bypass CAPTCHAs using Python - CloudSEK Blog

Techniques for bypassing CAPTCHAs using Python

https://cloudsek.com/how-to-bypass-captchas-easily-using-python-and-other-methods/

#Web

AdonisJS - GitHub

Framework for building Node.js web applications

https://github.com/adonisjs/core

#Web

Swagger Parser - GitLab

Tool for parsing and interacting with Swagger APIs

https://gitlab.com/onemask/swaggerparser

#Web

XXE Blind Exploitation - PortSwigger

Exploiting blind XXE (XML External Entity) vulnerabilities

https://portswigger.net/web-security/xxe/blind

#Web

GraphQL Voyager - Ivan Goncharov

Interactive exploration tool for GraphQL schemas

https://ivangoncharov.github.io/graphql-voyager/

#Web

Inql - GitHub

GraphQL security testing tool

https://github.com/doyensec/inql

#Web

GraphQL Playground - GitHub

Interactive GraphQL IDE and testing tool

https://github.com/graphql/graphql-playground

#Web

Inql - GitHub

GraphQL security testing tool

https://github.com/doyensec/inql

#Web

PHP Tricks - Devansh Blog

Tricks and techniques for PHP security testing

https://devansh.xyz/ctfs/2021/09/11/php-tricks.html

#Web

BUUCTF Web Writeup - Exploit

Writeup and exploitation techniques for BUUCTF web challenges

https://exp10it.cn/2022/11/buuctf-web-writeup-8/

#Web

GraphQL Editor - GraphQLEditor

Tool for editing and visualizing GraphQL schemas

https://graphqleditor.com/fr/

#Web

Fuzzing for XSS via Nested Parsers - PTSecurity

Fuzzing techniques for XSS via nested parsers

https://swarm.ptsecurity.com/fuzzing-for-xss-via-nested-parsers-condition/

#Web

PHP Issue on GitHub - PHP

Issue discussion on GitHub regarding PHP

https://github.com/php/php-src/issues/10469

#Web

GLPI HTMLawed CVE-2022-35914 - Mayfly Blog

CVE-2022-35914 exploitation in GLPI using HTMLawed

https://mayfly277.github.io/posts/GLPI-htmlawed-CVE-2022-35914/

#Web

MXSS CVE-2020-26870 - Slides

Slides on MXSS (Mutation XSS) vulnerability CVE-2020-26870

https://slides.com/kevin-mizu/mxss-cve-2020-26870

#Web

HTML Sanitizer - Slides

Slides on HTML sanitization techniques

https://slides.com/kevin-mizu/html-sanitizer

#Web

Bypass URL Parser - GitHub

Tool for bypassing URL parsers

https://github.com/laluka/bypass-url-parser

#Web

Source Codester - Website

Collection of source code and resources

https://www.sourcecodester.com/

#Web

Exploitation of UUID - XMCO

Exploitation of UUID for compromising accounts

https://www.xmco.fr/veille-vulnerabilites-fr/exploitation-uuid-compromission-compte/

#Web

GLPIAnarchy - GitHub

Tool for exploiting vulnerabilities in GLPI

https://github.com/Feals-404/GLPIAnarchy

#Web

HTTP Request Smuggler - PortSwigger

Research on hidden HTTP request smuggling attack vectors

https://github.com/PortSwigger/http-request-smuggler

#Web

Hidden OAuth Attack Vectors - PortSwigger Research

Research on hidden OAuth attack vectors

https://portswigger.net/research/hidden-oauth-attack-vectors

#Web

OWASP ASVS Write-ups - GitBook

Write-ups and explanations for OWASP Application Security Verification Standard

https://owasp-skf.gitbook.io/asvs-write-ups/

#Web

BurpSuite - GitHub

Tool for web application security testing

https://github.com/x-Ai/BurpSuite

#Web

Server-side Prototype Pollution - YesWeHack Blog

Detection and exploitation techniques for server-side prototype pollution

https://blog.yeswehack.com/talent-development/server-side-prototype-pollution-how-to-detect-and-exploit/

#Web

Server-side Prototype Pollution - PortSwigger

Explanation and examples of server-side prototype pollution vulnerabilities

https://portswigger.net/web-security/prototype-pollution/server-side

#Web

Worldwide Server-side Cache Poisoning - Medium

Article on cache poisoning affecting Akamai edge nodes

https://medium.com/@jacopotediosi/worldwide-server-side-cache-poisoning-on-all-akamai-edge-nodes-50k-bounty-earned-f97d80f3922b

