-
We have some of these but need to evaluate the list for possible additional stuff.
---
http://1d4.us/archive/network-28-07-2014.txt
http://1d4.us/archive/network-29-07-2014.txt
http://1d4.us/archive…
-
https://ozsec.sharepoint.com/:w:/s/OzSec_Conference/EWw-FdRQpeZGnTbe9qdQ6NAB7N9m8pBvKOTJqpuAoZbdww?e=xsDW5Q
Ignite Your Cyber Security Journey at the OzSec 2024 Boot Camp
Join us for an intensi…
-
* @bushidocodes, Sean McBride, Comprehension: What is the advantage of having a slow progressive attack...
* @bushidocodes, Sean McBride, Comprehension: What is it about the telnet protocol that make…
-
PE files (or generally other executable files, but let's stick to PE files in this ticket) do not necessarily need to conform to the PE specification in order to be loadable by Windows. There are ofte…
-
https://github.com/certtools/malware_name_mapping can be used to map malware names with the IntelMQ modify bot. However the 500 regexp rules are tried sequentially and this is quite resource intensive…
-
This issue has been sent to Cisco PSIRT before, handled as PSIRT-0722824177, but deemed not a security issue.
It is currently used by malware spammers to evade archive scanning. A similar issue [mi…
-
Hello there,
I am currently using an approach similar to PANDA, embedding callbacks into QEMU's v8 source code for malware research in my master's thesis. One of my core needs is to keep track of c…
-
See linked document below
https://docs.google.com/spreadsheets/d/1sXH-SDQEJdAao4nB0fxumcNLYum1ocFi3342a5QOTdI/edit?usp=sharing
If you need this in a different format please let me know.
-
Steve Gibson's Security now podcast has excelent transcripts .
https://www.grc.com/securitynow.htm
The files are very clearly marked and will be very easy to scrape with rvest
https://www.…