what you don't know can hurt you
Showing 101 - 125 of 3,564 RSS Feed

Whitepaper Files

Jenkins Groovy Scripts For Red Teamers And Penetration Testers
Posted Sep 10, 2019
Authored by Marco Ortisi, Ahmad Mahfouz

Whitepaper called Jenkins Groovy Scripts for Red Teamers and Penetration Testers.

tags | paper
MD5 | 37a4c513241b8f6c389c5c1cf75a2452
Optimization Method For The Exploitation Times Of Blind SQL Injections
Posted Sep 9, 2019
Authored by Carlos E. Lopez

Whitepaper called Optimization Method For The Exploitation Times of Blind SQL injections.

tags | paper, sql injection
MD5 | 2421682cec87eac02fe702e1cfc969af
Deep Dive Into .NET Malwares
Posted Sep 6, 2019
Authored by Sudeep Singh

This whitepaper provides an in-depth deep dive analysis into .NET malware.

tags | paper
MD5 | 48defef9492f0c5d095d6ecec56c6756
ZeroNights 2019 Call For Papers
Posted Sep 3, 2019
Authored by ZeroNights CFP | Site zeronights.org

The ZeroNights 2019 Call For Papers has been announced. It will be held in Saint-Petersburg, Russia November 12th through the 13th, 2019.

tags | paper, conference
MD5 | f92f44b00e3803c85b3c8c0764b6b5bd
Exploitation Of Windows CVE-2019-0708 (BlueKeep)
Posted Aug 31, 2019
Authored by Palo Alto Networks

Whitepaper called Exploitation of Windows CVE-2019-0708 (BlueKeep): Three Ways to Write Data into the Kernel with RDP PDU.

tags | paper, kernel
systems | windows
advisories | CVE-2019-0708
MD5 | 6f462839db6bbcac1333d70c6161be2c
Sony PlayStation Vita (PS Vita) - How To Find Savedata Exploits
Posted Aug 30, 2019
Authored by TheFloW

This is a brief whitepaper on how to find savedata exploits on Sony PlayStation Vita (PS Vita).

tags | paper
MD5 | 5d95461465519fb5f8b887494aae187a
PHP Web Backdoor Decode
Posted Aug 29, 2019
Authored by Mohammad Ariful Islam

Whitepaper called PHP Web Backdoor Decode. It covers decoding an obfuscated/encoded web backdoor shell, recovering the original source code, and the encrypted password in order to login to the backdoor shell.

tags | paper, web, shell, php
MD5 | 6e344c38af456d4c74436df122f2cf9c
BSidesLisbon 2019 Call For Papers
Posted Aug 24, 2019
Site bsideslisbon.org

BSidesLisbon 2019 has announced its call for papers. It will be held November 28th and 29th at Auditorio FMD-UL.

tags | paper, conference
MD5 | 62258dbe561709971ac43d507871e6dd
No cON Name 2019 Call For Papers
Posted Aug 20, 2019
Site noconname.org

The No cON Name 2019 call for papers has been announced. It will be held in Barcelona, Spain, from November 14th and 15th, 2019.

tags | paper, conference
MD5 | b8bd894366b8d00bf3e8bf213eeecd1e
REVULN 19Q4 Call For Papers
Posted Aug 15, 2019
Site revuln.com

The Call For Papers has been announced for REVULN 19Q4, an international cyber-security conference taking place December 11th and 12th, 2019 in Hong Kong at the Best Western Plus Hotel Hong Kong.

tags | paper, conference
MD5 | 5898b7cbd5c5f126b61004c0c098becf
Low-Level Reversing Of BLUEKEEP
Posted Aug 14, 2019
Authored by Ricardo Narvaja

This whitepaper discusses low-level reversing of the BLUEKEEP vulnerability.

tags | paper
advisories | CVE-2019-0708
MD5 | 3ab6adf388a7c01a0cc216daf74e1f92
Guide To Red Team Operations
Posted Aug 9, 2019
Authored by Yashika Dhir | Site hackingarticles.in

This is a guide to red teaming operations. It covers the basic questions like what is a red team, differences between red teaming and vulnerability assessments along with advance theory such as how red team engagements are done. Thought processes and legal processes are also covered.

tags | paper
MD5 | c25427974dfcb3544ebd6e303dc10e16
Analysis Using Analytics In Cybersecurity
Posted Aug 8, 2019
Authored by Akash Sarode

This is a brief whitepaper discussing the use of analytics when hunting for threats and notes some open source tools that can provide help.

tags | paper
MD5 | 02163c74f3fdae2628fa7eea01ef7860
Technical Analysis Of BlueKeep
Posted Jul 24, 2019
Authored by 0xeb-bp

This whitepaper is a technical analysis of BlueKeep with a path for exploitation.