#Web

Wizdler - Mozilla Firefox Addon

Addon for interacting with SOAP web services

https://addons.mozilla.org/en-US/firefox/addon/wizdler/

#Web

Server-side Cache Poisoning - Twitter Post

Twitter post discussing server-side cache poisoning

https://twitter.com/kevin_mizu/status/1628665943797669890?s=46&t=1ohrl4OjJp9gO0lreTvpgA

#Web

Cross-site Smallish Scripting - TrustedSec Blog

Blog post discussing cross-site smallish scripting

https://www.trustedsec.com/blog/cross-site-smallish-scripting-xsss/

#Web

Blind SSRF Chains - GitHub

Tool for exploiting blind SSRF vulnerabilities

https://github.com/assetnote/blind-ssrf-chains

#Web

Diagrams and Movies of OAuth 2.0 Flows - Medium

Illustrated guide to OAuth 2.0 flows

https://darutk.medium.com/diagrams-and-movies-of-all-the-oauth-2-0-flows-194f3c3ade85

#Web

SAML Insecurity - Joonas Blog

Article on insecurities in SAML

https://joonas.fi/2021/08/saml-is-insecure-by-design/

#Web

HTB: Oouch - 0xdf Blog

Write-up of Hack The Box machine "Oouch"

https://0xdf.gitlab.io/2020/08/01/htb-oouch.html

#Web

Burp Suite Certified Practitioner Exam Study - GitHub

Study resources for the Burp Suite Certified Practitioner exam

https://github.com/botesjuan/Burp-Suite-Certified-Practitioner-Exam-Study

#Web

Vulnerable Code Snippets - GitHub

Collection of vulnerable code snippets for educational purposes

https://github.com/yeswehack/vulnerable-code-snippets

#Web

PP Finder - GitHub

Tool for finding potential prototype pollution vulnerabilities

https://github.com/yeswehack/pp-finder

#Web

Challenges by Blaklis - GitHub

Collection of security challenges

https://github.com/Blaklis/my-challenges

#Web

GraphQL for Pentesters - Acceis Blog

Guide for pentesters on GraphQL security testing

https://www.acceis.fr/graphql-for-pentesters/

#Web

FlowMate - GitHub

Tool for analyzing data flow and dependencies

https://github.com/usdAG/FlowMate

#Web

Top 10 Web Hacking Techniques 2023 - PortSwigger

Compilation of top web hacking techniques for 2023

https://portswigger.net/polls/top-10-web-hacking-techniques-2023

#Web

HTMX - Official Documentation

Documentation for HTMX library

https://htmx.org/docs/

#Web

HATEOAS - Wikipedia

Explanation of HATEOAS (Hypermedia as the Engine of Application State)

https://en.wikipedia.org/wiki/HATEOAS

#Web

Hacking HTMX Applications - Infosec Writeups

Guide on hacking HTMX applications

https://infosecwriteups.com/hacking-htmx-applications-f8d29665faf

#Web

Awesome WAF - GitHub

Collection of awesome Web Application Firewalls (WAFs)

https://github.com/0xInfection/Awesome-WAF

#Web

Cariddi - GitHub

Tool for crawling domains and scanning for endpoints, secrets, and more

https://github.com/edoardottt/cariddi

#Web

Grroxy

Proxy service for browsing anonymously

https://grroxy.com/

#Web

Cook - GitHub

Tool for web application security testing

https://github.com/glitchedgitz/cook

#Web

Jinja2 Template Injection Filter Bypasses - 0day.work

Techniques for bypassing Jinja2 template injection filters

https://0day.work/jinja2-template-injection-filter-bypasses/

#Web

Detecting and Exploiting Path Relative Stylesheet Import (PRSSI) Vulnerabilities - PortSwigger

Research on PRSSI vulnerabilities

https://portswigger.net/research/detecting-and-exploiting-path-relative-stylesheet-import-prssi-vulnerabilities

#Web

Grafana CVE-2021-43798 - VulnCheck

Analysis of Grafana vulnerability CVE-2021-43798

https://vulncheck.com/blog/grafana-cve-2021-43798

#Web

Reflector - GitHub

Tool for reflective cross-site scripting (RXSS) testing

https://github.com/elkokc/reflector

#Web

KNOXSS - Website

Cross-site scripting testing tool

https://knoxss.me/

#Web

SOZU - GitHub

Modern HTTP reverse proxy and load balancer

https://github.com/sozu-proxy/sozu

#Web

WordPress Webshell Plugin - GitHub

Plugin for adding webshell functionality to WordPress

https://github.com/p0dalirius/Wordpress-webshell-plugin

#Web

🔥 🤯 MALWARE COBALT STRIKE INDETECTABLE 🤯 🔥

Description non disponible

https://www.youtube.com/watch?v=CHk2XzFKwNc

#Red-team

Modern Windows Command & Control / Implants

Description non disponible

https://www.youtube.com/watch?v=3TOiqGMCAOg

#Red-team

MacOS Phishing: File Extension Spoofing

Description non disponible

https://www.youtube.com/watch?v=jMKtlS9H_TQ

#Red-team

#HITB2022SIN EDR Evasion Primer For Red Teamers - Jorge Gimenez & K...

