27
10月

Tittle: 2017.10.28

0 作者:admin

Tracking Subaat: Targeted Phishing Attack Leads to Threat Actor’s Repository

Detecting the Reaper botnet

Rise of the IoT Reaper

EiTest campaign via HoeflerText popup delivers malware

Harioboy水坑攻击这点事

Escalating Privileges in Linux using Voltage Fault Injection

Analyzing a Safari exploit and patch from Pwn2Own 2017

Hyper-V debugging for beginners. Part 2, or half disclosure of MS13-092

Windows Operating System Archaeology

Building a Better Moat: Designing an Effective Covert Red Team Attack Infrastructure

Abusing GDI objects: Bitmap object’s size in the kernel pool

One pixel attack for fooling deep neural networks

Videos of 44CON 2017 talks and workshops

D-Link系列路由器漏洞挖掘入门

PHPMailer 5.2.21 Local File Disclosure

Wappalyzer SSRF Write up

tools TrevorC2 - Command and Control via Legitimate Behavior over HTTP

tools tactical-exploitation:Modern tactical exploitation toolkit.

tools FruityWiFi is a wireless network auditing tool.

tools awesome-podcasts:Curated list of awesome programming podcasts, organized alphabetically & topically

tools Orbot:acts as a front-end to the Tor binary application,and also provides an HTTP Proxy for connecting web browsers and other HTTP client applications into the Tor SOCKS interface

tools XXEinjector:Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.

tools race-the-web:Tests for race conditions in web applications. Includes a RESTful API to integrate into a continuous integration pipeline.


评论


当前没有评论,快来评论吧!





来说点什么吧