Search:

Type: Posts; User: abhaythehero

Page 1 of 19 1 2 3 4

Search: Search took 0.11 seconds.

  1. Counter-measures (anti-debugs, . . . ) cheat sheet from Corkami project

    Nice cheat sheet of anti-debugging and anti-vm techniques (often used by malware)

    https://code.google.com/p/corkami/downloads/detail?name=cm.pdf&can=2&q=
    [Mirror]...
  2. Ohh yeah. I was going to post that today but you...

    Ohh yeah. I was going to post that today but you beat me to it c0dist. Also note this excellent paper https://www.exploit-db.com/docs/34591.pdf by Sudeep Singh referenced in that article which...
  3. Thanks ! And yep, more posts coming in this...

    Thanks ! And yep, more posts coming in this section :D
  4. Anti-debugging, Anti-evasion and Anti-vm tricks used by malware

    Starting this thread to discuss Anti-debugging, Anti-evasion and Anti-vm tricks used by malware and malcode.

    Starting with this nice usage of rdtsc instruction, I found on the malware sample I...
  5. Replies
    4
    Views
    2,310

    Welcome c0d3m@st3r ! Your blog looks quite...

    Welcome c0d3m@st3r ! Your blog looks quite interesting.

    We hope that you will enjoy your stay here :)
  6. Sticky: Hello all, the Webinar started at...

    Hello all, the Webinar started at http://www.twitch.tv/gyndream/ Sorry for change in plans.
  7. Replies
    4
    Views
    2,952

    Hi florindarck, We have confirmed the...

    Hi florindarck,

    We have confirmed the vulnerability on our side and are currently working to resolve the issue. We will soon get back to you after we have taken the necessary steps.

    Thank you...
  8. Replies
    4
    Views
    2,952

    Check your Private-message inbox. I have sent you...

    Check your Private-message inbox. I have sent you the e-mail address where you can report the bug. We will be pleased to look into it.
  9. Replies
    2
    Views
    6,095

    Excellent find prakhar ! Brilliant hackerish...

    Excellent find prakhar ! Brilliant hackerish attempt to find vulnerability !
  10. Replies
    5
    Views
    3,199

    Welcome to the forum man. Waiting for some great...

    Welcome to the forum man. Waiting for some great posts on android from you :)
  11. Directly viewing source in Chrome , without rendering html/js

    Here is a neat trick (according to me) for people who are analyzing a suspected malicious website/watering hole attack. To fetch the source html/js code of the website, mostly we do wget and then...
  12. Excellent. And maybe something for git sometime...

    Excellent. And maybe something for git sometime later, so this can be done easily >> Source code disclosure by .git in web application
  13. Replies
    37
    Views
    39,079

    Sticky: BACKTRACK AND KALI LINUX cbtnuggets...

    BACKTRACK AND KALI LINUX cbtnuggets https://secure.cbtnuggets.com/it-training-videos/series/cbtn_backtrack_sec/
  14. Here comes another webshell uploading technique...

    Here comes another webshell uploading technique which can cater to image restrictions and still your shell will be hidden in the image Encoding Web Shells in PNG IDAT chunks | Web App Security
    ...
  15. Replies
    8
    Views
    7,073

    I encountered a similar obfuscated javascript in...

    I encountered a similar obfuscated javascript in a phishing e-mail which led to blackhole exploit kit.

    ...
  16. The Ultimate thread for Malware repositories

    Let us all list down the source and repositories of malware/viruses/worms/trojans/bad codes/APTs. Only files/*****. No tutorials/articles. Please keep it updated with latest sources you get.
    ...
  17. Replies
    5
    Views
    29,910

    Also check out the blog posts of spiderlabs...

    Also check out the blog posts of spiderlabs tagged with Physical Security. Awesome \m/ SpiderLabs Anterior: Physical Security
  18. Replies
    1
    Views
    4,513

    I just came across this for the first time on...

    I just came across this for the first time on web. I thought of posting it, but it has been already done :)

    I must say it is an excellent vulnerability. This would be like the first attack point...
  19. Also List of Bug Bounty Programs >> Bug Bounty...

    Also List of Bug Bounty Programs >> Bug Bounty Programs | The HackaServer Blog

    and

    List of Bug Bounty Programs as a Service >> Bug Bounty Program as a Service | The HackaServer Blog
  20. Replies
    27
    Views
    48,519

    No one can know all the things. Keep learning. ...

    No one can know all the things. Keep learning.





    exactly !
  21. First of all, no one will flame you on this forum...

    First of all, no one will flame you on this forum for posting stuff they already know. Just keep an eye that you post in proper section, and that the information you are posting is not being already...
  22. Replies
    27
    Views
    48,519

    Principle of least privilege

    Well, The thread is turning out to be quite a good discussion and here are my 2 cents.

    From the wikipedia Principle of least privilege - Wikipedia, the free encyclopedia



    This means, that...
  23. Bad luck prince_indishell . Better luck next time...

    Bad luck prince_indishell . Better luck next time ! You can also start an account on Bugcrowd - Crowdsourced security testing. We run managed bug bounty programs for business. where they give you the...
  24. Would you be kind enough to extrapolate your...

    Would you be kind enough to extrapolate your observations and enlighten us truly as to what you would have posted in place of the topic starter. Unhappy as you are with the topic starter.
  25. Replies
    3
    Views
    2,139

    Looks like that, rather than understanding the...

    Looks like that, rather than understanding the situtation, you clearly want a article and video which you can replay to your client.(who maybe asked for that :p). Not cool buddy, not cool.
Results 1 to 25 of 471
Page 1 of 19 1 2 3 4