evadingedr-hand2024
2024-09-26
Evading EDR The Definitive Guide to Defeating Endpoint Detection Systems
by Matt Hand
No Starch Press, 2024
https://nostarch.com/evading-edr ...
Read More
learninglinuxbinaryanalysis-oneill2016
2024-09-26
Learning Linux Binary Analysis: Uncover the secrets of Linux binary analysis with this handy guide.
by Ryan “elfmaster” O’Neill ...
Read More
Paul Vixie
2024-09-26
Dr. Paul Vixie is an American computer scientist with several contributions to DNS and standard UNIX utilities such as cron and rtty.
Vixie once held ...
Read More
RFC
2024-09-26
A Request For Comments (RFC) is a formal document containing specifications and other related information regarding internet and networking protocols.
Read More
yara mode
2024-09-26
yara-mode is an Emacs mode for editing YARA rules.
https://github.com/binjo/yara-mode
Read More
Autoruns
2024-09-25
Autoruns is a Sysinternals tool that shows the system’s auto-start applications.
This is useful for finding persistence on Windows systems. ...
Read More
capture the flag
2024-09-25
Capture The Flag (CTF) is a cybersecurity-focused game where teams compete against each other to capture “flags” that are hidden within ...
Read More
CyberChef
2024-09-25
CyberChef is “The Cyber Swiss Army Knife”. It is an open-source tool developed by the GHCQ often used in a cybersecurity context for ...
Read More
directory information services
2024-09-25
A directory is a database that is used for storing information about users.
An example of a directory is a phone book.
Read More
IPS
2024-09-25
Intrusion Prevention Systems are defensive cybersecurity software that monitor for and block malicious activity.
Read More