Description non disponible

https://www.youtube.com/watch?v=CKfjLnEMfvI

#Red-team

06 - BruCON 0x0F - Red Team Tales: 7 Years of Physical Penetration ...

Description non disponible

https://www.youtube.com/watch?v=Ns-PvO6xUOI

#Red-team

Evil ClickOnce Backdooring Legit NET Application for Initial Access

Description non disponible

https://www.youtube.com/watch?v=UuhEzY4d6KM

#Red-team

Malware Club

Description non disponible

https://youtube.com/@malwareclub188

#Red-team

crow

Description non disponible

https://www.youtube.com/@crr0ww

#Red-team

15. Improving the Stealthiness of Memory Injection Techniques by Di...

Description non disponible

https://www.youtube.com/watch?v=_TEnBLt2JF4

#Red-team

c3rb3ru5d3d53c

Description non disponible

https://youtube.com/c/c3rb3ru5d3d53c

#Red-team

#HITBLockdown D2 - Documents Of Doom: Infecting Macos Via Office Ma...

Description non disponible

https://www.youtube.com/watch?v=-iSMrYZbbgo

#Red-team

RTV: Payload Delivery For Initial Access In Red Team Engagement by ...

Description non disponible

https://www.youtube.com/watch?v=bv53rYl34og

#Red-team

Writing Tiny, Efficient, And Reliable Malware by Rad Kawar

Description non disponible

https://www.youtube.com/watch?v=TfG9lBYCOq8&start=690

#Red-team

Introducing SEC565: Red Team Operations And Adversary Emulation

Description non disponible

https://www.youtube.com/watch?v=TwLLL8Ain24

#Red-team

DEF CON 31 - ELECTRONizing MacOS Privacy - A New Weapon in Your Red...

Description non disponible

https://www.youtube.com/watch?v=VWQY5R2A6X8

#Red-team

DEF CON 29 - Cedric Owens - Gone Apple Pickin: Red Teaming MacOS E...

Description non disponible

https://www.youtube.com/watch?v=IiMladUbL6E

#Red-team

DEF CON 29 Adversary Village - Matthew Eidelberg - Operation Bypas...

Description non disponible

https://www.youtube.com/watch?v=69xsb_TeazA

#Red-team

MCTTP 2023 | Talk by Fabian Mosch

Description non disponible

https://www.youtube.com/watch?v=XAvAVKXXC_8

#Red-team

DEF CON 30 - Tomer Bar - OopsSec -The bad, the worst and the ugly o...

Description non disponible

https://www.youtube.com/watch?v=StSLxFbVz0M

#Red-team

S3cur3Th1sSh1t

Description non disponible

https://www.youtube.com/@user-lf7lp1el9j/featured

#Red-team

Five Ways I got Caught before Lunch - Mystikcon 2021

Description non disponible

https://www.youtube.com/watch?v=qIbrozlf2wM

#Red-team

#HITB2021AMS D1T1 - MacOS Security: Escaping The Sandbox & Bypassin...

Description non disponible

https://www.youtube.com/watch?v=UAkC-brF6iQ

#Red-team

13. Fun with Shellcode(loaders) by Jean Maes

Description non disponible

https://www.youtube.com/watch?v=2UruLKYwyEc

#Red-team

11. Evasion in Depth - Techniques Across the Kill-Chain by Mariusz ...

Description non disponible

https://www.youtube.com/watch?v=IbA7Ung39o4

#Red-team

DEF CON 29 Adversary Village - Daniel Duggan - Designing a C2 Frame...

Description non disponible

https://www.youtube.com/watch?v=0Z3VadqyFiM

#Red-team

Prelude Discord Live Stream Series

Description non disponible

https://youtube.com/playlist?list=PLXooO-eTihBuvLEEP304PULUf4VIUsBy8&si=MNOL0ng7AgOZz7mO

#Red-team

Modlishka Advanced Phishing with @inf0sec1 & @noraj_rawsec

Description non disponible

https://www.youtube.com/watch?v=cBgqgZUiU5I

#Red-team

Red Teaming in the EDR age

Description non disponible

https://www.youtube.com/watch?v=l8nkXCOYQC4

#Red-team

DEF CON 30 - Kyle Avery - Avoiding Memory Scanners - Customizing Ma...

