Hacker Trends
01/11
01/12
01/13
Statistic
01/18 18:21 (UTC)
01/11
01/12
01/13
5 Posts
Exploitation Walkthrough and Techniques - Ivanti Connect Secure RCE (CVE-2025-0282)
https://
labs.watchtowr.com
/exploitation-walkthrough-and-techniques-ivanti-connect-secure-rce-cve-2025-0282/
3 Posts
Exploring malicious Windows drivers (Part 1): Introduction to the kernel and drivers
https://
blog.talosintelligence.com
/exploring-malicious-windows-drivers-part-1-introduction-to-the-kernel-and-drivers/
3 Posts
Exploring malicious Windows drivers (Part 2): the I/O system, IRPs, stack locations, IOCTLs and more
https://
blog.talosintelligence.com
/exploring-malicious-windows-drivers-part-2/
3 Posts
GitHub - ColeHouston/Sunder: Windows rootkit designed to work with BYOVD exploits
https://
github.com
/ColeHouston/Sunder
3 Posts
$2m laundered: the YouTube crypto tutorials’ huge scam (investigation) | by Tim | Jan, 2025 | Medium
https://
medium.com
/@tim.sh/2m-laundered-the-youtube-crypto-tutorials-huge-scam-investigation-8f4a0a3c92d8