┌─────────┐┌────┐┌───┐┌────┐┌───┐┌─────────┐┌─────────┐┌────────┐ ┌─────────┐┌───┐┌─┐┌─┐┌────────┐ 
│         ││    └┘   ││    └┘   ││         ││         ││    ┌┐  │ │    ┌┐   ││   └┘ └┘ ││    ┌┐  └┐
│         ││         ││         ││         ││         ││    ││  │ │    ││   ││         ││    ││   │
│         ││         ││         ││    ┌────┘│     ┌───┘│    └┘  └┐│    └┘   ││         ││    └┘   │
└──┐   ┌──┘│    ┌┐   ││         ││    │┌───┐│     └───┐│    ┌┐   ││         ││    ┌┐   ││         │
   │   │   │    ││   ││         ││    └┘   ││         ││    ││   ││         ││    ││   ││         │
   └───┘   └────┘└───┘└─────────┘└─────────┘└─────────┘└────┘└───┘└─────────┘└────┘└───┘└─────────┘
┌─────────────────────────────────────────────────────────────────────────────────────────────────┐
├── Twitch ─── Twitter ─── Patreon ─── iTunes ─── Spotify ─── Snapchat ─── Instagram ─── TikTok ──┤
├───────────────────────┬────────────────────────────────────────────────┬────────────────────────┤
│                       └─ Episode 46 - Machine Learning Security Tools ─┘                        │
│                                                                                                 │
│ In this episode, we'll be discussing Machine Learning based Security Tools for Offense/Defense  │
│                                                                                                 │
│ BLURB: K Hodges graduated with a GED from the South Florida Juvenile Justice Center. He's       │
│        written code for numerous three letter agencies that wish to remain nameless, built      │
│        Defensive ML for an infosec company that also wishes to remain nameless, and is part     │
│        of a band of delightful degenerates called #GAYSEC                                       │
│                                                                                                 │
│ ┌────┐┌───┐┌─┐┌┐┌─┐┌───┐                                                                        │
│ │    ││ ┌─┘│ └┘└┘ ││ ┌─┘                                                                        │
│ │ ┌┐ ││ └┐ │      ││ └─┐                                                                        │
│ │ ││ ││ ┌┘ │      │└─┐ │                                                                        │
│ │ ││ ││ └─┐│  ┌┐  │┌─┘ │                                                                        │
│ └─┘└─┘└───┘└──┘└──┘└───┘                                                                        │
│                                                                                                 │
╞═ The NYPD's new DNA dragnet: The department is collecting and storing genetic information,      │
│  with virtually no rules to curb their use                                                      │
│                                                                                                 │
╞═ Android Phones Can Get Hacked Just by Looking at a PNG Image                                   │
│                                                                                                 │
╞═ China hacked Norway's Visma to steal client secrets: investigators                             │
│                                                                                                 │
╞═ Docker runc flaw opens the door to a 'Doomsday scenario'                                       │
╞═══ Seclists Advisory                                                                            │
│                                                                                                 │
╞═ Evil USB Cable Can Remotely Accept Commands From Hacker                                        │
│                                                                                                 │
╞═ New critical vulnerability discovered in open-source office suites                             │
│                                                                                                 │
╞═ Many popular iPhone apps secretly record your screen without asking                            │
│                                                                                                 │
╞═ Swiss govt offers reward for hacking its electronic vote system                                │
│                                                                                                 │
╞═ Internet-connected industrial refrigerators can be remotely defrosted, thanks to               │
│  default passwords                                                                              │
│                                                                                                 │
╞═ Russia to disconnect from the internet as part of a planned test                               │
│                                                                                                 │
╞═ How quantum terrorists could bring down the future internet                                    │