Description non disponible

https://www.youtube.com/watch?v=edIMUcxCueA

#Red-team

DEF CON 30 - Tarek Abdelmotaleb, Dr. Bramwell Brizendine - Weaponiz...

Description non disponible

https://www.youtube.com/watch?v=ME7IGHPcSKw

#Red-team

dev time

Description non disponible

https://www.youtube.com/live/xcDp6SAwC2s?si=V7rfWr0RUW0xh8kf

#Red-team

0Day Up Your Sleeve Attacking macOS Environments by Wojciech Reguła...

Description non disponible

https://www.youtube.com/watch?v=4jRFocEEX2M

#Red-team

Gemini Cyber Security

Description non disponible

https://www.youtube.com/@gemini_security/featured

#Red-team

Talent Need Not Apply: Tradecraft and Objectives of Job-themed APT ...

Description non disponible

https://www.youtube.com/watch?v=Ni1RqTwPiIQ

#Red-team

Needles Without The Thread: Threadless Process Injection - Ceri Coburn

Description non disponible

https://www.youtube.com/watch?v=z8GIjk0rfbI

#Red-team

Micah Zenko - Red Teaming Insights and Examples from Beyond - DEF C...

Description non disponible

https://www.youtube.com/watch?v=TGzMR9GfnIs

#Red-team

10. I Can See an Apple Behind Your Windows - Red Teaming macOS Envi...

Description non disponible

https://www.youtube.com/watch?v=IPFpyulNcRQ

#Red-team

2/16/22: Malware Development and NSO Group

Description non disponible

https://www.youtube.com/watch?v=d9pvNlZ9GGQ

#Red-team

PackMyPayload

GitHub repository for PackMyPayload tool.

https://github.com/mgeeky/PackMyPayload

#Red-team

Cobaltstrike-Aggressor-Scripts-Collection

GitHub repository for Cobalt Strike Aggressor Scripts Collection.

https://github.com/bytecod3r/Cobaltstrike-Aggressor-Scripts-Collection

#Red-team

Witchetty steganography espionage

Article on Witchetty steganography espionage.

https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/witchetty-steganography-espionage

#Red-team

Browser in the Browser Phishing Attack

Article on Browser in the Browser Phishing Attack.

https://mrd0x.com/browser-in-the-browser-phishing-attack/

#Red-team

Freeze

GitHub repository for Freeze tool by Optiv.

https://github.com/optiv/Freeze

#Red-team

ProtectMyTooling

GitHub repository for ProtectMyTooling tool by mgeeky.

https://github.com/mgeeky/ProtectMyTooling

#Red-team

Ivy

GitHub repository for Ivy tool by Optiv.

https://github.com/optiv/Ivy

#Red-team

SigThief

GitHub repository for SigThief tool by secretsquirrel.

https://github.com/secretsquirrel/SigThief

#Red-team

LazySign

GitHub repository for LazySign tool by jfmaes.

https://github.com/jfmaes/LazySign

#Red-team

ATP PowerShell Scripts

GitHub repository for ATP PowerShell Scripts by Mr-Un1k0d3r.

https://github.com/Mr-Un1k0d3r/ATP-PowerShell-Scripts

#Red-team

DarkLoadLibrary

GitHub repository for DarkLoadLibrary tool by bats3c.

https://github.com/bats3c/DarkLoadLibrary

#Red-team

c_syscalls

GitHub repository for c_syscalls tool by janoglezcampos.

https://github.com/janoglezcampos/c_syscalls

#Red-team

ScareCrow

GitHub repository for ScareCrow tool by Optiv.

https://github.com/optiv/ScareCrow

#Red-team

Mangle

GitHub repository for Mangle tool by Optiv.

https://github.com/optiv/Mangle

#Red-team

Freeze

GitHub repository for Freeze tool by Optiv.

https://github.com/optiv/Freeze

#Red-team

Hidding Cobalt Strike Traffic

Article on hiding Cobalt Strike traffic.

https://www.tarlogic.com/blog/hidding-cobalt-strike-traffic/

#Red-team

RedWarden

GitHub repository for RedWarden tool by mgeeky.

https://github.com/mgeeky/RedWarden

#Red-team

VXUG Papers

GitHub repository for VXUG Papers by vxunderground.

https://github.com/vxunderground/VXUG-Papers/

#Red-team

maldev-for-dummies

GitHub repository for maldev-for-dummies by chvancooten.

https://github.com/chvancooten/maldev-for-dummies

#Red-team

NimPackt-v1

GitHub repository for NimPackt-v1 tool by chvancooten.

