Update 20231009 - Add 'cybersec' module

This commit is contained in:
0xor0ne
2023-10-09 12:51:48 +02:00
parent d3fd4c0a2b
commit 7ddda7734d
2 changed files with 57 additions and 0 deletions

View File

@@ -5,6 +5,7 @@ My personal awesome list of interesting repos, libraries and tools.
# In-Depth Topics
* [Blockchains and Smart Contracts](topics/web3.md)
* [Cyber Security Content](topics/cybersec.md)
* [Exploitation](topics/exploitation.md)
* [OT/IoT Security](topics/ot_security.md)
* [Linux Kernel](topics/linux_kernel.md)

56
topics/cybersec.md Normal file
View File

@@ -0,0 +1,56 @@
# Cybersecurity Content
## Summary
* [2023](#2023)
* [2022](#2022)
* [Other](#other)
## 2023
* ["Analysis on legit tools abused in human operated ransomware"][4]
* ["Behind the Shield: Unmasking Scudos's Defenses"][8]
* ["Exploring Android Heap Allocations in Jemalloc 'New'"][7]
* ["Hardware Hacking to Bypass BIOS Passwords"][5]
* "Lord Of The Ring0":
* [Part 1][10]
* [Part 2][11]
* [Part 3][12]
* [Part 4][13]
* [Part 5][14]
* ["Low-Level Software Security for Compiler Developers"][15]
* ["The Linux Kernel Module Programming Guide"][3]
* ["Sshimpanzee"][16]
* ["Your not so "Home Office" - SOHO Hacking at Pwn2Own"][5]
## 2022
* ["Turning Google smart speakers into wiretaps for $100k"][18]
## Other
* "Introduction to encryption for embedded Linux"
* ["Introduction to encryption for embedded Linux developers"][0]
* ["A hands-on approach to symmetric-key encryption"][1]
* ["Asymmetric-Key Encryption and Digital Signatures in Practice"][2]
* ["Linux Syscalls Reference"][17]
[0]: https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/
[1]: https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/
[2]: https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/
[3]: https://sysprog21.github.io/lkmpg/
[4]: https://jsac.jpcert.or.jp/archive/2023/pdf/JSAC2023_1_1_yamashige-nakatani-tanaka_en.pdf
[5]: http://conference.hitb.org/files/hitbsecconf2023ams/materials/D1T1%20-%20Your%20Not%20So%20Home%20Office%20-%20Soho%20Hacking%20at%20Pwn2Own%20-%20McCaulay%20Hudson%20&%20Alex%20Plaskett.pdf
[6]: https://cybercx.com.au/blog/bypassing-bios-password/
[7]: https://www.synacktiv.com/publications/exploring-android-heap-allocations-in-jemalloc-new
[8]: https://www.synacktiv.com/en/publications/behind-the-shield-unmasking-scudos-defenses
[10]: https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html
[11]: https://idov31.github.io/2022/08/04/lord-of-the-ring0-p2.html
[12]: https://idov31.github.io/2022/10/30/lord-of-the-ring0-p3.html
[13]: https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html
[14]: https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html
[15]: https://llsoftsec.github.io/llsoftsecbook/
[16]: https://blog.lexfo.fr/sshimpanzee.html
[17]: https://syscalls.mebeim.net/?table=x86/64/x64/v6.5
[18]: https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html