Welcome to ossbase.org! :wave:
|
|
0
|
34
|
March 19, 2025
|
GCVE BCP-05 drafting - Best practices for the "container" format - modified CVE Record Format
|
|
22
|
138
|
October 11, 2025
|
iOS analysis using the Sysdiagnose analysis framework workshop - beginners guide — David Durvaux, Christophe Vandeplas
|
|
1
|
11
|
October 6, 2025
|
Vulnerability Report - September 2025
|
|
0
|
11
|
October 3, 2025
|
Vulnerability-Lookup 2.16.0 released
|
|
0
|
35
|
September 19, 2025
|
GCVE BCP-04 drafting - Recommendations and best practices for ID allocation
|
|
9
|
73
|
September 16, 2025
|
Vulnerability Report - August 2025
|
|
0
|
29
|
September 12, 2025
|
MISP 2.5.21 released with a new recorrelate feature, various fixes and updates
|
|
0
|
12
|
September 11, 2025
|
AIL v6.4 Release Notes with Mail Search functionality, improved crawling capabilities and many bugs fixe
|
|
0
|
6
|
September 5, 2025
|
GCVE-BCP-02 - Practical Guide to Vulnerability Handling and Disclosure
|
|
0
|
6
|
August 30, 2025
|
Two New feeds from CERT-FR integrated in Vulnerability-Lookup
|
|
2
|
28
|
August 29, 2025
|
MISP 2.5.19 brings important fixes, improvements to the on-demand correlation engine, refinements in the task scheduler, and better error handling
|
|
0
|
4
|
August 29, 2025
|
Beyond CVEs: Mastering the Landscape with Vulnerability-Lookup
|
|
0
|
11
|
August 29, 2025
|
Compromising Threat Actor Communications — Ben (@polygonben)
|
|
0
|
7
|
August 26, 2025
|
Hack your brain — Pauline Bourmeau (Cookie)
|
|
0
|
4
|
August 26, 2025
|
When Netflow meets Pcap - A network forensic approach. — Peter
|
|
0
|
6
|
August 26, 2025
|
Smack my LLM up! — Jindrich Karasek
|
|
0
|
3
|
August 26, 2025
|
The Parking Chronicles - A DIY Guide to Agents Detection — David Sopas
|
|
0
|
1
|
August 26, 2025
|
Threat detection engineering with Suricata — Eric Leblond, Peter Manev
|
|
0
|
2
|
August 26, 2025
|
OverLAPS: Overriding LAPS Logic — Antoine Goichot
|
|
0
|
5
|
August 26, 2025
|
Krash Kourse: Intro to KQL for Defenders — Dom Lutz
|
|
0
|
0
|
August 26, 2025
|
Kunai: From Zero to Ninja — Quentin JEROME
|
|
0
|
3
|
August 26, 2025
|
Exploiting Legit APIs for Covert C2: A New Perspective on Cloud-based Malware Operations — cocomelonc
|
|
0
|
0
|
August 26, 2025
|
Palo Alto GlobalProtect : Remote Full Compromise Exploit Chain — Maxime Escourbiac
|
|
0
|
0
|
August 26, 2025
|
Practical Maldoc Analysis Workshop — Didier Stevens
|
|
0
|
10
|
August 26, 2025
|
New advanced network detection with Suricata 8 — Eric Leblond, Peter Manev
|
|
0
|
0
|
August 26, 2025
|
The cloud journey 2013-2025 of the European Commission — Claus
|
|
0
|
2
|
August 26, 2025
|
LOLBlue : Living Off the Land with Blue Team tools — Maxence Fossat, Antoine C
|
|
0
|
2
|
August 26, 2025
|
THAT PICTURE IS A LIE: SMUGGLING BINARIES WITH STYLE — Harpreet Singh
|
|
0
|
2
|
August 26, 2025
|
Anti-Forensics - You are doing it wrong (Believe me, I'm an IR consultant) — Stephan Berger
|
|
0
|
2
|
August 26, 2025
|