diablohorn.com
DiabloHorn | Attempting to understand securityAttempting to understand security
http://www.diablohorn.com/
Attempting to understand security
http://www.diablohorn.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Monday
LOAD TIME
0.6 seconds
16x16
32x32
PAGES IN
THIS WEBSITE
19
SSL
EXTERNAL LINKS
23
SITE IP
192.0.78.24
LOAD TIME
0.563 sec
SCORE
6.2
DiabloHorn | Attempting to understand security | diablohorn.com Reviews
https://diablohorn.com
Attempting to understand security
[python] Poor man’s forensics | DiabloHorn
https://diablohorn.com/2016/08/14/python-poor-mans-forensics
Attempting to understand security. Stay updated via RSS. Follow DiabloHorn on WordPress.com. Python raw sockets sniffing and pcap saving. Win10 secure boot inside vmware fusion. Meterpreter, registry and unicode quirk work around. Python] Poor man’s forensics. Idea: Abusing Google DLP for NSA-style content searching. IT Solutions Knowledge Base. Security on the edge. Python] Poor man’s forensics. Posted: August 14, 2016 in general. Sudo mac-robber mnt/ head. Class host start time. You can even timeline t...
Easy C libraries | DiabloHorn
https://diablohorn.com/easy-c-libs
Attempting to understand security. Stay updated via RSS. Follow DiabloHorn on WordPress.com. Python raw sockets sniffing and pcap saving. Win10 secure boot inside vmware fusion. Meterpreter, registry and unicode quirk work around. Python] Poor man’s forensics. Idea: Abusing Google DLP for NSA-style content searching. IT Solutions Knowledge Base. Security on the edge. Easy to tear apart. PolarSSL – http:/ www.polarssl.org/. BCL – http:/ bcl.comli.eu/. And RLE, written in portable ANSI C.
September | 2016 | DiabloHorn
https://diablohorn.com/2016/09
Attempting to understand security. Stay updated via RSS. Follow DiabloHorn on WordPress.com. Python raw sockets sniffing and pcap saving. Win10 secure boot inside vmware fusion. Meterpreter, registry and unicode quirk work around. Python] Poor man’s forensics. Idea: Abusing Google DLP for NSA-style content searching. IT Solutions Knowledge Base. Security on the edge. Archive for September, 2016. Meterpreter, registry and unicode quirk work around. Posted: September 27, 2016 in general. A = %COMSPEC% /b /...
March | 2016 | DiabloHorn
https://diablohorn.com/2016/03
Attempting to understand security. Stay updated via RSS. Follow DiabloHorn on WordPress.com. Python raw sockets sniffing and pcap saving. Win10 secure boot inside vmware fusion. Meterpreter, registry and unicode quirk work around. Python] Poor man’s forensics. Idea: Abusing Google DLP for NSA-style content searching. IT Solutions Knowledge Base. Security on the edge. Archive for March, 2016. Idea: Abusing Google DLP for NSA-style content searching. Posted: March 1, 2016 in general. Don’t forget to ...
August | 2016 | DiabloHorn
https://diablohorn.com/2016/08
Attempting to understand security. Stay updated via RSS. Follow DiabloHorn on WordPress.com. Python raw sockets sniffing and pcap saving. Win10 secure boot inside vmware fusion. Meterpreter, registry and unicode quirk work around. Python] Poor man’s forensics. Idea: Abusing Google DLP for NSA-style content searching. IT Solutions Knowledge Base. Security on the edge. Archive for August, 2016. Python] Poor man’s forensics. Posted: August 14, 2016 in general. Sudo mac-robber mnt/ head. Class host start time.
TOTAL PAGES IN THIS WEBSITE
19
My Foolish pages: Windows "DbgHelp.dll" Export name stack overflow vulnerability
http://foolishpages.blogspot.com/2010/11/windows-dbghelpdll-export-name-stack.html
Wednesday, November 10, 2010. Windows "DbgHelp.dll" Export name stack overflow vulnerability. Vulnerability in Microsoft Windows XP Dbghelp.dll(version 5.x) has been exploited by malwares to thwart debugging by researchers. The Dbghelp.dll is the Windows Image Helper dynamic linking library. This dll was being used by almost all the debuggers and disassemblers. The code that reads export function name fails to check the function name length before moving the data into the stack. It has been posted to hel...
My Foolish pages: 03.11
http://foolishpages.blogspot.com/2011_03_01_archive.html
Friday, March 18, 2011. In the recent weeks we are witnessing a massive increase in the amount of malwares for android mobiles. Most of the malwares sent SMS to premium mobile numbers. Before getting into reversing android applications let us see how they can be developed. Android os is based on modified version of Linux Kernel.Android uses Dalvik Virtual Machine(DVM) to execute all android applications. To convert .apk to .jar we can use Dex2Jar. Then finally we can use JAVA Decompiler. Http:/ java....
My Foolish pages: 06.10
http://foolishpages.blogspot.com/2010_06_01_archive.html
Friday, June 11, 2010. Gunpack - God's Unpacker. To protect malwares from detection by AV vendors malware authors use packers/cryptors for protection. For malware analysts unpacking executable is the greatest problem they encounter while analyzing protected executable files. To combat packer challenges a memory dumping attack was employed in GUnpack tool.G(ods)Unpack tool unpacks packed executable files based on memory dumping technique. Posted by Palaniyappan Bala. Links to this post. Links to this post.
