Explore >> Select a destination


You are here

corvid.cafe
| | blog.netlab.360.com
18.7 parsecs away

Travel
| | The Log4j vulnerability that came to light at the end of the year can undoubtedly be considered a major event in the security community. Honeypot and botnet are our bread and butter, and we have been concerned about which botnets would be exploiting this since the vulnerability was made public.
| | briancallahan.net
5.2 parsecs away

Travel
| |
| | cocomelonc.github.io
11.0 parsecs away

Travel
| | [AI summary] The provided text describes a C/C++ implementation of the Khufu encryption algorithm, used to encrypt and decrypt a payload for a potential malicious purpose. The code demonstrates how to use the algorithm to encrypt a shellcode payload, execute it via Windows APIs, and avoid detection by AV engines. Key points include the encryption process, the use of Windows API functions for execution, and the limited AV detection due to obfuscation and API calls rather than encryption. The text also mentions the resistance of Khufu to differential cryptanalysis but notes that a 16-round attack exists. The example is for educational purposes only.
| | becomesovran.com
32.3 parsecs away

Travel
| My post on how I like to manage servers. I cover SSH, networking, log rotation, and server management basics.