XaFF (XaFF-XaFF)

XaFF-XaFF

Geek Repo

Company:TalosSec

Location:Poland

Home Page:xaff.dev

Twitter:@0xXaFF

Github PK Tool:Github PK Tool

XaFF's starred repositories

engine-sim

Combustion engine simulator that generates realistic audio.

Havoc

The Havoc Framework.

Language:GoLicense:GPL-3.0Stargazers:6151Issues:98Issues:307

Assemblies-of-putative-SARS-CoV2-spike-encoding-mRNA-sequences-for-vaccines-BNT-162b2-and-mRNA-1273

RNA vaccines have become a key tool in moving forward through the challenges raised both in the current pandemic and in numerous other public health and medical challenges. With the rollout of vaccines for COVID-19, these synthetic mRNAs have become broadly distributed RNA species in numerous human populations. Despite their ubiquity, sequences are not always available for such RNAs. Standard methods facilitate such sequencing. In this note, we provide experimental sequence information for the RNA components of the initial Moderna (https://pubmed.ncbi.nlm.nih.gov/32756549/) and Pfizer/BioNTech (https://pubmed.ncbi.nlm.nih.gov/33301246/) COVID-19 vaccines, allowing a working assembly of the former and a confirmation of previously reported sequence information for the latter RNA. Sharing of sequence information for broadly used therapeutics has the benefit of allowing any researchers or clinicians using sequencing approaches to rapidly identify such sequences as therapeutic-derived rather than host or infectious in origin. For this work, RNAs were obtained as discards from the small portions of vaccine doses that remained in vials after immunization; such portions would have been required to be otherwise discarded and were analyzed under FDA authorization for research use. To obtain the small amounts of RNA needed for characterization, vaccine remnants were phenol-chloroform extracted using TRIzol Reagent (Invitrogen), with intactness assessed by Agilent 2100 Bioanalyzer before and after extraction. Although our analysis mainly focused on RNAs obtained as soon as possible following discard, we also analyzed samples which had been refrigerated (~4 ℃) for up to 42 days with and without the addition of EDTA. Interestingly a substantial fraction of the RNA remained intact in these preparations. We note that the formulation of the vaccines includes numerous key chemical components which are quite possibly unstable under these conditions-- so these data certainly do not suggest that the vaccine as a biological agent is stable. But it is of interest that chemical stability of RNA itself is not sufficient to preclude eventual development of vaccines with a much less involved cold-chain storage and transportation. For further analysis, the initial RNAs were fragmented by heating to 94℃, primed with a random hexamer-tailed adaptor, amplified through a template-switch protocol (Takara SMARTerer Stranded RNA-seq kit), and sequenced using a MiSeq instrument (Illumina) with paired end 78-per end sequencing. As a reference material in specific assays, we included RNA of known concentration and sequence (from bacteriophage MS2). From these data, we obtained partial information on strandedness and a set of segments that could be used for assembly. This was particularly useful for the Moderna vaccine, for which the original vaccine RNA sequence was not available at the time our study was carried out. Contigs encoding full-length spikes were assembled from the Moderna and Pfizer datasets. The Pfizer/BioNTech data [Figure 1] verified the reported sequence for that vaccine (https://berthub.eu/articles/posts/reverse-engineering-source-code-of-the-biontech-pfizer-vaccine/), while the Moderna sequence [Figure 2] could not be checked against a published reference. RNA preparations lacking dsRNA are desirable in generating vaccine formulations as these will minimize an otherwise dramatic biological (and nonspecific) response that vertebrates have to double stranded character in RNA (https://www.nature.com/articles/nrd.2017.243). In the sequence data that we analyzed, we found that the vast majority of reads were from the expected sense strand. In addition, the minority of antisense reads appeared different from sense reads in lacking the characteristic extensions expected from the template switching protocol. Examining only the reads with an evident template switch (as an indicator for strand-of-origin), we observed that both vaccines overwhelmingly yielded sense reads (>99.99%). Independent sequencing assays and other experimental measurements are ongoing and will be needed to determine whether this template-switched sense read fraction in the SmarterSeq protocol indeed represents the actual dsRNA content in the original material. This work provides an initial assessment of two RNAs that are now a part of the human ecosystem and that are likely to appear in numerous other high throughput RNA-seq studies in which a fraction of the individuals may have previously been vaccinated. ProtoAcknowledgements: Thanks to our colleagues for help and suggestions (Nimit Jain, Emily Greenwald, Lamia Wahba, William Wang, Amisha Kumar, Sameer Sundrani, David Lipman, Bijoyita Roy). Figure 1: Spike-encoding contig assembled from BioNTech/Pfizer BNT-162b2 vaccine. Although the full coding region is included, the nature of the methodology used for sequencing and assembly is such that the assembled contig could lack some sequence from the ends of the RNA. Within the assembled sequence, this hypothetical sequence shows a perfect match to the corresponding sequence from documents available online derived from manufacturer communications with the World Health Organization [as reported by https://berthub.eu/articles/posts/reverse-engineering-source-code-of-the-biontech-pfizer-vaccine/]. The 5’ end for the assembly matches the start site noted in these documents, while the read-based assembly lacks an interrupted polyA tail (A30(GCATATGACT)A70) that is expected to be present in the mRNA.

