Twenty Year Anniversary
Showing 1 - 25 of 3,366 RSS Feed

Whitepaper Files

EggHunter Buffer Overflow For Windows
Posted Jun 14, 2018
Authored by Haboob Team

Whitepaper called EggHunter Buffer Overflow for Windows. Written in Arabic.

tags | paper, overflow
systems | windows
MD5 | 7530d81f5ea60524126e7b277d92327b
Lateral Movement Using WinRM
Posted Jun 14, 2018
Authored by Haboob Team

Whitepaper called Lateral Movement using WinRM. Written in Arabic.

tags | paper
MD5 | ae51d28d40ed1f07fccc954c21dc8733
Reverse Engineering - Simple Patching
Posted Jun 11, 2018
Authored by Haboob Team

Whitepaper called Reverse Engineering - Simple Patching. Written in Arabic.

tags | paper
MD5 | 68a7ae72fae2210e2a4d9ace43c125d5
Android Application Pentest With Drozer
Posted Jun 1, 2018
Authored by Artin Ghafary

Whitepaper called Android Application Pentest With Drozer. Written in Persian.

tags | paper
MD5 | bce46a39c54c0e5f1caa0c8d31110f1f
SEH Buffer Overflow Basic Exploitation Tutorial
Posted Jun 1, 2018
Authored by Haboob Team

This is a SEH buffer overflow basic exploitation tutorial. Written in Arabic.

tags | paper, overflow
MD5 | d914b71bb22db16a92bb6096551d3397
Deserialization Vulnerabilities
Posted May 26, 2018
Authored by intx0x80

This whitepaper explains deserialization vulnerabilities in Java, Python, PHP, and Ruby.

tags | paper, java, php, vulnerability, python, ruby
MD5 | 003eecb39455d3d75ab4d3f37d2cb166
Introduction To Wireless Network Penetration Testing
Posted May 23, 2018
Authored by Moslem Haghighian

Whitepaper called Introduction to Wireless Network Penetration Testing. Written in Persian.

tags | paper
MD5 | 1b19373c6ccb377a6400ea115b877a24
Code Review Steps And Methodologies
Posted May 23, 2018
Authored by Jameel Nabbo

Whitepaper called Code Review Steps and Methodologies.

tags | paper
MD5 | 735525da63576a35964d6bc60e144a48
Web Forensics
Posted May 10, 2018
Authored by ManhNho

Whitepaper called Web Forensics. Written in Vietnamese.

tags | paper, web
MD5 | 82843c871392c0d0efffb6e7058c21d6
t2'18 Call For Papers
Posted May 9, 2018
Authored by // | Site

The t2'18 Call For Papers has been announced. It will take place October 25th through the 26th, 2018 in Helsinki, Finland.

tags | paper, conference
MD5 | df30ce4b46b221596a408d208f4749cc
Linux Restricted Shell Bypass Guide
Posted May 6, 2018
Authored by n4ckhcker, h4d3sw0rm

Whitepaper titled Linux Restricted Shell Bypass Guide.

tags | paper, shell
systems | linux
MD5 | d27133695ec11bcee5f1145b62e7f195
Windows Kernel Exploitation Tutorial Part 8: Use After Free
Posted May 4, 2018
Authored by rootkit

Whitepaper called Windows Kernel Exploitation Tutorial Part 8: Use After Free.

tags | paper, kernel
systems | windows
MD5 | 89f76cdffee77908ed5e8f26120672b7
Hack In The Box GSEC 2018 Singpaore Call For Papers
Posted Apr 27, 2018

Final call for the 2018 Hack In The Box (HITB) GSEC conference in Singapore. HITB GSEC is a 3-day deep knowledge security conference where attendees get to vote on the final agenda of talks and and to meet with the speakers they voted for.

tags | paper, conference
MD5 | 213db60f4f90257921f74bd543bf47f1
Nintendo Switch / Nvidia Fusee Gelee Disclosure
Posted Apr 26, 2018
Authored by Katherine Temkin

This report documents Fusee Gelee, a coldboot vulnerability that allows full, unauthenticated arbitrary code execution from an early bootROM context via Tegra Recovery Mode (RCM) on NVIDIA's Tegra line of embedded processors. As this vulnerability allows arbitrary code execution on the Boot and Power Management Processor (BPMP) before any lock-outs take effect, this vulnerability compromises the entire root-of-trust for each processor, and allows exfiltration of secrets e.g. burned into device fuses.

