18
10月

Tittle: 2017.10.19

0 作者:admin

Endian Firewall Stored From XSS to Remote Command Execution

HPE Baseline Smart Gig SFP 24 Switch Pre-authentication Stored XSS

Analysis of a Russian based Win32.CoinMiner Monero mining malware

Analysis of a macroless maldoc that avoids detection with YARA rules

A very detailed and educational malware analysis report for a typical banking trojan

Fake Power and Broadband Utility Bills serve Banking Trojans to Aussies

Magniber ransomware: exclusively for South Koreans

Browser security beyond sandboxing(google chrome rce/CVE-2017-5121)

Reverse engineering of the Nitro OBD2

Kerberos AD Attacks - Kerberoasting

BoundHook: Exception Based, Kernel-Controlled UserMode Hooking

Blind Java Deserialization Vulnerability - Commons Gadgets(2016)

Blind Java Deserialization - Part II - exploitation rev 2(2016)

A Closer Look at North Korea’s Internet

Recovered Windows Defender Application Guard Hyper-V Container Code Integrity Policy

hack_lu_2017视频

#hack_lu_2017#Python and machine learning

#hack_lu_2017#Prototyping and reverse engineering with frida_hacklu

#hack_lu_2017#Incident Response -in the Age of Threat Intelligence with MISP, TheHive & Cortex

CVE-2017-14955: Win a Race Against Check_mk to Dump All Your Login Data

AngularJs 用户输入动态模板xss

Vimeo OAuth 2 Authorization Bypass via CSRF and Cross Site Flashing

tools New nmap NSE script to check for ROCA CVE-2017-15361 weak RSA keys!

tools Shadow is a unique discrete-event network simulator that runs real applications like Tor, and distributed systems of thousands of nodes on a single machine.

tools hakchi2:Tool that allows you to add more games to your NES/SNES Classic Mini


评论


当前没有评论,快来评论吧!





来说点什么吧