evadingedr-hand2024

2024-09-26

Evading EDR The Definitive Guide to Defeating Endpoint Detection Systems

by Matt Hand

No Starch Press, 2024

https://nostarch.com/evading-edr ...

Read More

learninglinuxbinaryanalysis-oneill2016

2024-09-26

Learning Linux Binary Analysis: Uncover the secrets of Linux binary analysis with this handy guide.

by Ryan “elfmaster” O’Neill ...

Read More

Paul Vixie

2024-09-26

Dr. Paul Vixie is an American computer scientist with several contributions to DNS and standard UNIX utilities such as cron and rtty.

Vixie once held ...

Read More

RFC

2024-09-26

A Request For Comments (RFC) is a formal document containing specifications and other related information regarding internet and networking protocols.

Read More

yara mode

2024-09-26

yara-mode is an Emacs mode for editing YARA rules.

https://github.com/binjo/yara-mode

Read More

Autoruns

2024-09-25

Autoruns is a Sysinternals tool that shows the system’s auto-start applications.

This is useful for finding persistence on Windows systems. ...

Read More

capture the flag

2024-09-25

Capture The Flag (CTF) is a cybersecurity-focused game where teams compete against each other to capture “flags” that are hidden within ...

Read More

CyberChef

2024-09-25

CyberChef is “The Cyber Swiss Army Knife”. It is an open-source tool developed by the GHCQ often used in a cybersecurity context for ...

Read More

directory information services

2024-09-25

A directory is a database that is used for storing information about users.

An example of a directory is a phone book.

Read More

IPS

2024-09-25

Intrusion Prevention Systems are defensive cybersecurity software that monitor for and block malicious activity.

Read More