tags | paper, arbitrary, root, code execution
MD5 | 0ab768a01218de89b109624ec71ed96b
Building A Simple Proxy Fuzzer For THe MQTT Protocol Using The Polymorph Framework
Posted Apr 24, 2018
Authored by Santiago Hernandez Ramos

Whitepaper that shows how easy you can build a fuzzer for the MQTT protocol by using the Polymorph framework.

tags | paper, protocol, fuzzer
MD5 | 9eca60d90eccec483d8294bf95607a9b
Bridging The Gap Between SIPR And NIPR Using KVM Switches
Posted Apr 24, 2018
Authored by

This paper documents a minor but somewhat easy way to compromise air gapped systems that share a kvm.

tags | paper
MD5 | dc6b2a5f7beae67e10dd8d98be983b41
The Origin And Impact Of Security Vulnerabilities In ST Chipsets
Posted Apr 21, 2018

This whitepaper explores the origin and impact of the vulnerabilities discovered in ST chipsets.

tags | paper, vulnerability
MD5 | 0c95d5b2547b920efafeca36b10548c1
Diamorphine LKM Analysis
Posted Apr 18, 2018
Authored by x90c

This whitepaper provides diamorphine linux kernel rootkit analysis. Written in Korean.

tags | paper, kernel
systems | linux
MD5 | f542b2e90a44111c569a1dbf65f9d93a
Polymorph: A Real-Time Network Packet Manipulation Framework
Posted Apr 16, 2018
Authored by Santiago Hernandez Ramos

Whitepaper called Polymorph: A Real-Time Network Packet Manipulation Framework.

tags | paper
MD5 | f4fa6a587308484e8825734647e49d76
Smashing Smart Contracts
Posted Apr 13, 2018
Authored by Bernhard Mueller

This pop-scientific conference paper introduces Mythril, a security analysis tool for Ethereum smart contracts, and its symbolic execution backend LASER-Ethereum. The first part of the paper explains symbolic execution of Ethereum bytecode in a largely formal manner. The second part showcases the vulnerability detection modules already implemented in Mythril. The modules use a pragmatic mix of static analysis, symbolic analysis and control flow checking.

tags | paper
MD5 | 689b059f5f52ffa4211e9e02e8310af5
WOOT 12 Call For Papers
Posted Apr 11, 2018

WOOT '12 Call For Papers - This will be held August 13th through the 14th, 2018, in Baltimore, MD, USA. WOOT '12 is co-located with the USENIX Security Symposium.

tags | paper, conference
MD5 | 48289f763611d907fca2fc46ad5d9195
The Grey Matter Of Securing Android Applications
Posted Apr 8, 2018
Authored by Shiv Sahni

Whitepaper called The Grey Matter of Securing Android Applications. It starts with the introduction of the Android platform and fundamentals of the Android applications. It later talks about the in-built security features of the Android platform and the additional features that are provided by Google to build a secure ecosystem. It also includes how and why these features can be leveraged to build secure Android applications.

tags | paper
MD5 | 5b291cb65b443bd1435c7d5264cbe7f7
Exploring The Depths Of CMD.exe Obfuscation And Detection Techniques
Posted Mar 28, 2018
Authored by FireEye Advanced Practices Team

Whitepaper called DOSfuscation: Exploring the Depths of CMD.exe Obfuscation and Detection Techniques.

tags | paper
MD5 | 05765d8898bdc6d4c8c67776e3d9465b
Cross Site Scripting In A Nutshell
Posted Mar 26, 2018
Authored by Tahar Amine ELHOUARI | Site

Whitepaper called Cross Site Scripting 'XSS' In A Nutshell.

tags | paper, xss
MD5 | 09ea07bed12f6ea24186c4a57073f88c
MSSQL Error-Based SQL Injection
Posted Mar 26, 2018
Authored by Manish Tanwar

Whitepaper that discusses error-based SQL injection in "Order By" clause in MSSQL.

tags | paper, sql injection
MD5 | 65b9edfba25966175a4c63746a36bb30
Page 1 of 135

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

June 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    14 Files
  • 2
    Jun 2nd
    1 Files
  • 3
    Jun 3rd
    3 Files
  • 4
    Jun 4th
    18 Files
  • 5
    Jun 5th
    21 Files
  • 6
    Jun 6th
    8 Files
  • 7
    Jun 7th
    16 Files
  • 8
    Jun 8th
    18 Files
  • 9
    Jun 9th
    5 Files
  • 10
    Jun 10th
    2 Files
  • 11
    Jun 11th
    21 Files
  • 12
    Jun 12th
    32 Files
  • 13
    Jun 13th
    15 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    4 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    2 Files
  • 18
    Jun 18th
    14 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By