Blog

Top 10 de las mejores herramientas de seguridad del 2013 de ToolsWatch

Top 10 de las mejores herramientas de seguridad del 2013 de ToolsWatch http://www.hackplayers.com/2013/12/top10-mejores-herramientas-2013-toolwatch.html

How-To’s for the Holidays – Java Whitelisting using AD Group Policy, (Mon, Dec 23rd)

How-To’s for the Holidays – Java Whitelisting using AD Group Policy, (Mon, Dec 23rd) http://isc.sans.edu/diary/How-To%27s+for+the+Holidays+-+Java+Whitelisting+using+AD+Group+Policy/17267

Five Deadly Security Venoms – You’re Still Doing it Wrong

Five Deadly Security Venoms – You’re Still Doing it Wrong http://infiltrated.net/index.php?id=61&option=com_content&view=article

hash-identifier – Hash Identifier – Google Project Hosting

hash-identifier – Hash Identifier – Google Project Hosting http://code.google.com/p/hash-identifier/

Windows XP/Server 2003 Zero-Day Payload Uses Multiple Anti-Analysis Techniques

Windows XP/Server 2003 Zero-Day Payload Uses Multiple Anti-Analysis Techniques http://blog.trendmicro.com/trendlabs-security-intelligence/windows-xpserver-2003-zero-day-payload-uses-multiple-anti-analysis-techniques/

The Mikrotik RouterOS Bruteforce attacker tool v1.0.0 released

ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects » [New Tool] MKBrutus The Mikrotik RouterOS Bruteforce attacker tool v1.0.0 released http://www.toolswatch.org/2013/12/new-tool-mkbrutus-the-mikrotik-routeros-bruteforce-attacker-tool-v1-0-

Artigo: toolsmith: Hey Lynis, Audit This

toolsmith: Hey Lynis, Audit This http://holisticinfosec.blogspot.com/2013/12/toolsmith-hey-lynis-audit-this.html?m=1

Artigo: How To Combat Online Surveillance

How To Combat Online Surveillance http://theoccupiedtimes.org/?p=12362

HolisticInfoSec: Volatility 2.3 and FireEye’s diskless, memory-only Trojan.APT.9002

HolisticInfoSec: Volatility 2.3 and FireEye’s diskless, memory-only Trojan.APT.9002 http://holisticinfosec.blogspot.co.uk/2013/11/volatility-23-and-fireeyes-diskless.html

Evade Egress Restrictions with Staged Payloads | Strategic Cyber LLC

Evade Egress Restrictions with Staged Payloads | Strategic Cyber LLC http://blog.strategiccyber.com/2013/11/15/evade-egress-restrictions-with-staged-payloads/