Nidhogg

Nidhogg is an all-in-one simple to use rootkit.

Language:C++License:GPL-3.0Stargazers:1623Issues:32Issues:15

r77-rootkit

Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.

Language:CLicense:BSD-2-ClauseStargazers:1520Issues:40Issues:81

windows-driver-docs

The official Windows Driver Kit documentation sources

Language:PowerShellLicense:CC-BY-4.0Stargazers:859Issues:2594Issues:0

Blackout

kill anti-malware protected processes ( BYOVD) (Microsoft Won )

CEH-Exam-Questions

Planning To Take Certified Ethical Hacker (CEH)? Here are github repo with 125 questions and answers to help you prep for the test

Ekko

Sleep Obfuscation

process_doppelganging

My implementation of enSilo's Process Doppelganging (PE injection technique)

ReverseKit

x64 Dynamic Reverse Engineering Toolkit

Language:C++License:MITStargazers:561Issues:14Issues:3

SharpHound3

C# Data Collector for the BloodHound Project, Version 3

Language:C#License:GPL-3.0Stargazers:519Issues:25Issues:25

AES

C++ AES implementation

Language:C++License:MITStargazers:490Issues:14Issues:32

bootkit-rs

Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)

Language:RustLicense:MITStargazers:479Issues:10Issues:0

HellHall

Performing Indirect Clean Syscalls

bootlicker

A generic UEFI bootkit used to achieve initial usermode execution. It works with modifications.

Revenant

Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework

Language:CStargazers:352Issues:8Issues:0

SMShell

PoC for a SMS-based shell. Send commands and receive responses over SMS from mobile broadband capable computers

Language:C#Stargazers:345Issues:2Issues:0

git-scanner

A tool for bug hunting or pentesting for targeting websites that have open .git repositories available in public

Language:ShellLicense:MITStargazers:331Issues:10Issues:2

MalwareApiLibrary

collection of apis used in malware development

Language:CLicense:MITStargazers:220Issues:6Issues:0

Jormungandr

Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.

Language:C++License:GPL-3.0Stargazers:214Issues:5Issues:0

Shellcode-Loader

Open repository for learning dynamic shellcode loading (sample in many programming languages)

Language:C++Stargazers:182Issues:7Issues:0

ZeroThreadKernel

Recursive and arbitrary code execution at kernel-level without a system thread creation

Language:C++Stargazers:147Issues:6Issues:0

CVE-2022-21907

A REAL DoS exploit for CVE-2022-21907

Language:PythonLicense:GPL-3.0Stargazers:130Issues:4Issues:0

Cronos-Crypter

Cronos Crypter is an simple example of crypter created for educational purposes.

Language:C#License:MITStargazers:91Issues:4Issues:1

blacklotus

A attempt at replicating BLACKLOTUS capabilities, whilst not acting as a direct mimic.

TS-Changer

TS-Changer - Forces the machine in/out of TestSigning Mode at runtime.

Language:C++License:MITStargazers:54Issues:2Issues:3

InertiaCore

Inertia.js ASP.NET Adapter.

Language:C#License:MITStargazers:40Issues:2Issues:5

FullscreenBrowserPhishing

PoC of the phishing through setting browser in the fullscreen mode

Language:HTMLStargazers:10Issues:0Issues:0