d@n3n
142.2K views | +138 today
Follow
 
Scooped by Danen Raas
onto d@n3n
Scoop.it!

Releases, releases, releases!

Releases, releases, releases! | d@n3n | Scoop.it
So it’s not that I’ve been quiet and lazy – I was actually busy preparing some releases and hacking on stuff. So here’s an update on what’s been going on and what’s to come.
more...
No comment yet.
d@n3n
Your new post is loading...
Your new post is loading...
Scooped by Danen Raas
Scoop.it!

Char2Wav: End-to-End Speech Synthesis

We present Char2Wav, an end-to-end model for speech synthesis. Char2Wav has two components: a reader and a neural vocoder. The reader is an encoder-decoder model with attention.
more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Java and Python FTP attacks can punch holes through firewalls

Java and Python FTP attacks can punch holes through firewalls | d@n3n | Scoop.it

The Java and Python runtimes fail to properly validate FTP URLs, which can potentially allow attackers to punch holes through firewalls to access local networks. 

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Dark Web OSINT Part Four: Using Scikit-Learn to Find Hidden Service Clones

Dark Web OSINT Part Four: Using Scikit-Learn to Find Hidden Service Clones | d@n3n | Scoop.it
Welcome back to the fourth and final instalment in this series. If you haven’t read part one, two or three definitely feel free to go and do so. This will be much shorter than the others.
more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

MITM Part 2 - Scan & Attack

This is the second part in our series of security/penetration testing/ethical hacking articles, continuing where we left off in part 1. This will be a slightly longer post, but stick with it and you’ll see just how easy it is.

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

BeeLogger

BeeLogger | d@n3n | Scoop.it

BeeLogger - Generate Gmail Emailing Keyloggers to Windows. 

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

5 Signs That Show You’re a Linux Geek

5 Signs That Show You’re a Linux Geek | d@n3n | Scoop.it

While Linux is certainly easy to use, there are some activities surrounding it that have a certain, geeky appeal. How many of them do you follow? Are YOU a Linux geek? Let's find out! 

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

PayloadsAllTheThings

PayloadsAllTheThings - A list of useful payloads and bypass for Web Application Security and Pentest/CTF.

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Privilege Escalation in CA Common Services casrvc due to Arbitrary Write

The application 'casrvc' was installed with setuid privileges and had functionality to output to a user defined log file. By specifying a crafted invalid service name and outputting to a privileged file such as /etc/passwd it was possible to modify the system configuration to give the user root access.
more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Dodonpachi - Debug tools, level select and more

Dodonpachi - Debug tools, level select and more | d@n3n | Scoop.it

And now for the article many people have been waiting for: Dodonpachi! Unfortunately, I didn't make it in time for the 20th anniversary of the game on February 5th, but oh well; better late than never right? This game seems to have a larger following than it's predecessor, so I'm sure shmup fans will enjoy the re-enabled debugging tools available to play around with. There's not much else to say, so here we go!

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

List of datasets for machine learning research - Wikipedia

List of datasets for machine learning research - Wikipedia

These datasets are used for machine learning research and have been cited in peer-reviewed academic journals and other publications. Datasets are an integral part of the field of machine learning. Major advances in this field can result from advances in learning algorithms (such as deep learning), computer hardware, and, less-intuitively, the availability of high-quality training datasets.

List of datasets for machine learning research.
more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Operation BugDrop: CyberX Discovers Large-Scale Cyber-Reconnaissance Operation Targeting Ukrainian Organizations

Operation BugDrop: CyberX Discovers Large-Scale Cyber-Reconnaissance Operation Targeting Ukrainian Organizations | d@n3n | Scoop.it

CyberX has discovered Operation BugDrop, a large-scale cyber-reconnaissance operation targeting a broad range of targets in the Ukraine. 

