29
1月

Tittle: 2018.1.30

0 作者:admin

VERMIN: Quasar RAT and Custom Malware Used In Ukraine

CVE-2017-8570首次公开的野外样本及漏洞分析

Google Chrome V8 Use-After-Free Vulnerability + Exploit by Zhao Qixun (CVE-2017-15399)

iB-WRA150N Multiple Vulnerabilities

Reviving DDE: Using OneNote and Excel for Code Execution

DCShadow explained: A technical deep dive into the latest AD attack technique

Exploiting "System Shield AntiVirus"(一个反病毒产品) Arbitrary Write Vulnerability using SeTakeOwnershipPrivilege

When your DNS leaks your infrastructure

tools privdns:Check dns servers for reverse resolving private ips

Electron’s bug, ShellExecute to blame?

Decrement Windows kernel for fun and profit

How a malicious seed generation website stole $4 million

Write YARA Rules to Detect Embedded EXE Files in OLE Objects

Bluetooth and Personal Protection Device Security Analysis

Hacking Everything with RF and Software Defined Radio - Part 3

Ever wanted to debug Cisco ASA in qemu? Now you can

互联网金融黑中介指南

赛博地球杯工控比赛决赛Writeup

SecWiki周刊(2018/01/22-2018/01/28)

HackerOne:Markdown parsing issue enables insertion of malicious tags and event handlers(5000$)

tools MJAppTools:【越狱-逆向】处理iOS APP信息的命令行工具

tools mjcript:【越狱-逆向】基于Cycript实现的一些实用函数

tools metasploit:MS17-010 Windows SMB Remote Command and Code Execution modules for all vulnerable targets Windows 2000 through 2016

tools WiFi-Miner-Detector:A tool for detecting WiFi Miner. Achieve by analyzing unencrypted 802.11 Data Frame


评论


当前没有评论,快来评论吧!





来说点什么吧