Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·1d
🔐Cryptographic Archaeology
Cryptography for the Everyday Developer: Number Theory for Public Key Cryptography
sookocheff.com·2h
🔢Reed-Solomon Math
Adversary TTP Simulation Lab
infosecwriteups.com·8h
🏠Homelab Pentesting
Triple Threat: Signal's Ratchet Goes Post-Quantum
blog.quarkslab.com·16h
🔐Quantum Security
Show HN: Horcrux: Split files into encrypted fragments for Node and React Native
github.com·7h·
Discuss: Hacker News
🔒Homomorphic Compression
19.5 years in Digital Preservation
aranewprofessionals.wordpress.com·21h
💾Data Preservation
Troops and veterans’ personal information leaked in CPAP Medical data breach
malwarebytes.com·3h
🔓Hacking
The ReD Hat Consulting Breach – An Analysis
digitalforensicsmagazine.com·4h
🔓Hacking
How we trained an ML model to detect DLL hijacking
securelist.com·1d
🔗Binary Similarity
A Global Mining Dataset
tech.marksblogg.com·1d·
Discuss: Hacker News
📦METS Containers
All About PDF Decryption – Discover On Passware Knowledge Base
forensicfocus.com·4h
📄PDF Archaeology
Tape Library and Show Off
i.redd.it·1d·
Discuss: r/homelab
📼Cassette Archaeology
Chinese Gov't Fronts Trick the West to Obtain Cyber Tech
darkreading.com·1d
🕳️Information Leakage
Free online password generator – simple, customizable, and privacy-conscious
pasgen.online·5h·
Discuss: Hacker News
🔓Password Cracking
A New Cartridge for an Old Computer
hackaday.com·9h
🕹️Retro Gaming
A History of Active Directory Security
adsecurity.org·3d
🏺Kerberos Archaeology
Introducing OpenZL: An Open Source Format-Aware Compression Framework
engineering.fb.com·22h·
Modern Compression
They're in…now what? How to stop lateral movement when the phish bites
runzero.com·22h
🎫Kerberos Attacks
LockBit Breach: Insights From a Ransomware Group’s Internal Data
blog.compass-security.com·7h
🎫Kerberos Attacks