tags | paper
advisories | CVE-2019-0708
MD5 | 7ba4b8d09d46d3096f36895599cb528c
Bypassing Web Application Firewalls With HTTP Parameter Pollution
Posted Jul 10, 2019
Authored by Berk Sagiroglu

Whitepaper called Bypassing Web Application Firewalls with HTTP Parameter Pollution. Written in Turkish.

tags | paper, web
MD5 | 5e515a4b949177e71c30bead05663400
Apache Camel Exploitation
Posted Jul 4, 2019
Authored by Nick Aliferopoulos

Whitepaper called Apache Camel Exploitation. It discusses how unvalidated input in Apache Camel endpoints can result in information exposure.

tags | paper
MD5 | 2f785d26379a9741d9315ce0f0471412
Buffer Overflows, C Programming, And More
Posted Jun 25, 2019
Authored by Ricky Sanders

This whitepaper discusses buffer overflows, C socket programming, NSA's GHIDRA, and much more.

tags | paper, overflow
MD5 | e3482cfa449fb9607ddac0208ae27d39
Threat Hunting - Hunter Or Hunted
Posted Jun 21, 2019
Authored by Akash Sarode

This whitepaper details methodologies in relation to threat hunting.

tags | paper
MD5 | 776bc317a0a2dda096dbe77bdce292ab
Sony PlayStation Vita (PS Vita) - Trinity: PSP Emulator Escape
Posted Jun 21, 2019
Authored by TheFloW

Trinity is a fully chained exploit for the PS Vita consisting of six unique vulnerabilities. It is based on a decade of knowledge and research. This is a long whitepaper detailing everything.

tags | exploit, paper, vulnerability
MD5 | 31b7f5a04ce38bb81a099b6084de26b0
Active Directory Enumeration With PowerShell
Posted Jun 14, 2019
Authored by Haboob Team

Whitepaper called Active Directory Enumeration with PowerShell.

tags | paper
MD5 | 9749bf4f1c728d560b607f1e3a15b07e
LDAP Swiss Army Knife
Posted Jun 12, 2019
Authored by Moritz Bechler | Site github.com

This paper presents the "LDAP Swiss Army Knife", an easy to use LDAP server implementation built for penetration oder software testing. Apart from general usage as a server or proxy it also shows some specific attacks against Java/JNDI based LDAP clients.

tags | paper, java
MD5 | a5b08197ac7d25c91698564ff5769d7b
Analysis Of CVE-2019-0708 (BlueKeep)
Posted Jun 4, 2019
Authored by MalwareTech

This whitepaper provides a thorough analysis of CVE-2019-0708, also known as BlueKeep.

tags | paper
MD5 | 16b0e4d9cb924ea1508a83175e8d1273
A Debugging Primer With CVE-2019-0708
Posted Jun 4, 2019
Authored by straight_blast

Whitepaper called A Debugging Primer with CVE-2019-0708.

tags | paper
advisories | CVE-2019-0708
MD5 | 6e54962ab2cce7123445b9f0b400b434
Web Application Firewall Bypass Methods
Posted May 24, 2019
Authored by Samet ARATOGLU

Whitepaper called Web Application Firewall Bypass Methods. Written In Turkish.

tags | paper, web, bypass
MD5 | 3d35d818f88542e7fe364c214be492bb
Penetration Testing Steps And Tools
Posted May 24, 2019
Authored by Yusa BAS

Whitepaper called Penetration Testing Steps and Tools. Written In Turkish.

tags | paper
MD5 | 4d97bb9bf96b21e872162c6c1a230690
Page 5 of 143

File Archive:

October 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    25 Files
  • 2
    Oct 2nd
    13 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    1 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    15 Files
  • 7
    Oct 7th
    15 Files
  • 8
    Oct 8th
    11 Files
  • 9
    Oct 9th
    3 Files
  • 10
    Oct 10th
    1 Files
  • 11
    Oct 11th
    1 Files
  • 12
    Oct 12th
    8 Files
  • 13
    Oct 13th
    12 Files
  • 14
    Oct 14th
    23 Files
  • 15
    Oct 15th
    4 Files
  • 16
    Oct 16th
    13 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    1 Files
  • 19
    Oct 19th
    27 Files
  • 20
    Oct 20th
    41 Files
  • 21
    Oct 21st
    18 Files
  • 22
    Oct 22nd
    16 Files
  • 23
    Oct 23rd
    2 Files
  • 24
    Oct 24th
    1 Files
  • 25
    Oct 25th
    1 Files
  • 26
    Oct 26th
    17 Files
  • 27
    Oct 27th
    19 Files
  • 28
    Oct 28th
    29 Files
  • 29
    Oct 29th
    13 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By