My Foolish pages: If you are going to #BlackHat2015 come by our...
http://foolishpages.blogspot.com/2015/07/if-you-are-going-to-blackhat2015-come.html
Wednesday, July 8, 2015. If you are going to #BlackHat2015 come by our. If you are going to #BlackHat2015 come by our booth #759 and learn why #Cyphort is the clear alternative to FireEye http:/ t.co/CChJCbrvQ6. If you are going to #BlackHat2015 come by our. If you are going to #BlackHat2015 come by our booth #759 and learn why #Cyphort is the clear alternative to FireEye http:/ t.co/CChJCbrvQ6. Posted by Palaniyappan Bala. Subscribe to: Post Comments (Atom). If you are going to #BlackHat2015 come by our.
My Foolish pages: 08.11
http://foolishpages.blogspot.com/2011_08_01_archive.html
Wednesday, August 10, 2011. Combating Packers and cryptors through Memory Scanning. In recent days almost all the malwares are protected by packers or cryptors to protect it from security scanners. The malware analysts waste lot of time in analyzing same malware variants protected by different packers. Memory scanning can be employed to fight against such type of samples. Is a project that was started to develope an user mode memory scanning tool " MeMMoN. Posted by Palaniyappan Bala. Links to this post.
My Foolish pages: 06.12
http://foolishpages.blogspot.com/2012_06_01_archive.html
Friday, June 15, 2012. PE Skeleton Spread Sheet. PE structure quick reference Sheet for virus analysts. Posted by Palaniyappan Bala. Links to this post. Subscribe to: Posts (Atom). Windows "DbgHelp.dll" Export name stack overflow vulnerability. Vulnerability in Microsoft Windows XP Dbghelp.dll(version 5.x) has been exploited by malwares to thwart debugging by researchers. The Dbghe. PE Skeleton Spread Sheet. TrendLabs Malware Blog - by Trend Micro. Python] Poor man’s forensics. An exercise in frustration.
My Foolish pages: 08.10
http://foolishpages.blogspot.com/2010_08_01_archive.html
Tuesday, August 31, 2010. Windows DLL load hijacking. This blogging is to demonstrate DLL Pre-loading/hijacking bug in Windows. The basis of this exploit is the way in which Windows works and how it loads DLL files used by many applications, if an application calls a DLL without specifying an absolute path Windows will conduct a search for the DLL file in various set locations. This is being abused by computer criminals. The Microsoft Security Response Center has written about the issue :. This exploit c...
TOTAL LINKS TO THIS WEBSITE
23
Diabloholdem.com
Diabloholdem.net
Diablo Holdings, Ltd.
Diablo Holdings, Ltd. Diablo Holdings, Ltd.,. A California corporation, is a Property and Asset Management Company representing The Lineweaver Trusts. Diablo Holdings, employs a staff of 8 in its Berkeley, Hercules and Alamo offices, and manages real estate assets owned by The Lineweaver Trusts in Alameda and Contra Costa Counties. Retail Space, Alamo CA. Office Space Berkeley, CA. Office Space Hercules, CA.
Diablo Home Inspections | Serving Contra Costa County
Why Home Inspections are Important. Reasons to schedule a residential inspection. If an inspection uncovers any issues with a home, the buyer can then negotiate repairs with the seller. Inspections can check for certain issues that may pose a safety hazard to you and your family, like improperly installed wiring or even elevated radon levels. Do you have a question? Would you like to schedule an inspection? Designed by Elegant Themes.
DiabloHorn | Attempting to understand security
Attempting to understand security. Stay updated via RSS. Follow DiabloHorn on WordPress.com. Win10 secure boot inside vmware fusion. Meterpreter, registry and unicode quirk work around. Python] Poor man’s forensics. Idea: Abusing Google DLP for NSA-style content searching. PowerShell overview and introduction. IT Solutions Knowledge Base. Security on the edge. Win10 secure boot inside vmware fusion. Posted: November 5, 2016 in general. Avoid a secondary dedicated laptop. Avoid having a physical TPM chip.
DiabloHorn | Attempting to understand security
Attempting to understand security. Stay updated via RSS. Follow DiabloHorn on WordPress.com. Parsing the hiberfil.sys, searching for slack space. Writing your own blind SQLi script. Physical home security options. Quick POC to mitm RDP ssl. IT Solutions Knowledge Base. Security on the edge. Posted: March 28, 2015 in midnight thoughts. Data in the login credentials and as usual you can jump straight to the code on my github. Now if you are curious how this works and how you could set this up in a real lif...
diablohorse.com
This site is under construction. Why am I seeing this page? Are you the owner of this domain? How to replace this page. Try these searches related to diablohorse.com:. Cheats.webbyen.dk Diablo.
Welcome!
Site diablohost.com just created. Сайт diablohost.com только что создан. Real content coming soon.
Ask Jeff - Question the Online Whiz from Aplus.net
Error Page cannot be displayed. Please contact your service provider for more details. (8).
Ask Jeff - Question the Online Whiz from Aplus.net
Register, renew or transfer your domain! 1 Choose a domain name. 2 Select an extension. 3 Select domain status. Get your domain name FREE! Sign up for any web hosting package from. Aplusnet to receive your new domain. SEO and Flash Options Available. Website Live in 12 days. Free Domain Name Registration. Why choose Aplus.net? Low Cost Web Hosting:. The first step in online success. View our shared hosting plans. Professional website design at small. A great website starts with great design. Entice c...
SOCIAL ENGAGEMENT