16
5月

Tittle: 2018.5.18

0 作者:admin

Analyzing an AZORult Attack – Evasion in a Cloak of Multiple Layers

the many faces of ursnif - email hijacking, mailslots, and insecure servers

利比亚商业RAT分析

Bondat蠕虫难挡利益诱惑,锁主页挖矿勒索危害逐步升级

Beware of the Magic SpEL(L) - Part 2 : More details about the RCE vulnerability affecting Spring-OAuth2

CVE-2018-8120 Analysis and Exploit

Procps-ng Multiple vulnerabilities

Calamp.com Incorrect privilege assignment could lead to full user and vehicle compromise

LocationSmart API Vulnerability

tools Tracking Firm LocationSmart Leaked Location Data for Customers of All Major U.S. Mobile Carriers Without Consent in Real Time Via Its Web Site

System Management Mode Speculative Execution Attacks

Find vulnerabilities in Flash SWF

prototype pollution attack in NodeJS

Bypassing UAC using Registry Keys

Binary SMS - The old backdoor to your new thing

ReDoS in Go

以太坊智能合约安全入门了解一下(上)

android-security-list:Collection of Android security related resources

Twitter:Highly wormable clickjacking in player card($5,040)

2018 腾讯TP游戏安全技术竞赛-决赛进阶版

tools PowerLoaderEx - Advanced Code Injection Technique for x32 / x64

tools Exp of Nanopool Claymore Dual Miner >= 7.3 Remote Code Execution(CVE-2018-1000049)

tools CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.

tools BFuzz:Fuzzing Browsers

tools PHP_Source_Audit_Tools:PHP 白盒分析工具,结合AST 和数据流跟踪分析代码,达到自动化白盒审计功能

tools 天若ocr文字识别工具,集合百度、腾讯、有道、搜狗


评论


当前没有评论,快来评论吧!





来说点什么吧