Category: Ebooks

Threat Hunter Playbook 0

Threat Hunter Playbook: aid the development of techniques and hypothesis for hunting campaigns

A Threat hunter playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Sysmon and Windows Events logs. This project will provide specific chains of events exclusively at the host level so that you...

Red Team Books 0

Red Team Books

BOOKSHELF TECHIE Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp. Social Engineering: The Art of Human Hacking by Christopher Hadnagy Practical Lock Picking: A Physical Penetration Tester’s Training Guide by Deviant Ollam The...

Write Fully Undetectable Malware 0

How to Write Fully Undetectable Malware

  Write Fully Undetectable Malware For many years, there is an ongoing conflict between the malware developers and antivirus, the ones that chasing each other. Unfortunately, the malware developers always seem to win and...

0

Hijacking .NET to Defend PowerShell

Abstract—With the rise of attacks using PowerShell in the recent months, there has not been a comprehensive solution for monitoring or prevention. Microsoft recently released the AMSI solution for PowerShell v5, however, this can...

0

Kernel Driver mmap Handler Exploitation

Contents 1. Introduction to Kernel Drivers ………………………………………………………….. 1 2. Kernel mmap Handler …………………………………………………………………….. 3 2.1 Simple mmap Handler ……………………………………………………………………………… 3 2.2 Empty mmap Handler ………………………………………………………………………………. 4 2.3 An mmap Handler with vm_operations_struct ………………………………………………. 6...

0

awesome-appsec: resources for learning about application security

Awesome AppSec A curated list of resources for learning about application security. Contains books, websites, blog posts, and self-assessment quizzes. Maintained by Paragon Initiative Enterprises with contributions from the application security and developer communities. We also...

0

Penetration Testing – A Survival Guide

A complete pentesting guide facilitating smooth backtracking for working hackers. The need for penetration testers has grown well over what the IT industry ever anticipated. Running just a vulnerability scanner is no longer an...

0

Code Injection – HTML Injection

Code Injection – HTML Injection Contents Hack……………………………………………………………………………………………………………………………………………3 HTML Injection as Code Injection …………………………………………………………………………………………………..5 Deploying a sample Vulnerable ASP code for HTML Injection ……………………………………………………………6 Injecting HTML Code into ASP based Application – HTML Injection ………………………………………………….18...