https://github.com/chvancooten/NimPackt-v1

#Red-team

OffensiveNim

GitHub repository for OffensiveNim tool by byt3bl33d3r.

https://github.com/byt3bl33d3r/OffensiveNim

#Red-team

OffensiveCSharp

GitHub repository for OffensiveCSharp tool by matterpreter.

https://github.com/matterpreter/OffensiveCSharp

#Red-team

Bypassing AV DLL Side Loading

Article on bypassing AV DLL side loading.

https://www.flangvik.com/2019/07/24/Bypassing-AV-DLL-Side-Loading.html

#Red-team

Blinding EDR On Windows

Article on blinding EDR on Windows.

https://synzack.github.io/Blinding-EDR-On-Windows/

#Red-team

Creating an EDR and Bypassing it - Part 1

Article on creating an EDR and bypassing it - Part 1.

https://ethicalchaos.dev/2020/05/27/lets-create-an-edr-and-bypass-it-part-1/

#Red-team

Ceri Coburn

Author page for Ceri Coburn on Ethical Chaos.

https://ethicalchaos.dev/author/ceri-coburn/

#Red-team

ObfLoader

GitHub repository for ObfLoader tool by D1rkMtr.

https://github.com/D1rkMtr/ObfLoader

#Red-team

Malware Development

Article on malware development on Inf0sec.

https://inf0sec.fr/article-19.php

#Red-team

Malware Development

Article on malware development on Inf0sec.

https://inf0sec.fr/article-20.php

#Red-team

CS Situational Awareness BOF

GitHub repository for CS Situational Awareness BOF tool by trustedsec.

https://github.com/trustedsec/CS-Situational-Awareness-BOF

#Red-team

Evading EDR with ScareCrow

Article on evading EDR with ScareCrow.

https://adamsvoboda.net/evading-edr-with-scarecrow/

#Red-team

ATP Portal

Mr.Un1k0d3r portal.

https://mr.un1k0d3r.com/portal

#Red-team

A tale of EDR bypass methods

Article on EDR bypass methods.

https://s3cur3th1ssh1t.github.io/A-tale-of-EDR-bypass-methods/

#Red-team

Malware Development Detection

Red Actor article on Malware Development Detection.

https://red-actor.notion.site/Malware-Development-Detection-414b4670df1c4a07bf6321540573bcca

#Red-team

ObfLoader

GitHub repository for ObfLoader tool by D1rkMtr.

https://github.com/D1rkMtr/ObfLoader

#Red-team

OtterHacker on Twitter

Tweet by OtterHacker on Twitter.

https://twitter.com/OtterHacker/status/1578412886346502145

#Red-team

Kleiton0x7e on Twitter

Tweet by Kleiton0x7e on Twitter.

https://twitter.com/kleiton0x7e/status/1578017869866016769

#Red-team

Malware Development Part 1

Article on malware development part 1.

https://0xpat.github.io/Malware_development_part_1/

#Red-team

Azure AD

Azure AD phishing link.

https://sub.msandbu.org/azuread.png

#Red-team

Windows Signed Binary

GitHub repository for Windows Signed Binary by Mr-Un1k0d3r.

https://github.com/Mr-Un1k0d3r/Windows-SignedBinary

#Red-team

Microsoft Teams Webhooks

Article on Microsoft Teams Webhooks.

https://learn.microsoft.com/en-us/microsoftteams/platform/webhooks-and-connectors/how-to/add-incoming-webhook

#Red-team

AtomPePacker

GitHub repository for AtomPePacker tool by ORCx41.

https://github.com/ORCx41/AtomPePacker

#Red-team

WAM BAM!

Article on WAM BAM! technique.

https://blog.xpnsec.com/wam-bam/

#Red-team

Alh4zr3d on Twitter

Tweet by Alh4zr3d on Twitter.

https://twitter.com/Alh4zr3d/status/1582007737847644165?t=qMOzxLzuRBQM27s59DHM_A&s=19

#Red-team

Recreating an ISO Payload for Fun

Article on recreating an ISO payload for fun.

https://blog.sunggwanchoi.com/recreating-an-iso-payload-for-fun-and-no-profit/amp/

#Red-team

Hide API Call Strings with Ordinals

Article on hiding API call strings with ordinals.

https://rioasmara.com/2020/11/15/hide-api-call-strings-with-ordinals/

#Red-team

Malware Development Part 2

Article on malware development part 2.

https://0xpat.github.io/Malware_development_part_2/

#Red-team

Tor Fronting Utilizing Hidden Services

Article on Tor fronting utilizing hidden services.

