∃lio Torri∫i

System, Network, Security Engineer

Infosec resources archive


The NSA’s Hidden Spy Hubs in Eight U.S. CitiesFeb 2019OpSec
XFLTReaT tunnelling frameworkFeb 2019transportevasionexfiltrationnetworking-software
How to use ImpacketFeb 2019networking-softwarespoofingMitMwindows-post-exploitation
Evil Mai?d Attacks Using USB DebugFeb 2019OpSecUSB
Advanced USB key phishingFeb 2019USBsocial-engineering
Evilginx 2.1, bypass 2FAFeb 2019web-exploitsMitMnetworking-software
Stealing Chrome cookies via headless chromeFeb 2019web-exploits
Symfony forward() RCEFeb 2019web-exploits
SigPloiter: Telecom Signaling Exploitation FrameworkFeb 2019networking-software
squatm3: domain squatting toolFeb 2019networking-softwaresocial-engineering
Most ATMs can be hacked in under 20 minutesFeb 2019hardware
list of naughty stringsFeb 2019vulnerability-scanningscriptingprogramming
ZoomEye - Cyberspace Search EngineFeb 2019reconnaissancevulnerability-scanningwebservices
Escaping from Mozilla Firefox in Restricted EnvironmentsFeb 2019windows-exploitsmacos-ios-exploitslinux-exploits
O-Droid dropboxFeb 2019hardwarenetworking-softwarepersistencereconnaissancevulnerability-scanninginjection
Defense in depth real life reportFeb 2019networking-softwarewebdetection
Dissecting a Bug in the EternalBlue ClientFeb 2019reverse-engwindows-exploits
Blacklist3r - hardcoded crypto in open source projectsFeb 2019crypto
GreyNoise VisualizerFeb 2019webservices
32 bit PE to shellcodeFeb 2019programmingwindows-softwareobfuscationevasion
Mamont's open FTP IndexFeb 2019webservices
SharpPack: The Insider Threat Toolkit – MDSecFeb 2019evasionscriptingwindows-post-exploitation
wordlists URLsFeb 2019cryptoWiFi
Git All the Payloads!Feb 2019web-exploits
ELF in-memory executionFeb 2019evasionlinux-post-exploitation
Practical Cryptography for DevelopersFeb 2019cryptoprogramming
google/tink: cross-platform crypto libraryFeb 2019cryptoprogramming
Cuteit: IP address obfuscatorFeb 2019networking-softwarescriptingprogrammingobfuscation
Web App Vulnerability Assessment checklistFeb 2019webvulnerability-scanning
Duck dorkingFeb 2019reconnaissancewebservices
Open redirects 2019 (WONTFIX)Feb 2019web-exploits
MG (bad usb)Feb 2019USBhardwaresocial-engineering
in-memory ELF executionFeb 2019linux-post-exploitationevasion
in memory ELFFeb 2019evasionlinux-post-exploitation
MSF UAC bypassFeb 2019windows-post-exploitationevasion
Spoofing Google Search resultsFeb 2019webservicessocial-engineering
Modlishka: Phishing NG - MitM reverse proxyFeb 2019MitMweb-exploitsnetworking-software
killcastFeb 2019hardwarenetworking-softwareweb-exploits
Mojave HardeningFeb 2019macos-ios-softwareOpSec
the-book-of-secret-knowledge: lists and indexesFeb 2019knowledge-sources
LibreNMSFeb 2019networking-softwareprotocols
bashfuscatorFeb 2019obfuscationscripting
Bash scripting cheatsheetFeb 2019scripting
Vulnerability-in-compiler-stealth-backdoorFeb 2019programming
htcap: Single Page App scannerFeb 2019reconnaissancevulnerability-scanning
RCE in apt/apt-getFeb 2019linux-exploits
ghostscript: code execution on v9.26Feb 2019linux-exploits
Custom-Meterpreter loader in 2019Feb 2019windows-post-exploitationevasion
internet connected robots and where to find themFeb 2019SCADAweb
websocketdFeb 2019networking-softwarewebprogrammingscripting




Elio Torrisi

The Netherlands