21
2月

Tittle: 2016.2.22

0 作者:admin

每日安全动态推送

每日安全知识热点

漏洞预警 Beware of hacked ISOs if you downloaded Linux Mint on February 20th!

LinuxMint Cinnamon “man.sh” file in “cron.hourly” start backdoor

LinuxMint-apt-cache(密码infected)

审计工具 brakeman:A static analysis security vulnerability scanner for Ruby on Rails applications

工具集 Awesome Windows Exploitation Resources

An Introduction to Backdooring Operating Systems

内存持久战-攻击模型

你windows上开着QQ点了我的链接我就进了你的qq邮箱财付通等(任意腾讯xss拿qq的clientkey)

CRLF Injection and Bypass Tencent WAF

(Another Locky report including reversed domain generation algorithm)LOCKY RANSOMWARE - ENCRYPTS DOCUMENTS, DATABASES, CODE, BITCOIN WALLETS AND MORE...

Locky: JavaScript Deobfuscation

Counter-Forensics: Pair-Lock Your Device with Apple’s Configurator

病毒分析工具 pin_unpacking_antievasion:A pintool in order to unpack malware and avoid the evasion techniques

UNLEASHING YARA – PART 1

UNLEASHING YARA – PART 2

Do you remember this packet?

报告 Recovering Residual Forensic Data from Smartphone Interactions with Cloud Storage Providers

图形验证码的常见安全问题

A Skeleton Key of Unknown Strength. Observations on CVE-2015-7547, the glibc DNS flaw you need to be aware of.

tools kisskissie:XXE attack tool

运维工具 PacketFence:a fully supported, trusted, Free and Open Source network access control (NAC) solution.

Pentesting SAP Applications : An Introduction

How Google’s Web Crawler Bypasses Paywalls

The “Ultimate”Anti-Debugging Reference

Breaking KASRL with micro architecture Part 1

Early Impacts of Let's Encrypt


评论


当前没有评论,快来评论吧!





来说点什么吧