Home
Tools
Malybuzz
peepdf
Pub
Advisories
Exploits
Articles
Presentations
Var
Scripts
About
Home
»
Feed aggregator
»
Sources
The Security Shoggoth
Stories of an elder thing creation making its way in the world of information security.Tylerhttp://www.blogger.com/profile/15411793726236555303noreply@blogger.comBlogger94125
URL:
http://secshoggoth.blogspot.com/2010/05/simulating-user-experience-part-1.html
Updated:
47 min 33 sec ago
Search this site:
Specifications
Tatanga
Javascript
Research
Social Networking
Scripts
PDF
Vulnerabilities
Black Hat
peepdf
Challenge
Botnet
Exploits
Analysis
Conferences
Citadel
Spam
NFC
Reversing
Malware
Fraud
Exploit kits
Malcode
ZeuS
Security
Shellcode
Mobile
Feodo
Tools
Python
more tags
Latest blog posts
Dridex spam campaign using PDF as infection vector
Adding a scoring system in peepdf
Travelling to the far side of Andromeda at Botconf 2015
Black Hat Arsenal peepdf challenge solution
Black Hat Arsenal peepdf challenge
peepdf news: GitHub, Google Summer of Code and Black Hat
Andromeda/Gamarue bot loves JSON too (new versions details)
Quick analysis of the CVE-2013-2729 obfuscated exploits
Dissecting SmokeLoader (or Yulia's sweet ass proposition)
Released peepdf v0.3
more
Security Posts
Infocon: green
The CVE's They are A-Changing!, (Wed, Apr 17th)
The Biggest Deepfake Porn Website Is Now Blocked in the UK
Microsoft’s VASA-1 can deepfake a person with one photo and one audio track
What’s the deal with the massive backlog of vulnerabilities at the NVD?
¡ Feliz 100 Cumpleaños @Telefonica !
A Look at CVE-2024-3400 Activity and Upstyle Backdoor Technical Analysis
Introduction to Software Composition Analysis and How to Select an SCA Tool
5 reasons to strive for better disclosure processes
Overview of Content Published in March
3 healthcare organizations that are building cyber resilience
5 ways to strengthen healthcare cybersecurity
Android Malware Vultur Expands Its Wingspan
Cybersecurity Concerns for Ancillary Strength Control Subsystems
Update on Naked Security
more