1
8月

Tittle: 2017.8.2

0 作者:admin

OnePlus 2 Lack of SBL1 Validation Broken Secure Boot(CVE-2017-11105)

AmazonEcho devices vulnerable to physical attacks that can gain a root shell on underlying Linux OS

高通声卡驱动中的条件竞争漏洞分析(CVE-2017-7368)

If you use 7-Zip to extract downloaded files, be warned that it bypasses important Windows Security features(2016)

Introduction to Windows Kernel Exploitation Part 2: Stack Overflow

Abusing npm libraries for data exfiltration(2016)

Electron Security Checklist:A guide for developers and auditors

Exploiting Second Order SQLi Flaws by using Burp & Custom Sqlmap Tamper

当你在浏览器中输入 google.com 并且按下回车之后发生了什么?

tools Revoke-Obfuscation is a PowerShell v3.0+ compatible PowerShell obfuscation detection framework.

tools tool to extract passwords from TeamViewer memory using Frida

tools EXP-CVE-2016-6738:An elevation of privilege vulnerability in the Qualcomm crypto engine driver in Android

tools EXP-CVE-2016-3935:Multiple integer overflows in drivers/crypto/msm/qcedev.c in the Qualcomm cryptographic engine driver in Android allow attackers to gain privileges

tools P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.

tools WMIMon - Tool to monitor WMI activity on Windows

tools OVH Control Panel Cloud UI

tools The audit-testsuite project provides a simple, self-contained regression test suite for the Linux Kernel's audit subsystem.

tools A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports android 4.2 to android 7.1.1


评论


当前没有评论,快来评论吧!





来说点什么吧