21
5月

Tittle: 2018.5.22

0 作者:admin

Some fun with a miner-How a miner can hide itself behind some legit processes: “Notepad.exe”

DDG.Mining.Botnet 近期活动分析

speculative execution, variant 4: speculative store bypass(CVE-2018-3639)

tools Analysis and mitigation of speculative store bypass (CVE-2018-3639)

XXE vulnerability due to Apache Solr configset upload(CVE-2018-8010)

Java: Exploiting your "unreachable" JRMP/RMI/JMX endpoints (CVE-2018-2800)

Adobe, Me and a Double Free :: Analyzing the CVE-2018-4990 Zero-Day Exploit

GitBucket 4.23.1 Unauthenticated Remote Code Execution

Dolibarr ERP XSS Injection vulnerability(cve-2018-10095)

Dolibarr ERP SQL Injection vulnerability(cve-2018-10094)

Dolibarr ERP admin panel authenticated Remote Code Execution (RCE) vulnerability(cve-2018-10092)

Decrypting APT33’s Dropshot Malware with Radare2 and Cutter – Part 1

Hacking the PS4 - From zero to ring zero in two easy steps

Kerberoasting, exploiting unpatched systems – a day in the life of a Red Teamer

Breaking namespace isolation with PF_RING

Weaponizing Blockchain

2017年中国网络安全行业年报

2018 Q1 | 长亭《季度漏洞观察报告》

SecWiki周刊(2018/05/14-2018/05/20)

$36k Google App Engine RCE

Getting read access on Edmodo's Production server by exploiting SSRF vulnerability!

RCTF 2018 Writeup

tools CVE-2018-8174 Calculator PoC(vbscript exploit)

tools PwnAuth:A web application framework for launching and managing OAuth abuse campaigns.

tools Robber is open source tool for finding executables prone to DLL hijacking

tools Longtime Sunshine is a proof of concept Nashorn based post exploitation framework.


评论


当前没有评论,快来评论吧!





来说点什么吧