Wednesday, 4 September 2019

perPage: 7,

Related Posts:

  • RtlDecompresBuffer VulnerabilityIntroduction The RtlDecompressBuffer is a WinAPI implemented on ntdll that is often used by browsers and applications and also by malware to decompress buffers compressed on LZ algorithms for example LZNT1. The first parame… Read More
  • Linux Command Line Hackery Series: Part 1 In this concise article we will learn some basics of how to use Linux Command line, so lets get started. Requirements: 1. An open Terminal in your Linux Box. I'm using Kali Linux 2.0 or you can check out this amazing … Read More
  • HiddenWasp Linux Malware Backdoor Samples Intezer HiddenWasp Malware Stings Targeted Linux Systems Download. Email me if you need the password (see in my profile) Malware Inventory (work in progress) Links updated: Jan 19, 2023 File informatio 8… Read More
  • ShellShock Payload Sample Linux.Bashlet Someone kindly shared their sample of the shellshock malware described by the Malware Must die group - you can read their analysis here: MMD-0027-2014 - Linux ELF bash 0day (shellshock): The fun has only just begun... … Read More
  • Smart Contract Hacking Chapter 4 – Attacking Reentrancy Vulnerabilities  Reentrancy Intro In this chapter we will take a look at bypassing incorrectly coded value transaction patterns within Ethereum smart contracts. These incorrectly coded patterns can lead to Reentrancy attacks that ult… Read More

0 comments:

Post a Comment

Blog Archive

GET THE LOVE OF YOUR LIFE

Popular Posts

Recent Posts