13
6月

Tittle: 2017.6.14

0 作者:admin

Analyzing Xavier: An Information-Stealing Ad Library on Android

Nexus 9 vs. Malicious Headphones, Take Two (CVE-2017-0648)

AppLocker Bypass – IEExec

One of my first sandbox escapes and bugs (CVE-2015-1743)

Overview of all the in-memory only code execution techniques for Windows

SambaCry 野外利用分析

WMI 的攻击,防御与取证分析技术之攻击篇

#SSTIC2017#Hackers Can Spoof Phone Numbers, Track Users Via 4G VoLTE Mobile Technology

HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure

Serving Random Payloads with Apache mod_rewrite

More Bypassing of Malware Anti-Analysis Techniques

Solving b-64-b-tuff: writing base64 and alphanumeric

Wannacry chronicles: Messi, korean, bitcoins and ransomware last hours

Pentest-Report Teleport Client & Server

Targeting RSA Emergency Access Tokencodes for Fun and Profit

The Client is not always right! How to secure OAuth authentication from your app.

Browser Localhost abuse!(abuse the activex installer)

透过F5获取服务器真实内网IP

Mysql提权(CVE-2016-6663、CVE-2016-6664组合实践)

mega.nz private code leak

tools WordSteal:a POC that will steal NTML hashes from a remote computer via Microsoft Word

tools Execute Shellcode via Injected AppDomainManager

tools XSSRadar is a chrome extension that detects XSS vulnerabilities!

tools Wireless_Query:Query for all saved WiFi passwords across an Active Directory

tools Invoke-TheHash contains PowerShell functions for performing pass the hash WMI and SMB tasks.

tools WSUSpendu:Implement WSUSpendu attack

tools VTTracker:monitor and track relevant data from VT Intelligence Notifications feeds.

tools sandcastle:A Python script for AWS S3 bucket enumeration.

tools DLTK - Deep Learning Toolkit for Medical Image Analysis

tools ViperMonkey:A VBA parser and emulation engine to analyze malicious macros.


评论


当前没有评论,快来评论吧!





来说点什么吧