12/25

Introduction to the Windows Filtering Platform – Pavel Yosifovich

http://scorpiosoftware.net/2022/12/25/introduction-to-the-windows-filtering-platform/
Introduction to the Windows Filtering Platform – Pavel Yosifovich

Pwn the ESP32 Forever: Flash Encryption and Sec. Boot Keys Extraction - LimitedResults

https://limitedresults.com/2019/11/pwn-the-esp32-forever-flash-encryption-and-sec-boot-keys-extraction/
Pwn the ESP32 Forever: Flash Encryption and Sec. Boot Keys Extraction - LimitedResults

Linux kernel exploit development - Breaking Bits

https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development
Linux kernel exploit development - Breaking Bits

GitHub - securityjoes/ThreatResearch

https://github.com/securityjoes/ThreatResearch/
GitHub - securityjoes/ThreatResearch

New info-stealer malware infects software pirates via fake cracks sites

https://www.bleepingcomputer.com/news/security/new-info-stealer-malware-infects-software-pirates-via-fake-cracks-sites/
New info-stealer malware infects software pirates via fake cracks sites

W4SP Stealer Discovered in Multiple PyPI Packages Under Various Names

https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html
W4SP Stealer Discovered in Multiple PyPI Packages Under Various Names

Expert found Backdoor credentials in ZyXEL LTE3301 M209Security Affairs

https://securityaffairs.co/wordpress/139974/hacking/backdoor-credentials-zyxel-lte3301-m209.html
Expert found Backdoor credentials in ZyXEL LTE3301 M209Security Affairs

Twitter Files Thread: The Spies Who Loved Twitter

https://open.substack.com/pub/taibbi/p/twitter-files-thread-the-spies-who?r=5mz1&utm_campaign=post&utm_medium=web
Twitter Files Thread: The Spies Who Loved Twitter

hexacon2022_AppleAVD/hexacon2022_AppleAVD.pdf at main · isciurus/hexacon2022_AppleAVD · GitHub

https://github.com/isciurus/hexacon2022_AppleAVD/blob/main/hexacon2022_AppleAVD.pdf
hexacon2022_AppleAVD/hexacon2022_AppleAVD.pdf at main · isciurus/hexacon2022_AppleAVD · GitHub

Powershell Without Powershell - How To Bypass Application Whitelisting, Environment Restrictions & AV - Black Hills Information Security

https://www.blackhillsinfosec.com/powershell-without-powershell-how-to-bypass-application-whitelisting-environment-restrictions-av/
Powershell Without Powershell - How To Bypass Application Whitelisting, Environment Restrictions & AV - Black Hills Information Security

@0xLupin Challenge 🎄

https://www.hacklupin.com/
@0xLupin Challenge 🎄

LTR

https://leanpub.com/b/LearningTheRopes
LTR

Pwn the ESP32 Secure Boot - LimitedResults

https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/
Pwn the ESP32 Secure Boot - LimitedResults

Pwn the ESP32 crypto-core - LimitedResults

https://limitedresults.com/2019/08/pwn-the-esp32-crypto-core/
Pwn the ESP32 crypto-core - LimitedResults

Week 52 – 2022 – This Week In 4n6

http://thisweekin4n6.com/2022/12/25/week-52-2022/
Week 52 – 2022 – This Week In 4n6

Forensic artifacts in Office 365 and where to find them - Microsoft Tech Community

https://techcommunity.microsoft.com/t5/security-compliance-and-identity/forensic-artifacts-in-office-365-and-where-to-find-them/ba-p/3634865
Forensic artifacts in Office 365 and where to find them - Microsoft Tech Community