Get Mystery Box with random crypto!

1.The State of Exploit Development: 80% of Exploits Publish Fa | Techpanther

1.The State of Exploit Development:
80% of Exploits Publish Faster than CVEs", 2020.
https://unit42.paloaltonetworks.com/state-of-exploit-development

2.CVE-2020-12928:
Privilege Escalation in a dynamically loaded AMD driver (AMDRyzenMasterDriver.sys) in AMD Ryzen Master V15 (Exploit PoC)
https://h0mbre.github.io/RyzenMaster_CVE/#

3.Vulnerability Spotlight in F2FS toolset (PoC):
Code execution & information disclosure vulnerabilities (CVE-2020-6104, CVE-2020-6105, CVE-2020-6106, CVE-2020-6107, CVE-2020-6108)
https://blog.talosintelligence.com/2020/10/vuln-spotlight-f2fs-tools-.html?m=1

4.CVE-2020-16947:
Microsoft Outlook 2019 (16.0.13231.20262) installed on Windows 10 1909 x64 - RCE vulnerablility (Exploit PoC)
https://github.com/0neb1n/CVE-2020-16947

1. More TA551 (Shathak) Word docs push IcedID (Bokbot)
https://isc.sans.edu/diary/rss/26674

2. Nicely Obfuscated Python RAT
https://isc.sans.edu/diary/rss/26680

3. Collection of malware source code for a variety of platforms in an array of different programming languages
https://github.com/vxunderground/MalwareSourceCode

Use AWS Firewall Manager to deploy protection at scale in AWS Organizations
https://aws.amazon.com/ru/blogs/security/use-aws-firewall-manager-to-deploy-protection-at-scale-in-aws-organizations

DOS2RCE - A New Technique to Exploit V8 NULL Pointer Dereference Bug (+ PoC on Chrome ver.77)
https://blog.br0vvnn.io/pages/blogpost.aspx?id=1&ln=0

Part 1. AMSI Evasion
https://0xdarkvortex.dev/index.php/2019/07/17/red-team-ttps-part-1-amsi-evasion

Part 2. PUSH 0xPE, CALL 0xLOADER
https://0xdarkvortex.dev/index.php/2020/10/08/red-team-ttps-part-2-push-0xpe-call-0xloader