Skip to content

Instantly share code, notes, and snippets.

View ag0x00's full-sized avatar
🦾
Teaching robots to love.

Anton G ag0x00

🦾
Teaching robots to love.
View GitHub Profile
vendor vendor_n product product_n cve cve_n cvss_score epss_score epss_percentile days cwe_id cwe_n is_exploited cwe_name
Apple 0 Magic Keyboard Firmware 2 CVE-2024-0230 0 2.4 0.00044 0.10684 59 0
Apple 0 iPad OS 0 CVE-2024-23203 1 7.5 0.0007 0.28522 49 0
Apple 0 iPad OS 0 CVE-2024-23204 2 7.5 0.00098 0.39748 49 CWE-787 5 0 Out-of-bounds Write
Apple 0 Safari 3 CVE-2024-23206 3 6.5 0.00097 0.39318 49 CWE-732 4 0 Incorrect Permission Assignment for Critical Resource
Apple 0 iPad OS 0 CVE-2024-23207 4 5.5 0.0006 0.23111 49 0
Apple 0 iPad OS 0 CVE-2024-23208 5 7.8 0.00056 0.21019 49 0
Apple 0 MacOS 1 CVE-2024-23209 6 8.8 0.00134 0.47753 49 0
Apple 0 iPad OS 0 CVE-2024-23210 7 3.3 0.00053 0.18551 49 CWE-787 5 0 Out-of-bounds Write
Apple 0 Safari 3 CVE-2024-23211 8 3.3 0.00053 0.18551 49 CWE-125 1 0 Out-of-bounds Read
@ag0x00
ag0x00 / grayscale-ambient-background.markdown
Created November 4, 2023 00:42
Grayscale Ambient Background

Keybase proof

I hereby claim:

  • I am ag0x00 on github.
  • I am ag0x00 (https://keybase.io/ag0x00) on keybase.
  • I have a public key ASCQ0732rVS2MfAsJVxQojwGqVFP4WLOj_qK6SZ28ssxywo

To claim this, I am signing this object:

@ag0x00
ag0x00 / crft-slack-template.json
Last active September 11, 2019 19:15
Slack Notification Template for CRFT (WIP)
// To be used in https://api.slack.com/tools/block-kit-builder
[
{
"type": "section",
"text": {
"type": "mrkdwn",
"text": "<https://prod.crft.app/flows/5|*Demo Case*>"
}
},
@ag0x00
ag0x00 / cyber_ogsm_examples.csv
Last active March 13, 2019 04:57
Cybersecurity OGSM Examples
Objective Goal Strategy Measures
Reduce cybersecurity risk to critical business functions Survive’ a red team exercise against ICS by the end of 2019 (pass/fail) Maintain patch levels Mean time to patch is under 7 days
Implement MFA 95% of enterprise user accounts are enforcing MFA
The overall number of generic (multi-user) accounts is under 1%
Reduce the impact of cybersecurity incidents (measurable) Improve internal network segmentation
Eliminate global admin accounts
Roll out dedicated systems management network
Be able to recover from cybersecurity attack quickly Completely recover network infrastructure (within 24 hours) Migrate core components to software-defined networking (SDN)
Regain control over a compromised physical workstation (within 30 minutes) Maintain up-to-date physical hardware inventory
Maintain local IR responsibility in all physical locations