Security Tools

/Security Tools

Week 34 In Review – 2016

Events Related

Impressions From DEF CON 24: The Machines Are Rising –
DEF CON 24, the world’s largest hacker conference, ended Aug. 7, and I must say I enjoyed every moment of it. There was so much to see in so little time; I definitely regret missing some great stuff that happened. Even so, I […]

Week 32 In Review – 2016

Events Related

DARPA’s Cyber Grand Challenge: Early Highlights from the Competition –
Early highlights from the world’s first all-machine hacking tournament, DARPA’s Cyber Grand Challenge (CGC). This computer security competition featured seven High Performance Computers as competitors. CGC took place on Thursday, August 4, 2016.

Building the Workforce through Cybersecurity Competitions –
The National Science […]

Week 30 In Review – 2016


Umap2 –
Umap2 is the second revision of NCC Group’s python based USB host security assessment tool.

Nmap 7.25BETA1 Released with our new Npcap driver, 6 new NSE scripts, and more! –
Nmap and Zenmap (the graphical front end) are available in several versions and formats. Recent source releases and binary packages are described […]

July 24th, 2016|Security Tools, Week in Review|0 Comments

Week 29 In Review – 2016

Events Related

Converge 2016 Videos –
These are the videos from the Converge Information Security Conference.

BSides Detroit 2016 Videos –
These are the videos from the BSides Detroit 2016 Conference.

AppSecEU 16 – Abhay Bhargav – SecDevOps: A View from the Trenches –


KeeThief – A Case Study in Attacking KeePass Part 2 –
The […]

Week 28 In Review – 2016

Events Related

USENIX Annual Technical Conference (ATC) 2016: The Best and Brightest Security Talks –
I recently attended the USENIX Annual Technical Conference (ATC) 2016 in Denver, Colorado. I was invited to give an industry talk, discussing my Bring Your Own Dilemma paper from last March (touching briefly on the Out Of Box Exploitation paper from May). Instead of just flying in […]

Week 27 In Review – 2016


Exploring and exploiting Lenovo firmware secrets –
Hi, everyone! In this article I will continue to publish my research of Lenovo ThinkPad’s firmware. Previously I shown how to discover and exploit SMM callout vulnerabilities on example of SystemSmmAhciAspiLegacyRt UEFI driver 1day vulnerability. Also, I introduced a small toolkit called fwexpl that provides API for comfortable development of firmware exploits […]

Week 26 In Review – 2016

Events Related

BSides Cleveland 2016 Videos –
These are the videos from the Bsides Cleveland conference.


MonitorDarkly –
This repo contains the exploit for the Dell 2410U monitor. It contains utilities for communicating with and executing code on the device.

148 Projects –



Other News

Judge says the FBI can […]

Week 25 In Review – 2016

Events Related

Circle City Con 2016 Videos –

Area41 – 2016 –
I had the opportunity this year to attend Area41 conference in Zurich. The conference is organised by the DEFCON Switzerland group and the talks are mainly technical.

ShowMeCon 2016 Videos –

Recordings of talks and speakers at Security Fest 2016 –


ActBlue […]

Week 23 In Review – 2016


Out-of-Box Exploitation: A Security Analysis of OEM Updaters –
Original Equipment Manufacturers (OEM) refer to the first boot of a new PC as the out-of-box experience (OOBE). As you battle your way through modal dialogues for questionable software, and agree to some exciting 30 day antivirus trials, it’s pretty forgivable to want to throw your […]

Week 22 In Review – 2016

Events Related

NolaCon 2016 –


BlueCoat now has a CA signed by Symantec –

hitbsecconf2016ams –


Practical Malware Analysis Starter Kit –
This package contains most of the software referenced in Practical Malware Analysis. Some of the links have broken over time, some companies have folded or been bought.

1 alpha 20160525 (oe.eo) […]