https://www.vincentyiu.com/red-team/domain-fronting/tor-fronting-utilising-hidden-services-to-hide-attack-infrastructure

#Red-team

Tor Fronting Profile

GitHub repository for Tor fronting profile by mdsecresearch.

https://github.com/mdsecresearch/Publications/blob/master/tools/redteam/malleable/tor-fronting.profile

#Red-team

Contournement des Supervisions des EDR

Article sur le contournement des supervisions des EDR.

https://connect.ed-diamond.com/misc/misc-118/techniques-de-contournement-de-la-supervision-des-edr

#Red-team

Kernel Tracing Injection Detection

Article on kernel tracing injection detection.

https://blog.redbluepurple.io/windows-security-research/kernel-tracing-injection-detection

#Red-team

DripLoader

GitHub repository for DripLoader tool by xuanxuan0.

https://github.com/xuanxuan0/DripLoader

#Red-team

Removing Kernel Callbacks Using Signed Drivers

Article on removing kernel callbacks using signed drivers.

https://br-sn.github.io/Removing-Kernel-Callbacks-Using-Signed-Drivers/

#Red-team

Tour d'horizon des mécanismes de supervision des EDR

Article sur le tour d'horizon des mécanismes de supervision des EDR.

https://connect.ed-diamond.com/misc/misc-116/tour-d-horizon-des-mecanismes-de-supervision-des-edr

#Red-team

Windows Callbacks

Article on Windows callbacks.

http://blog.deniable.org/posts/windows-callbacks/

#Red-team

Dumpert

GitHub repository for Dumpert tool by outflanknl.

https://github.com/outflanknl/Dumpert

#Red-team

EtwExplorer

GitHub repository for EtwExplorer tool by zodiacon.

https://github.com/zodiacon/EtwExplorer

#Red-team

SilkETW

GitHub repository for SilkETW tool by mandiant.

https://github.com/mandiant/SilkETW

#Red-team

Payload Download Cradles

GitHub repository for Payload Download Cradles tool by VirtualAlllocEx.

https://github.com/VirtualAlllocEx/Payload-Download-Cradles

#Red-team

Maldev: Cloning & Signing

Article on Maldev: Cloning & Signing.

https://captmeelo.com/redteam/maldev/2022/11/07/cloning-signing.html

#Red-team

AV-1

Article on AV-1.

https://enelg52.github.io/av_1.html

#Red-team

SharpCompile

GitHub repository for SharpCompile tool by SpiderLabs.

https://github.com/SpiderLabs/SharpCompile

#Red-team

NoPowerShell

GitHub repository for NoPowerShell tool by bitsadmin.

https://github.com/bitsadmin/nopowershell

#Red-team

NSO Zero-Click

Article on NSO Zero-Click by Google Project Zero.

https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html

#Red-team

0xor0ne on Twitter

Tweet by 0xor0ne on Twitter.

https://twitter.com/0xor0ne/status/1590317045073465344?t=RuemA-Zoo3KqolHb5KfdYQ&s=19

#Red-team

Spoofing Gate

GitHub repository for Spoofing Gate tool by timwhitez.

https://github.com/timwhitez/Spoofing-Gate

#Red-team

RecycledGate

GitHub repository for RecycledGate tool by thefLink.

https://github.com/thefLink/RecycledGate

#Red-team

SysWhispers2

GitHub repository for SysWhispers2 tool by jthuraisamy.

https://github.com/jthuraisamy/SysWhispers2

#Red-team

PNG Steganography

Article on PNG steganography by Avast Decoded.

https://decoded.avast.io/martinchlumecky/png-steganography/

#Red-team

Staged vs Stageless Handlers

Article on staged vs stageless handlers.

https://buffered.io/posts/staged-vs-stageless-handlers/

#Red-team

CobaltStrikeBypassDefender

GitHub repository for CobaltStrikeBypassDefender tool by Processus-Thief.

https://github.com/Processus-Thief/CobaltStrikeBypassDefender

#Red-team

SharpGmailC2

GitHub repository for SharpGmailC2 tool by reveng007.

https://github.com/reveng007/SharpGmailC2

#Red-team

CarbonCopy

GitHub repository for CarbonCopy tool by paranoidninja.

https://github.com/paranoidninja/CarbonCopy

#Red-team

Offensive Snippets

GitHub repository for Offensive Snippets by 0xAbdullah.

https://github.com/0xAbdullah/Offensive-Snippets

#Red-team

PortBender

GitHub repository for PortBender tool by praetorian-inc.

https://github.com/praetorian-inc/PortBender

#Red-team

Presentations

GitHub repository for Presentations by Octoberfest7.

