28
6月

Tittle: 2017.6.29

0 作者:admin

CIA 'ESLA' implant to track the location of laptops by intercepting the surrounding WiFi signals

New ransomware, old techniques: Petya adds worm capabilities

Reverse Engineering Samsung S6 SBOOT - Part II

Use after Silence: quietly patched use after free VMware escape that won at CanSecWest PWN2OWN this year

Stack Clash exploits are now available

article on attacks using PlugX - several of them using App Whitelisting Bypasses

针对巴基斯坦的某APT活动事件分析

Windows Keylogger Part 2: Defense against user-land

Backdooring Windows Executable Files

Reverse Engineering the Linear DX Wireless Security System

How to block usage of PsExec in your network

Kaspersky Security Network: Ransomware in 2016-17

2017 state of bug bounty report(bugcrowd)

Stored XSS in comments on www.starbucks.co.uk/blog/*

The path traversal that lead to a 5K etc/passwd file

How I found a persistent XSS affecting thousands of career sites

TrendMicro CTF 2017 Reverse300 writeup

tools BlueHat 2016 - WMI attack detection demo

tools Exploit toolkit CVE-2017-0199 PoC

tools wifiScanMap:an other wifi mapping tool

tools Stackhackr: New malware simulation tool

tools CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across all versions of

tools Uproot is a Host Based Intrusion Detection System (HIDS) that leverages Permanent Windows Management Instrumentation (WMI) Event Susbcriptions to detect malicious activity on a network.

tools IDA Pro RCE exploit


评论


当前没有评论,快来评论吧!





来说点什么吧