6
6月

Tittle: 2017.6.7

0 作者:admin

Android: Multiple Android devices do not revoke QSEE trustlets

ETERNALBLUE: Exploit Analysis and Port to Microsoft Windows 10

Privileges and Credentials: Phished at the Request of Counsel

Turla’s watering hole campaign: An updated Firefox extension abusing Instagram

After months researching RIG exploit kit, RSAsecurity reveals huge network of shadow domains

Malicious Android Ads leading to drive by downloads

malicious dropper as an attack vector

“Zusy” PowerPoint Malware Spreads Without Needing Macros

TrickBot’s bag of tricks

iOS 11内核信息 dump

AppLocker Bypass – Assembly Load

Signals Analysis & HackRF

An Introduction to the CAN Bus: How to Programmatically Control a Car

Exploring Virtual Address Descriptors under Windows 10

Finding BIOS Vulnerabilities with Symbolic Execution and Virtual Platforms

A Simple Tool for Linux Kernel Audits

Linux Containers Internals (Part I)

Security Fest 2017 Videos

Set up your own malware analysis lab with VirtualBox, INetSim and Burp

How Command Line Parameters Are Parsed

Passive Fingerprinting of HTTP/2 Clients

jQuery-ui input widget, content option DOM based XSS

三个案例看Nginx配置安全

a simple PoC that the USB port is an attack surface for a Mazda's infotainment system

tools Windows COM Elevation of Privilege Vulnerability | CVE-2017-0213.

tools TrustTrees:A Tool for DNS Delegation Trust Graphing

tools proxytunnel:Stealth tunneling through HTTP(S) proxies

tools WMI_Persistence:A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics

tools win_driver_plugin:A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.

tools Kaitai Struct is a declarative language used for describe various binary data structures, laid out in files or in memory: i.e. binary file formats, network stream packet formats, etc

tools PE Internals provides an easy way to view and modify the structure of executable (PE32 and PE32+) and object (COFF) files.

tools CapAnalysis is a web visual tool for information security specialists, system administrators and everyone who needs to analyze large amounts of captured network traffic.

tools GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.

red Insomnia is a beautiful cross-platform application for organizing, running, and debugging HTTP requests.

tools Scannerl is a modular distributed fingerprinting engine in Erlang


评论


当前没有评论,快来评论吧!





来说点什么吧