https://github.com/Octoberfest7/Presentations

#Red-team

BeastArsenal

GitHub repository for BeastArsenal tool by CZashi.

https://github.com/CZashi/BeastArsenal

#Red-team

Fantastic Rootkits Part 1

Article on Fantastic Rootkits Part 1 by CyberArk.

https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-1

#Red-team

cThreadHijack

GitHub repository for cThreadHijack tool by connormcgarr.

https://github.com/connormcgarr/cThreadHijack

#Red-team

Leveraging Microsoft Teams for Initial Access

Article on leveraging Microsoft Teams for initial access.

https://posts.inthecyber.com/leveraging-microsoft-teams-for-initial-access-42beb07f12c4

#Red-team

Codecepticon

GitHub repository for Codecepticon tool by Accenture.

https://github.com/Accenture/Codecepticon

#Red-team

Malware Development Part 6

Article on malware development part 6.

https://0xpat.github.io/Malware_development_part_6/

#Red-team

Red Team Tips

Article on Red Team tips.

https://www.vincentyiu.com/red-team-tips

#Red-team

VySecurity Rocks

Archive of VySecurity Rocks.

https://web.archive.org/web/20210329173433/https://vysecurity.rocks/?

#Red-team

Sharperner

GitHub repository for Sharperner tool by aniqfakhrul.

https://github.com/aniqfakhrul/Sharperner

#Red-team

DebugOff

GitHub repository for DebugOff tool by 0xor0ne.

https://github.com/0xor0ne/debugoff

#Red-team

Hiding Windows API Calls Part 1

Article on hiding Windows API calls part 1.

https://trikkss.github.io/posts/hiding_windows_api_calls_part1/

#Red-team

EDR Observations

Article on EDR observations.

https://www.signal-labs.com/blog/edr-observations

#Red-team

Automating Red Team Infrastructure with Terraform

Article on automating Red Team infrastructure with Terraform.

https://www.ired.team/offensive-security/red-team-infrastructure/automating-red-team-infrastructure-with-terraform

#Red-team

RedWarden

GitHub repository for RedWarden tool by mgeeky.

https://github.com/mgeeky/RedWarden

#Red-team

DallasFR2 on Twitter

Tweet by DallasFR2 on Twitter.

https://twitter.com/DallasFR2/status/1610717054780280834?s=20&t=EVUO2DNQoMEcT0h5s9UhsA

#Red-team

UnhookingPatch

GitHub repository for UnhookingPatch tool by D1rkMtr.

https://github.com/D1rkMtr/UnhookingPatch

#Red-team

RedGuard

GitHub repository for RedGuard tool by wikiZ.

https://github.com/wikiZ/RedGuard

#Red-team

RePulsar

GitHub repository for RePulsar tool by APT64.

https://github.com/APT64/RePulsar

#Red-team

Offensive Tools

GitHub repository for Offensive Tools by post-cyberlabs.

https://github.com/post-cyberlabs/Offensive_tools/tree/main/PostDump

#Red-team

Go Phishing

Phishing techniques and strategies.

https://tyeyeah.github.io/2022/08/06/2022-08-06-Go-Phishing/

#Red-team

Bypass Anti-Virus

Methods for bypassing antivirus software.

https://tyeyeah.github.io/2021/08/02/2021-08-02-Bypass-Anti-Virus/

#Red-team

Phishing from Scratch

Guide on creating phishing attacks from scratch.

https://www.opencyber.com/phishing-from-scratch/

#Red-team

WOW64 User APC

Exploring User APC in WOW64 architecture.

https://repnz.github.io/posts/apc/wow64-user-apc/

#Red-team

PwnAuth

GitHub repository for PwnAuth tool by mandiant.

https://github.com/mandiant/PwnAuth

#Red-team

Inline Execute PE

GitHub repository for Inline Execute PE tool by Octoberfest7.

https://github.com/Octoberfest7/Inline-Execute-PE

#Red-team

Dark Vortex Blog

Articles on various security topics.

https://0xdarkvortex.dev/blogs/

#Red-team

Hiding in Plain Sight

Techniques for hiding malicious activities.

https://0xdarkvortex.dev/hiding-in-plainsight/

#Red-team

BypassAV

GitHub repository for BypassAV tool by CMEPW.

https://github.com/CMEPW/BypassAV

#Red-team

CRTO

GitHub repository for CRTO tool by h3ll0clar1c3.

https://github.com/h3ll0clar1c3/CRTO

#Red-team

Inf0sec Article 21

Article on security topics by inf0sec.