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

The Attack of the Alerts and the Zombie Script

The Attack of the Alerts and the Zombie Script | d@n3n | Scoop.it

In our previous post we found a way to UXSS (bypass the SOP policy) using the htmlFile/ActiveXObject, however, I mentioned that there were other interesting things to do using that same object. Have you tried anything? If yes, congratulations.

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

BloodHound: Intro to Cypher

BloodHound: Intro to Cypher | d@n3n | Scoop.it
One of the most overlooked features of BloodHound is the ability to enter raw Cypher queries directly into the user interface. Likely, a lot of that has to do with the fact that it’s not a very emphasized feature, not to mention it requires learning Cypher.
more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

GPUs are now available for Google Compute Engine and Cloud Machine Learning

GPUs are now available for Google Compute Engine and Cloud Machine Learning | d@n3n | Scoop.it

Google Cloud Platform gets a performance boost today with the much anticipated public beta of NVIDIA Tesla K80 GPUs. You can now spin up NVIDIA GPU-based VMs in three GCP regions: us-east1, asia-east1 and europe-west1, using the gcloud command-line tool. Support for creating GPU VMs using the Cloud Console appears next week.

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Introducing Netflix Stethoscope

Introducing Netflix Stethoscope | d@n3n | Scoop.it

Netflix is pleased to announce the open source release of Stethoscope, our first project following a User Focused Security approach.  

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

ioskextdump

ioskextdump - Dump Kext information from iOS kernel cache. Applicable to the kernel which dump from memory.

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

malware-ioc

malware-ioc - Indicators of Compromises (IOC) of our various investigations.

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Revisiting Windows Security Hardening Through Kernel Address Protection

Revisiting Windows Security Hardening Through Kernel Address Protection | d@n3n | Scoop.it

Back in 2011 when Windows 7 Service Pack 1 was king of the hill and I was just starting to learn to program (via Harvard's epic CS50), j00ru published a whitepaper on various ways to access Windows kernel pointers from User Mode: Windows Security Hardening Through Kernel Address Protection.

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Using Python to find corrupted images

Using Python to find corrupted images | d@n3n | Scoop.it

If you're working with images on a computer, you're bound to eventually run into corrupted files that ruin your day. I run into this with animation renders (remember, the best practice here is to render to a sequence of image files and not a single video file).

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Learning to protect communications with adversarial neural cryptography

Learning to protect communications with adversarial neural cryptography | d@n3n | Scoop.it

This paper manages to be both tremendous fun and quite thought-provoking at the same time. If I tell you that the central cast contains Alice, Bob, and Eve, you can probably already guess that we’re going to be talking about cryptography (that or reading the paper title � ).

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Understanding the difference between sudo and su

Understanding the difference between sudo and su | d@n3n | Scoop.it

In this article, we will discuss in detail the 'su' command as well as how it differs from the 'sudo' command.

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Bypassing Windows User Account Control (UAC) and ways of mitigation

Bypassing Windows User Account Control (UAC) and ways of mitigation | d@n3n | Scoop.it
Securing machines from abuse and compromise in a corporate environment has always been an ongoing process. Providing admin rights to users has always been abused as users have ended up installing unapproved software, change configurations, etc.
more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Using vFeed Vulnerability & Threat Database to Exploit Network Printers – vFeed IO

A student from the Univesity of Bochum in Germany have published a very interesting thesis regarding the security of network printers. His work is a survey of weaknesses in the standards and various proprietary extensions of two popular printing languages: PostScript and PJL.
more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

How Hackers Steal Passwords on a Local Area Network using the SEToolkit

How Hackers Steal Passwords on a Local Area Network using the SEToolkit | d@n3n | Scoop.it

Want to steal passwords like a pro? Check this out! 

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Auditing your VMware environment with PowerCLI

Auditing your VMware environment with PowerCLI | d@n3n | Scoop.it

A web site about system administration tasks. Windows, Unix, SQL, VMware, Openview, Linux resources, technical articles, tips, tricks and solutions. 

more...
No comment yet.