Get Mystery Box with random crypto!

-CyberSecurityTechnologies-

Logo of telegram channel cybersecuritytechnologies — -CyberSecurityTechnologies- C
Logo of telegram channel cybersecuritytechnologies — -CyberSecurityTechnologies-
Channel address: @cybersecuritytechnologies
Categories: Technologies
Language: English
Subscribers: 7.24K
Description from channel

Welcome to -CyberSecurityTechnologies- Channel:
- BlueTeam (APT/OpSec/DFIR)
- Offensive Security (RedTeaming/TH/PenTesting)
- Reverse Engineering/Malware Analisys (TTPs)
- Web Security/DevSecOps
- Tools/PoC/Research
Tags: t.me/CyberSecurityTechnologies/2

Ratings & Reviews

2.33

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

0

3 stars

2

2 stars

0

1 stars

1


The latest Messages

2021-04-28 07:12:01 #Red_Team_Tactics
1. Exploiting Race conditions with Nuclei
https://blog.projectdiscovery.io/exploiting-race-conditons
2. Information about a signed UEFI Shell that can be used when Secure Boot is enabled
https://github.com/HackingThings/SignedUEFIShell
431 views04:12
Open / Comment
2021-04-28 07:12:01 #Cloud_Security
Exporting ADFS certificates revisited:
Tactics, Techniques and Procedures
https://o365blog.com/post/adfs
427 views04:12
Open / Comment
2021-04-28 06:02:31 #Threat_Research
1. An information disclosure vulnerability exists in the
/proc/pid/syscall functionality of Linux Kernel 5.1
Stable and 5.4.66 (PoC for CVE-2020-28588)
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1211
2. Examining JavaScript Inter-Process Communication in Firefox
https://blog.mozilla.org/attack-and-defense/2021/04/27/examining-javascript-inter-process-communication-in-firefox
3. Abusing Replication: Stealing AD FS Secrets Over the Network
https://www.fireeye.com/blog/threat-research/2021/04/abusing-replication-stealing-adfs-secrets-over-the-network.html
467 viewsedited  03:02
Open / Comment
2021-04-28 06:02:31 #Whitepaper
"Contextualizing the MITRE ATT&CK Framework", 2021.
425 views03:02
Open / Comment
2021-04-28 06:02:31 #Blue_Team_Techniques
1. Anatomy of Cobalt Strike’s DLL Stager
https://blog.nviso.eu/2021/04/26/anatomy-of-cobalt-strike-dll-stagers
2. Unit tests for blue teams to aid with building detections for some common macOS post exploitation methods
https://github.com/cedowens/Swift-Attack
416 views03:02
Open / Comment
2021-04-28 06:02:30 #exploit
CVE-2021-26868:
Windows 10 LPE Exploit
https://github.com/mavillon/CVE-2021-26868
430 views03:02
Open / Comment
2021-04-28 06:02:30 #Research
"TROJANZOO: Everything you ever wanted to know about neural backdoors (but were afraid to ask)", 2020.
475 views03:02
Open / Comment
2021-04-28 05:59:01 #WLAN_Security
NETGEAR Nighthawk Smart Wi-Fi Router R7000 - httpd PreAuth RCE (PoC for CVE-2021-31802)
https://ssd-disclosure.com/ssd-advisory-netgear-nighthawk-r7000-httpd-preauth-rce
421 views02:59
Open / Comment
2021-04-27 06:02:30 #Threat_Research
1. Hypervisor Research Notes
https://github.com/farazsth98/hypervisor_research_notes
2. DRDoS warning: deep analysis of TCP reflection
https://paper.seebug.org/1571
304 views03:02
Open / Comment
2021-04-27 06:02:30 #Blue_Team_Techniques
1. A python tool to parse Windows Background Intelligent Transfer Service (BITS) database files
https://github.com/fireeye/BitsParser
2. SSH Sniffing (SSH Spying) Methods and Defense
https://www.infosecmatter.com/ssh-sniffing-ssh-spying-methods-and-defense
306 views03:02
Open / Comment