Malcolm is a powerful, easily deployable network traffic analysis tool suite for PCAP and Zeek logs Security News & Discussion |
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for PCAP and Zeek logs
- MyBB: From Stored XSS to RCE
- Rainbow Crackalack: Make Rainbow Tables Great Again
- Project Zero: DoS in Windows core crypto-library SymCrypt
- Amazon S3 Ransomware Prevention and Defense
- Attack vector for an S3 Ransomware
- HTTP screenshots with Nmap, Chrome, and Selenium
- Want to take over the Java ecosystem? All you need is a MITM!
- Recipe for Root - LPE Reference for Win+linux
- Free OSINT tool: interface to the new Facebook search engine
- New critical NTLM flows avoid all of Microsoft's mitigations
- Addressing Cloud Security with Infrastructure Baselines
- New tool: AVML - a userland volatile memory acquisition tool for x86_64 Linux
Malcolm is a powerful, easily deployable network traffic analysis tool suite for PCAP and Zeek logs Posted: 11 Jun 2019 10:59 AM PDT |
Posted: 11 Jun 2019 10:12 AM PDT |
Rainbow Crackalack: Make Rainbow Tables Great Again Posted: 11 Jun 2019 02:41 AM PDT |
Project Zero: DoS in Windows core crypto-library SymCrypt Posted: 11 Jun 2019 09:43 AM PDT |
Amazon S3 Ransomware Prevention and Defense Posted: 11 Jun 2019 09:16 AM PDT |
Attack vector for an S3 Ransomware Posted: 11 Jun 2019 06:02 AM PDT |
HTTP screenshots with Nmap, Chrome, and Selenium Posted: 11 Jun 2019 09:30 AM PDT |
Want to take over the Java ecosystem? All you need is a MITM! Posted: 10 Jun 2019 08:37 PM PDT |
Recipe for Root - LPE Reference for Win+linux Posted: 11 Jun 2019 09:43 AM PDT |
Free OSINT tool: interface to the new Facebook search engine Posted: 10 Jun 2019 10:42 PM PDT |
New critical NTLM flows avoid all of Microsoft's mitigations Posted: 11 Jun 2019 01:46 PM PDT |
Addressing Cloud Security with Infrastructure Baselines Posted: 11 Jun 2019 09:26 AM PDT |
New tool: AVML - a userland volatile memory acquisition tool for x86_64 Linux Posted: 10 Jun 2019 02:01 PM PDT https://github.com/microsoft/avml AVML is an X86_64 userland volatile memory acquisition tool written in Rust, intended to be deployed as a static binary. AVML can be used to acquire memory without knowing the target OS distribution or kernel a priori. No on-target compilation or fingerprinting is needed. AVML supports source discovery (/dev/crash, /proc/kcore, and /dev/mem currently supported), exporting recorded memory via Azure Blob Stores (including automatic-retry in case of network issues) or HTTP PUT (which enables S3 support), and compression via Snappy. We've tested AVML against a large number of distributions & releases including Ubuntu (from 12.04 and later), Centos (from 6.5 and later), RHEL (from 6.7 and later), Debian (from 8.0 and later), Oracle Linux (from 6.8 and later), and multiple point releases of CoreOS and SLES. [link] [comments] |
You are subscribed to email updates from /r/netsec - Information Security News & Discussion. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment