12
6月

Tittle: 2017.6.13

0 作者:admin

MySQL - use-after-free after mysql_stmt_close()

MacRansom-analyzing the latest ransomware to target macs

MacRansom: Offered as Ransomware as a Service

crash override:Analysis of the Threat to Elecrtic Grid Operations

WIN32/INDUSTROYER:A new threat for industrial control systems

MacRansom样本(infect3d)

蓝牙App漏洞系列分析之二CVE-2017-0639

AppLocker Bypass – File Extensions

Attacking the CLR - AppDomainManager Injection

Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators

Detecting Lateral Movement through Tracking Event Logs

DNS hijacking using cloud providers– no verification needed

Vault7 Leaks : A look at Longhorn Trojan and Black Lambert spying backdoor

Evolution of Trickbot(西班牙文)

appsec2017 slides and videos

Circle City Con 2017 Videos

Ph'ing Phishers

ctf.tf - A database of collected CTFs and their solutions

Reverse engineering guide for beginners: Methodology and tools

DOM XSS Sources & Sinks

BSides London 2017 WriteUp (Talk & Slides)

PLATINUM APT Sample(SHA1 fab945ebfda2df8ed150e467226a914a5fc0b2c9)

tools AIL framework - Analysis Information Leak framework

tools Application Whitelist Auditor is designed to comprehensively audit application whitelists for weaknesses, regardless of vendor.

tools ground-control:A collection of scripts that run on my web server. Mainly for SSRF, blind XSS, and XXE vulnerabilities.

tools msf-auxiliarys:collection of metasploit auxiliary post-modules

tools Def:Incomplete PoC to gain arbitrary delete by abusing win defender

tools DATA: Credential Phish Analysis and Automation

tools repo-supervisor:Scan your code for security misconfiguration, search for passwords and secrets.

tools WEPExplorer:Windows Events Providers Explorer

tools Great SCT is an open source project to generate application white list bypasses.


评论


当前没有评论,快来评论吧!





来说点什么吧