Magiic has been updated to include local mbox file indexing, color highlighting, compatibility to the most recent Python gnupg, and more.
What does a cult Brezhnev-era movie have to do with how exploit code finds its bearings in a Windows process’ address space? How can cryptographically insecure hashing functions be exploited to create honeypots that thwart shellcode? We researched this as a part of our Halting Attacks Via Obstructing Configurations project, funded by DARPA Cyber Fast Track. You can read about it in the International Journal of PoC||GTFO, issue 0x12.
Can wrongfully or rightfully convicted criminals start to seek appeals on the basis of new evidence that shows that our Forensic “Experts” rely heavily on forensic write-blockers that can be proven to be worthless when their is malware inside the firmware of the device you are creating a forensic image of?
Just wanted to post a quick alternative of Metasploit’s VMWare Fusion CVE-2014-6271 exploit (
metasploit-framework / modules / exploits / osx / local / vmware_bash_function_root.rb ) for local shell use.