│                                                                                                 │
╞═ Adobe Reader Zero-Day Micropatch Stops Malicious PDFs from Calling Home                        │
│                                                                                                 │
│                                                                                                 │
│ ┌────┐┌────┐┌────┐┌───┐  ┌───┐ ┌───┐┌────┐┌───┐ ┌───┐                                           │
│ │ ┌──┘│ ┌┐ ││ ┌┐ ││ ┌┐└┐ │ ┌┐│ │ ┌─┘│ ┌┐ ││ ┌┐└┐│ ┌─┘                                           │
│ │ │┌─┐│ ││ ││ ││ ││ ││ │ │ └┘└┐│ └┐ │ ││ ││ ││ ││ └─┐                                           │
│ │ ││ ││ ││ ││ ││ ││ ││ │ │ ┌┐ ││ ┌┘ │ └┘ ││ ││ │└─┐ │                                           │
│ │ └┘ ││ └┘ ││ └┘ ││ └┘ │ │ ││ ││ └─┐│ ┌┐ ││ └┘ │┌─┘ │                                           │
│ └────┘└────┘└────┘└────┘ └─┘└─┘└───┘└─┘└─┘└────┘└───┘                                           │
│                                                                                                 │
╞═ Continuing our work to improve recommendations on YouTube                                      │
│                                                                                                 │
╞═ What would a EvE online Internet look like?                                                    │
│                                                                                                 │
╞═ ClusterFuzz (16,000 bugs in Chrome and over 11,000 in other Open Source Projects)              │
│                                                                                                 │
╞═ LOLBins and Trojans: How the Ramnit Trojan Spreads Via sLoad In A Cyber Attack                 │
│                                                                                                 │
╞═ Atrient Android App Analysis                                                                   │
│                                                                                                 │
╞═ Mail Attachment Builds Ransomware Downloader from Super Mario Image                            │
│                                                                                                 │
╞═ Pentesting Azure - The Report                                                                  │
│                                                                                                 │
│ ┌────┐┌─┐┌─┐┌───┐┌────┐┌─────┐ ┌────┐┌────┐┌───┐ ┌───┐┌───┐                                     │
│ │ ┌──┘│ ││ ││ ┌─┘│ ┌┐ │└─┐ ┌─┘ │ ┌──┘│ ┌┐ ││ ┌┐└┐│ ┌─┘│ ┌─┘                                     │
│ │ │   │ └┘ ││ └┐ │ ││ │  │ │   │ │   │ ││ ││ ││ ││ └┐ │ └─┐                                     │
│ │ │   │ ┌┐ ││ ┌┘ │ └┘ │  │ │   │ │   │ ││ ││ ││ ││ ┌┘ └─┐ │                                     │
│ │ └──┐│ ││ ││ └─┐│ ┌┐ │  │ │   │ └──┐│ └┘ ││ └┘ ││ └─┐┌─┘ │                                     │
│ └────┘└─┘└─┘└───┘└─┘└─┘  └─┘   └────┘└────┘└────┘└───┘└───┘                                     │
│                                                                                                 │
╞═ Privilege Escalation in Ubuntu Linux (dirty_sock exploit)                                      │
│                                                                                                 │
╞═ Exploiting CVE-2018-19134: remote code execution through type confusion in Ghostscript         │
│                                                                                                 │
╞═ Remotely compromise devices by using bugs in Marvell Avastar Wi-Fi: from zero knowledge to     │
│  zero-click RCE                                                                                 │
│                                                                                                 │
╞═ Reversi: Generate very tiny reverse shell binaries for Linux [x86_64]                          │
│                                                                                                 │
╞═ DNSGrep - Quickly Searching Large DNS Datasets                                                 │
│                                                                                                 │
╞═ GreyNoise CLI Tool                                                                             │
│                                                                                                 │
╞═ pubsploit.py - Quick public exploit search for CVEs                                            │
│                                                                                                 │
╞═ awesome-GO-offensive-tools                                                                     │
│                                                                                                 │
└─────────────────────────────────────────────────────────────────────────────────────────────────┘