Gyver
@dr4s1l
ID: 3009285878
03-02-2015 14:02:38
4,4K Tweet
423 Followers
1,1K Following
Attacking cars wireless exposed communication (Tesla Model Y, NFC and Proxmark) Interesting white paper (2022) by Josep Pi Rodriguez (IOActive, Inc) White paper link: act-on.ioactive.com/acton/attachme… #automotive #cybersecurity
Total Identity Compromise: DART lessons on securing Active Directory, by Matt Zorich techcommunity.microsoft.com/t5/microsoft-s…
After two years of hard work with Damien Cauquil (@[email protected]) , we are proud to release for DEFCON32 the first public version of WHAD, a whole new ecosystem of opensource libs, tools & firmwares for wireless security ! The main repo is here: github.com/whad-team/whad… . And now, demo time ! [1/n]
Arsenal : Bypass EDR’s/XDR’s and make malware analysis harder : systemweakness.com/arsenal-bypass… Arsenal 2.0: Elevating Malware Stealth Tactics to bypass static detection : osintteam.blog/arsenal-2-0-el… Ref : SysWhispers2 : AV/EDR evasion via direct system calls : github.com/xenoscr/SysWhi…
Harden your SCCM infrastructure! It’s a goldmine for attackers - especially TAKEOVER-1 , a common misconfiguration that can lead to full Active Directory compromise. Red Team Tip ♦️ If ADCS isn’t fruitful, don’t sleep on TAKEOVER-1. It’s trivial to exploit with the right tools.
A repo for learning various heap exploitation techniques by Shellphish github.com/shellphish/how…