{"uuid": "8634089a-a787-4170-962e-2b369dc66848", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-29943", "type": "published-proof-of-concept", "source": "https://t.me/orderofsixangles/2384", "content": "\ud83d\udc8b\n\npwn.college - ctf \u0437\u0430\u0434\u0430\u043d\u0438\u044f \u0434\u043b\u044f \u043d\u0430\u0447\u0438\u043d\u0430\u044e\u0449\u0438\u0445\n\nCommonly Abused Linux Initial Access Techniques and Detection Strategies\n\nGoogleCTF 2024 Writeups \n\nAn unexpected journey into Microsoft Defender's signature World. \n\n Static deobfuscator for Themida/WinLicense/Code Virtualizer's mutation-based obfuscation. \n\nPersistence with GPO Item Level Targeting \n\n\u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f CVE-2024-29943 (\u0441\u043b\u0430\u0439\u0434\u044b)\n\nThe Ultimate Aim of Kernel Exploitation - Process Credentials\n\nLearning LLVM (Part-1) - Writing a simple LLVM pass \n\nExploiting V8 at openECSC\n\nHypervisor-enforced Paging Translation - The end of non data-driven Kernel Exploits (Recon2024) \u0441\u043b\u0430\u0439\u0434\u044b pptx \n\nRusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust\n\nA Tale of Reverse Engineering 1001 GPTs: The good, the bad And the ugly \n\nOSED materials (twit)\n\nPgC: Garbage collecting Patchguard away", "creation_timestamp": "2024-07-01T06:59:00.000000Z"}