February 5, 2025
February 5, 2025
0x08 - Modern Windows Kernel Race Conditions : https://t.co/Wz1M7jlZ22
— Binni Shah (@binitamshah) February 4, 2025
0x07 - Introduction to Windows Kernel Race Conditions : https://t.co/llNmYZiYFr
0x06 - Approaching Modern Windows Kernel Type Confusions : https://t.co/boHBcXYVub
0x05 - Introduction to Windows Kernel…
I’m very excited to announce that we at V8 Security have finally published our first version of Fuzzilli that understands Wasm!
— Carl Smith (@cffsmith) February 4, 2025
Go check it out at https://t.co/KP9ik5vDHm.
While we still have a way to go in improving it, we think it shows a promising approach!
Bypass Linux kernel isolation technique using BPF infrastructurehttps://t.co/McFKINejmf#Linux #cybersecurity pic.twitter.com/alqzPK6GAr
— 0xor0ne (@0xor0ne) February 4, 2025
🔍 New Blog Post: "Linux Detection Engineering - A Continuation on Persistence Mechanisms"🐧
— Ruben Groenewoud (@RFGroenewoud) February 4, 2025
Topics covered:
🔹 LD_PRELOAD hijacking
🔹 Loadable Kernel Modules
🔹 Web Shells
🔹 System account manipulation
🔗PANIX: https://t.co/ohTz7xkdoh
📖Blog: https://t.co/K7Ea0GqD5r
The results are in! We're proud to announce the Top ten web hacking techniques of 2024! https://t.co/XHPEeqPQLR
— PortSwigger Research (@PortSwiggerRes) February 4, 2025
🚨 New threat: BADBOX botnet targets both off-brand and major Android devices, potentially with pre-installed malware. Over 190k infected, including high-end Yandex TVs. Learn how a suspicious SSL cert led to uncovering its infrastructure. https://t.co/uOlq2kB34o #threathunting
— Censys (@censysio) February 4, 2025
Indirect branches are also a very interesting topic, here is a nice follow-up: https://t.co/Tk6I7R4k1m https://t.co/3rw7ZAoSQG
— Duncan Ogilvie 🍍 (@mrexodia) February 4, 2025
"This blog post aims to provide a detailed blueprint for how Google has created and deployed a high-assurance web framework that almost completely eliminates exploitable web vulnerabilities."https://t.co/7TsK8ZFRrO
— Royal Hansen (@royalhansen) February 4, 2025
Our linux adventures continue with @RFGroenewoud‘s next article on Persistence Mechanisms! Part 3 focuses on the theory, practice, and detection of several complicated Persistence techniques. See the breakdown: https://t.co/C61vGudHRe#ElasticSecurityLabs
— Elastic Security Labs (@elasticseclabs) February 4, 2025
SSL-bypass : Root Detection & SSL Bypass Script - It utilizes Frida's powerful JavaScript injection capabilities to bypass both root detection and SSL certificate pinning in Android applications : https://t.co/y6EOxXaoZ3 credits @_shadowintel_ pic.twitter.com/ZcG3bGioJN
— Binni Shah (@binitamshah) February 4, 2025
Secure Enclaves for Offensive Operations (Part I) by Outflank
— Smukx.E (@5mukx) February 3, 2025
Team. https://t.co/mpGbW5zlUM pic.twitter.com/IZNI1YhyOm