About acmpxyz
Deofuscating a nifty Powershell script with Python
🐍
Victorinox: SOC tool for security analysts
Antidebug Golang Binary on Windoze
Heanco: Email Header Analyzer
Spurious Licensed Binary
Fitz Roy: a free solo climbing to sanitize virtual machines
PoC - Libguestfs x Yara
Jakob Shattering: distributed and parallel cracking password tool
Garbling Netfilter ipv4
VX-underground (Linux papers) - System Components and Abuse
Hypervisor-guest memory translation
Extracting russian text from slack space
Check my
personal Twitter account
for feedback! Apart from these post I have some projects on GitLab
gitlab.com/luisfm
.
More stuff
Master's thesis - PIFMANA: Pipeline for Malware Analysis
⭐
Dataset
malware-dataset-theZoo.csv
Paper
PIFMANA___TFM_S2_UOC_ENG.pdf
SPF recursive check via cmd
Discover DHCP scope with Powershell
Yara rule pull request for Drupalgeddon2 accepted!
Bacherlor's thesis - DADE: Data Anomaly Detection Engine
Paper
DADE.pdf
References
There are many resources on the Internet. I am going to do a taxonomy:
Links
Phrack
vx-undergound
Computer and Network Security - Stanford University
Advanced Bash-Scripting Guide
LWN.net
Proof of Concept or Get The Fuck Out
Brendan D. Gregg blog
Elixir Bootlin
CFReDS Project
Kernel documentation
Linux kernel coding style
Blogging about open source virtualization
GDB: The GNU Project Debugger
OverTheWire (wargame)
Hack The Box (pentesting, challenges)
Operating ElasticSearch
Crackmes flags (reverse engineering)
angr library (reverse engineering, vulnerability discovery, exploitation)
pwntools (CTF binary exploitation)
Books
Computer Architecture: A Quantitative Approach
- John L. Hennessy and David A. Patterson
Virtual Machines: Versatile Platforms for Systems and Processes
- James E. Smith and Ravi Nair
Understanding the Linux Kernel
- Daniel P. Bovet and Marco Cesati
UNIX and Linux System Administration Handbook
- Evi Nemeth, Garth Snyder, Trent R. Hein and Ben Whaley
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
- Dafydd Stuttard and Marcus Pinto
Understanding the Linux Kernel
- Daniel P. Bovet and Marco Cesati
Penetration Testing with the Bash shell
- Keith Makan
Simple Steps to Data Encryption: A Practical Guide to Secure Computing
- Peter Loshin
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
- Dennis Andriesse
Practical Malware Analysis: A Hands-On Guide to Dissecting Malicious Software
- Michael Sikorski and Andrew Honig
Virtualization Security: Protecting Virtualized Environments
- Dave Shackleford
Network Attacks and Exploitation: A Framework
- Matthew Monte
Machine Learning and Security
- Clarence Chio and David Freeman
Black Hat Go: Go Programming for Hackers and Pentesters
- Clarence Chio and David Freeman
Last update: September 5, 2022