3
11月

Tittle: 2017.11.6

0 作者:admin

Let's Learn: Lethic Spambot & Survey of Anti-Analysis Techniques

CrunchyRoll hack delivers malware

Splunk Local Privilege Escalation

Generating malware code from external legitimate resources

PE File Infection Part II

undocumented (AFAIK) named pipe prefixes, how to use and create them to block pipe squatting attacks

Malware Detection by Eating a Whole EXE

resources for identifying digital certificates abused by malware-1

resources for identifying digital certificates abused by malware-2

Reconstructing ROCA A case study of how quickly an attack can be developed from a limited

How STACKLEAK improves Linux kernel security

SophosLabs 2018 Malware Forecast

node.js + postgres 从注入到Getshell

Taking over Instagram accounts

CRLF injection in blockchain.info

Accessing Localhost via Vhost

Weaponizing Clickjacking Attack With Click Content Jacking

tools mkmalwarefrom:Proof-of-concept two-stage dropper generator that uses bits from external sources

tools Sigma is a generic and open signature format that allows you to describe relevant log events in a straight forward manner.

tools Icewater:About 3,000 Free Yara rules

tools Moistpetal is a modular malware framework for modern red teams.

tools BlockSci:A high-performance tool for blockchain science and exploration

tools CuckooDroid 2.0 - Automated Android Malware Analysis.

tools afl-swift:use afl to fuzz swift program

tools afl-ios:use afl to fuzz ios program

tools INTANG is research project for circumventing the "TCP reset attack" from the Great Firewall of China (GFW) by disrupting/desynchronizing the TCP Control Block (TCB) on the censorship devices.


评论


当前没有评论,快来评论吧!





来说点什么吧