█████╗ ██████╗ ██████╗ ███████╗███████╗ ██████╗ ███████╗███████╗██╗███╗ ██╗███████╗ ██╔══██╗██╔══██╗██╔══██╗██╔════╝██╔════╝██╔════╝ ██╔════╝╚══███╔╝██║████╗ ██║██╔════╝ ███████║██████╔╝██████╔╝███████╗█████╗ ██║ █████╗ ███╔╝ ██║██╔██╗ ██║█████╗ ██╔══██║██╔═══╝ ██╔═══╝ ╚════██║██╔══╝ ██║ ██╔══╝ ███╔╝ ██║██║╚██╗██║██╔══╝ ██║ ██║██║ ██║ ███████║███████╗╚██████╗ ███████╗███████╗██║██║ ╚████║███████╗ ╚═╝ ╚═╝╚═╝ ╚═╝ ╚══════╝╚══════╝ ╚═════╝ ╚══════╝╚══════╝╚═╝╚═╝ ╚═══╝╚══════╝ ### Week: 33 | Month: August | Year: 2014 | Release Date: 15/08/2014 | Edition: 29º ### ' ╔╦╗┬ ┬┌─┐┌┬┐ ╔═╗┌─┐┌─┐ ' ║║║│ │└─┐ │ ╚═╗├┤ ├┤ ' ╩ ╩└─┘└─┘ ┴ ╚═╝└─┘└─┘ ' Something that really worth your time! URL: http://www.primalsecurity.net/python-tutorials/ Description: Python tutorial series for InfoSec professionals. URL:https://github.com/lynuxsource/DendroidSource/tree/master/master Description: Dendroid Source with a working panel and APK. (Android Rat 😈) ' ╦ ╦┌─┐┌─┐┬┌─ ' ╠═╣├─┤│ ├┴┐ ' ╩ ╩┴ ┴└─┘┴ ┴ ' Some Kung Fu Techniques. URL: https://github.com/F-Secure/Sulo Description: Dynamic instrumentation tool for Adobe Flash Player built on Intel Pin. URL: https://github.com/pwnieexpress/raspberry_pwn Description: A Raspberry Pi pentesting suite by Pwnie Express. URL: https://bitbucket.org/mattinfosec/wordhound/ Description: tool that allows for the automated and targeted construction of wordlists and dictionaries for use in conjunction with password attacks. URL: https://github.com/JohnTroony/php-webshells Description: Common php webshells. Do not host the file(s) in your server! URL: https://github.com/patrickdw123/ParanoiDF Description: PDF Analysis & Password Cracking Tool. URL: https://fuzion24.github.io/android/gradle/xposed/jar/java/build/sdk/2014/08/15/android-gradle-xposed/ Description: Building Xposed Modules using Gradle. ' ╔═╗┌─┐┌─┐┬ ┬┬─┐┬┌┬┐┬ ┬ ' ╚═╗├┤ │ │ │├┬┘│ │ └┬┘ ' ╚═╝└─┘└─┘└─┘┴└─┴ ┴ ┴ ' All about security issues/problems. URL: http://dustri.org/b/torbrowserbundleorg.html Description: How to Check for Malware. (Nice Write-up) URL: http://www.room362.com/blog/2014/08/14/milkman-creating-processes-as-any-currently-logged-in-user/ Description: Creating Processes as Any Currently Logged in User. (Bingo!) URL: https://www.miknet.net/security/optimizing-birthday-attack/ Description: Optimizing a Birthday Attack. (Generic attack on hash functions) URL: http://www.ioactive.com/pdfs/Remote_Automotive_Attack_Surfaces.pdf Description: A Survey of Remote Automotive Attack Surfaces. (Hot!) URL: http://docs.cs.up.ac.za/programming/asm/derick_tut/syscalls.html Description: Linux System Call Table. URL: https://isc.sans.edu/forums/diary/Web+Server+Attack+Investigation+-+Installing+a+Bot+and+Reverse+Shell+via+a+PHP+Vulnerability/18543 Description: Web Server Attack Investigation - Installing a Bot and Reverse Shell via a PHP Vulnerability. ' ╔═╗┬ ┬┌┐┌ ' ╠╣ │ ││││ ' ╚ └─┘┘└┘ ' Spare time ? URL: http://jvns.ca/blog/2014/08/12/what-happens-if-you-write-a-tcp-stack-in-python/ Descriptions: What happens if you write a TCP stack in Python? URL: https://doegox.github.io/ElectronicColoringBook/ Description: ./ElectronicColoringBook 😅. ' ╔═╗┬─┐┌─┐┌┬┐┬┌┬┐┌─┐ ' ║ ├┬┘├┤ │││ │ └─┐ ' ╚═╝┴└─└─┘─┴┘┴ ┴ └─┘ ' Content Helpers (0x) 52656e61746f20526f64726967756573202d204073696d7073306e202d20687474703a2f2f706174686f6e70726f6a6563742e636f6d 5065746b6f205065746b6f76202d2040706470202d2068747470733a2f2f61626f75742e6d652f706470