11/23

AWS penetration testing: a step-by-step guide

https://www.hackthebox.com/blog/aws-pentesting-guide
AWS penetration testing: a step-by-step guide

Hackers abuse Avast anti-rootkit driver to disable defenses

https://www.bleepingcomputer.com/news/security/hackers-abuse-avast-anti-rootkit-driver-to-disable-defenses/
Hackers abuse Avast anti-rootkit driver to disable defenses

Create your own C2 using Python- Part 1 - G3tSyst3m’s Infosec Blog

https://g3tsyst3m.github.io/c2/python/Create-your-own-C2-using-Python-Part-1/
Create your own C2 using Python- Part 1 - G3tSyst3m’s Infosec Blog

How to Emulate a Ransomware Attack – Practical Security Analytics LLC

https://practicalsecurityanalytics.com/how-to-emulate-a-ransomware-attack/
How to Emulate a Ransomware Attack – Practical Security Analytics LLC

Andrew Tate's Real World website compromised, data stolen • The Register

https://go.theregister.com/feed/www.theregister.com/2024/11/22/andrew_tate_raid/
Andrew Tate's Real World website compromised, data stolen • The Register

Windows security and resiliency: Protecting your business | Windows Experience Blog

https://blogs.windows.com/windowsexperience/2024/11/19/windows-security-and-resiliency-protecting-your-business/
Windows security and resiliency: Protecting your business | Windows Experience Blog

.:: Phrack Magazine ::.

https://phrack.org/issues/66/10.html
.:: Phrack Magazine ::.

CVE-2024-8811: WinZip Flaw Allows Malicious Code Execution

https://securityonline.info/cve-2024-8811-winzip-flaw-allows-malicious-code-execution/
CVE-2024-8811: WinZip Flaw Allows Malicious Code Execution

👻 Ghost ESP Flasher 👻

https://flasher.spookytools.com/
👻 Ghost ESP Flasher 👻