Article: Episode #173: Tis the Season - published almost 11 years ago. Content: Hal finds some cheer From somewhere near the borders of scriptistan, we send you: function t { for ((i=0; $i < $1; i++)); do s=$((8-$i)); e=$((8+$i)); for ((j=0; j <= $e; j++)); do [ $j -ge $s ] && echo -n '^' || echo -n ' '; done; echo; done } function T { for ((i=0; $i < $1; i++)); do for ((j=... http://blog.commandlinekungfu.com/2013/12/episode-173-tis-season.html Published: 2013 12 31 10:00:00 Received: 2023 03 31 08:44:32 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
Article: Photo - published almost 11 years ago. Content: https://potatohatsecurity.tumblr.com/post/70673517569 Published: 2013 12 21 10:42:58 Received: 2021 06 06 09:04:58 Feed: Team PotatoSec Source: Team PotatoSec Category: Cyber Security Topic: Cyber Security |
|
Article: Best of the Best in 2013: The Armory - published almost 11 years ago. Content: Everyone likes something for free. And there is no better place to go to get free analysis, intelligence and tools than The Armory on M-Unition. During the past year, we've offered intelligence and analysis on new threat activity, sponsored open source projects and offered insight on free tools like Redline™, all of which has been high... http://www.fireeye.com/blog/threat-research/2013/12/2013-armory.html Published: 2013 12 20 21:48:44 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Creating custom username list & wordlist for bruteforciing. - published almost 11 years ago. Content: During brute-forcing every time you need custom password list & username list. Username list is as well as important as password list, it should be unique for every organization.If we use traditional large number of username list , then it will be tedious process.Custom username list also useful in username enumeration. Creating custom username list:... https://tipstrickshack.blogspot.com/2013/12/creating-custom-username-list-wordlist.html Published: 2013 12 18 08:34:00 Received: 2024 02 20 16:42:59 Feed: Hacking and Tricks Source: Hacking and Tricks Category: Cyber Security Topic: Cyber Security |
|
Article: Affiliate System Drops ZeroAccess. - published almost 11 years ago. Content: I was recently looking around on darkode and I found this affiliate. This affiliate was recently covered by @kafeine here. I began talking to the owner/operator of this affiliate system and after a few edits to cracked Blackhole (lol) i sent him my faked stats and I was quickly accepted. Whats an affiliate? An affiliate is a system were a content owner pays... http://trojan7malware.blogspot.com/2013/12/affiliate-system-drops-zeroaccess.html Published: 2013 12 17 17:31:00 Received: 2024 03 20 04:23:50 Feed: Trojan7Malware Source: Trojan7Malware Category: Cyber Security Topic: Cyber Security |
|
Article: OpenIOC Series: Investigating with Indicators of Compromise (IOCs) – Part I - published almost 11 years ago. Content: Written by Devon Kerr & Will Gibb The Back to Basics: OpenIOC blog series previously discussed how Indicators of Compromise (IOCs) can be used to codify information about malware or utilities and describe an attacker's methodology. Also touched on were the parts of an IOC, such as the metadata, references, and definition sec... http://www.fireeye.com/blog/threat-research/2013/12/openioc-series-investigating-indicators-compromise-iocs.html Published: 2013 12 16 20:58:10 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Taming ROP on Sandy Bridge - Georg Wicherski (May 2013) - published almost 11 years ago. Content: submitted by /u/HockeyInJune [link] [comments]... https://www.reddit.com/r/vrd/comments/1s15el/taming_rop_on_sandy_bridge_georg_wicherski_may/ Published: 2013 12 03 23:17:28 Received: 2021 06 06 11:29:11 Feed: Vulnerability Research and Development Source: Vulnerability Research and Development Category: Alerts Topic: Vulnerabilities |
|
Article: Bochspwn: Exploiting Kernel Race Conditions Found via Memory Access Patterns - Mateusz "j00ru" Jurczyk and Gynvael Coldwind (May 2013) - published almost 11 years ago. Content: submitted by /u/HockeyInJune [link] [comments] https://www.reddit.com/r/vrd/comments/1s14rw/bochspwn_exploiting_kernel_race_conditions_found/ Published: 2013 12 03 23:10:59 Received: 2021 06 06 11:29:11 Feed: Vulnerability Research and Development Source: Vulnerability Research and Development Category: Alerts Topic: Vulnerabilities |
Article: PS4 jailbreak - published almost 11 years ago. Content: I'm taking NO CREDIT for this jailbreak. This jailbreak was done by @reckz0r ______ _ _____ | ___ \ | | | _ | | |_/ / ___ ___ | | __ ____ | |/' | _ __ | / / _ \ / __| | |/ / |_ / | /| | | '__|| |\ \ | __/ | (__ | < / / \ |_/ / | | 2011-present\_| \_| \___| \_... http://trojan7malware.blogspot.com/2013/12/ps4-jailbreak.html Published: 2013 12 01 11:45:00 Received: 2021 06 06 09:05:03 Feed: Trojan7Malware Source: Trojan7Malware Category: Cyber Security Topic: Cyber Security |
|
Click to Open Code Editor