29
3月

Tittle: 2018.3.30

0 作者:admin

Targeted Attacks on South Korean Organizations-Attacks Using Local Word Processor

fauxpersky: credstealer malware written in autohotkey masquerades as kaspersky antivirus, spreading through infecting usb drives

In-depth Formbook malware analysis – Obfuscation and process injection

An in-depth malware analysis of QuantLoader

PS4 4.55 BPF Race Condition Kernel Exploit Writeup

Webmin 1.840/1.880 Local File Include (CVE-2018-8712)

Amazon’s AWS Misconfiguration:Arbitrary Files Upload in Amazon Go

Zer0Con2018#sandbox escape from WebKit(CVE-2017-2547+CVE-2017-2540+CVE-2017-2541)

利用最新Apache解析漏洞(CVE-2017-15715)绕过上传黑名单

Beyond xp_cmdshell - Owning the Empire Through SQL Server

区块链安全#Zeppelin Augur Core Audit v1.0.0

Exploiting Browser Extensions & Context Menus

Prevent bypassing of SSL certificate pinning in iOS applications

Reverse Engineering Network Protocols

Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues

BLE安全入门系列

Exploit kits: Winter 2018 review

绿盟2017金融科技安全分析报告

绿盟2017物联网安全年报

CNCERT 2018年2月我国DDoS攻击资源分析报告

tools DdiMon:Monitoring and controlling kernel API calls with stealth hook using EPT

tools Klara project is aimed at helping Threat Intelligence researchers hunt for new malware using Yara.

tools Adhrit - Android APK Reversing And Analysis Tool That Can Help Secuity Researchers And CTF Enthusiasts Alike

tools ScrapedIn:A tool to scrape LinkedIn without API restrictions for data reconnaissance

tools cloud-inquisitor:Enforce ownership and data security within AWS

tools Etherscan is a Block Explorer and Analytics Platform for Ethereum, a decentralized smart contracts platform.

tools minhook:The Minimalistic x86/x64 API Hooking Library for Windows

tools android-app-vulnerability-benchmarks :This repository documents vulnerabilities that can occur in native Android apps running on Android 4.4 - Android 7.1


评论


当前没有评论,快来评论吧!





来说点什么吧