CoTracker simultaneously tracks the movement of multiple points in videos using a flexible design based on a transformer network https://huggingface.co/spaces/facebook/cotracker
How Microsoft Had Signing Key Compromised - Results of Major Technical Investigations for Storm-0558 Key Acquisition https://msrc.microsoft.com/blog/2023/09/results-of-major-technical-investigations-for-storm-0558-key-acquisition/
FACT SHEET: President Biden Issues Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence https://www.whitehouse.gov/briefing-room/statements-releases/2023/10/30/fact-sheet-president-biden-issues-executive-order-on-safe-secure-and-trustworthy-artificial-intelligence/
How Microsoft Had Signing Key Compromised - Results of Major Technical Investigations for Storm-0558 Key Acquisition https://msrc.microsoft.com/blog/2023/09/results-of-major-technical-investigations-for-storm-0558-key-acquisition/
WindowsNoExec - Abusing existing instructions to executing arbitrary code without allocating executable memory https://www.x86matthew.com/view_post?id=windows_no_exec
NahamCon CTF 2023 - Mayhem https://elvisblue.github.io/posts/nahamcon-mayhem-solution/
unauth RCE exploit against Cisco IOS XE (CVE-2023-20198 and CVE-2023-20273) https://www.rapid7.com/blog/post/2023/11/10/metasploit-weekly-wrap-up-35/
Abusing mhyprotect to kill AVs / EDRs / XDRs / Protected Processes. https://github.com/zer0condition/mhydeath
Process Injection - Avoiding Kernel Triggered Memory Scans https://www.r-tec.net/r-tec-blog-process-injection-avoiding-kernel-triggered-memory-scans.html
Alert Regarding Vulnerability in Trend Micro Multiple Endpoint Security Products for Enterprises https://www.jpcert.or.jp/english/at/2023/at230021.html
Reversing the protections used by Microsoft's EMET http://0xdabbad00.com/2013/11/18/emet-4-1-uncovered/
Breaking 64 bit aslr on Linux x86-64 https://github.com/nick0ve/how-to-bypass-aslr-on-linux-x86_64
Malware Persistence Locations: Windows and Linux https://marcoramilli.com/2023/09/23/malware-persistence-locations-windows-and-linux/
AWS WAF Bypass: invalid JSON object and unicode escape sequences https://blog.sicuranext.com/aws-waf-bypass/
Uncovering Web Cache Deception: A Missed Vulnerability in the Most Unexpected Places https://blog.agilehunt.com/blogs/security/web-cache-deception-attack-on-404-page-exposing-pii-data-to-unauthenticated-users
FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is designed to be used in conjunction with a SIEM or other log aggregation tool https://github.com/FalconForceTeam/FalconHound
Multiple Vulnerabilities found in Techview LA-5570 Wireless Gateway Home Automation Controller https://www.exploitsecurity.io/post/cve-2023-34723-cve-2023-34724-cve-2023-34725
Getting Started With Cyber Tools Development https://www.crow.rip/crows-nest/mal/dev/getting-started
Court rules automakers can record and intercept owner text messages https://therecord.media/class-action-lawsuit-cars-text-messages-privacy
SpoolSploit - A collection of Windows print spooler exploits containerized with other utilities for practical exploitation. https://github.com/BeetleChunks/SpoolSploit