https://inf0sec.fr/article-21.php

#Red-team

Conti Pentester Guide Leak

GitHub repository for Conti Pentester Guide Leak by ForbiddenProgrammer.

https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak

#Red-team

OperatorsKit

GitHub repository for OperatorsKit tool by REDMED-X.

https://github.com/REDMED-X/OperatorsKit

#Red-team

RedTeaming CheatSheet

GitHub repository for RedTeaming CheatSheet by 0xJs.

https://github.com/0xJs/RedTeaming_CheatSheet

#Red-team

Manage Engine PMP Passwords

How to decrypt Manage Engine PMP passwords for fun and domain admin - a red teaming tale.

https://www.shielder.com/blog/2022/09/how-to-decrypt-manage-engine-pmp-passwords-for-fun-and-domain-admin-a-red-teaming-tale/

#Red-team

Hijack Explorer Context Menu

Exploiting explorer context menu for persistence.

https://ristbs.github.io/2023/02/15/hijack-explorer-context-menu-for-persistence-and-fun.html

#Red-team

n00py1 Twitter Post

Twitter post by n00py1.

https://twitter.com/n00py1/status/1626268178803302401?t=St6HqkL1NtWMBXhfxhbPvw&s=19

#Red-team

Malware AV Evasion

Malware evasion techniques against antivirus.

https://cocomelonc.github.io/malware/2023/02/12/malware-av-evasion-11.html

#Red-team

Christbowel Red Teamer

GitHub repository for Red Teamer by Christbowel.

https://github.com/Christbowel/Red-Teamer

#Red-team

Sliver C2

Sliver C2 leveraged by many threat actors.

https://www.cybereason.com/blog/sliver-c2-leveraged-by-many-threat-actors

#Red-team

NTDLL Gadget Injection

GitHub repository for NTDLL Gadget Injection by LloydLabs.

https://github.com/LloydLabs/ntqueueapcthreadex-ntdll-gadget-injection

#Red-team

Bypass Defender

Bypassing Windows Defender techniques.

https://mrfey.fr/ARTICLES/Bypass_Defender

#Red-team

Keepass DLL Hijacking

Exploiting Keepass for DLL hijacking.

https://skr1x.github.io/keepass-dll-hijacking/

#Red-team

Spoofing Call Stacks with Timers

Behind the mask: spoofing call stacks dynamically with timers.

https://www.cobaltstrike.com/blog/behind-the-mask-spoofing-call-stacks-dynamically-with-timers/

#Red-team

Cobalt Strike Reflective Loader

Defining Cobalt Strike reflective loader.

https://securityintelligence.com/posts/defining-cobalt-strike-reflective-loader/

#Red-team

Persistence Context Menu

Persistence techniques using context menu.

https://pentestlab.blog/2023/03/13/persistence-context-menu/

#Red-team

Revisiting the UDRL

Simplifying development of Universal Distributed Reflective Loader (UDRL).

https://www.cobaltstrike.com/blog/revisiting-the-udrl-part-1-simplifying-development/

#Red-team

EgeBalci SGN

GitHub repository for SGN by EgeBalci.

https://github.com/EgeBalci/sgn

#Red-team

Lsecqt OffensiveCpp

GitHub repository for OffensiveCpp by lsecqt.

https://github.com/lsecqt/OffensiveCpp

#Red-team

DallasFR WinShellcode

GitHub repository for WinShellcode by DallasFR.

https://github.com/DallasFR/WinShellcode

#Red-team

Direct Syscalls Journey

Direct syscalls: a journey from high to low.

https://redops.at/en/blog/direct-syscalls-a-journey-from-high-to-low

#Red-team

ScareCrow

GitHub repository for ScareCrow by optiv.

https://github.com/optiv/ScareCrow

#Red-team

Acheron

GitHub repository for Acheron by f1zm0.

https://github.com/f1zm0/acheron

#Red-team

LNK Between Browsers

Linking browser processes via LNK files.

https://www.mandiant.com/resources/blog/lnk-between-browsers

#Red-team

Freeze.rs

GitHub repository for Freeze.rs by optiv.

https://github.com/optiv/Freeze.rs

#Red-team

RistBs Twitter Post

Twitter post by RistBs.

https://twitter.com/RistBs/status/1654181601775874048

#Red-team

Introducing ReSocks

Introducing ReSocks - a tool for SOCKS proxy redirection.

https://blog.redteam-pentesting.de/2023/introducing-resocks/

#Red-team

The Dangers of Google's .ZIP TLD

Security risks associated with Google's .ZIP top-level domain.

https://medium.com/@bobbyrsec/the-dangers-of-googles-zip-tld-5e1e675e59a5

#Red-team