3
6月

Tittle: 2018.6.4

0 作者:admin

挖矿木马借“XX的秘密”等小黄书疯传,中毒后会劫持比特币交易

Satan Ransomware Spawns New Methods to Spread

Hadoop Yarn REST API未授权漏洞利用挖矿分析

尼日利亚黑客团伙SWEED攻击手法揭秘

一篇小黄文牵出国内最大黑产,你被“上”过吗?

CVE-2018-11235 git RCE

CVE-2018-11235 - Quick & Dirty PoC

RCE with Git submodule 分析-【CVE-2018-11235】

cgminer bfgminer bitcoin miner arbitrary file write(cve-2018-10057)

cgminer bfgminer bitcoin miner buffer overflow(cve-2018-10058)

Rooting the Technicolor 7210(cve-2010-0926)

CVE-2018-8120在Windows 7 x64环境下的漏洞利用分析

An explanation of how debugfs and nf hooks can be used to remotely execute code.

Remote Vulnerability - Exploiting Buffer Overflow on a PIC

Don't Trust the PID!-Stories of a simple logic bug and where to find it

iOS/macOS 0-day^w48-hours - from sandbox to kernel

Steps by step guide to bypass the latest version of Windows Defender using PowerShell, Invoke-CradleCrafter and Microsoft’s Certutil.exe.

How to Create an Undetectable Payload, Part 1 (Bypassing Antivirus Software)

PROPagate code injection technique

A Survey of Attacks on Ethereum Smart Contracts

A Brief Introduction to Long Range Attacks Against Proof of Stake Protocols

Let’s write Swift code to intercept SSL Pinning HTTPS Requests

Interactive Shell via BlueTooth

A Journey Into a Red Team

A Journey Into Capcom's CPS2 Silicon - Part 3

Patching an iOS application with Hopper

Linux Memory Forensics: Expanding Rekall Userland Investigation

数字金融反欺诈白皮书

tools iPhone X 11.3.1 kernel exploit simple PoC

tools metasploit:WebKit apple safari trident exploit (CVE-2016-4657)

tools Sony Playstation 4 (PS4) 5.07 - 'Jailbreak' WebKit / 'bpf v2' Kernel Loader

tools Shadow-box is a lightweight and practical kernel protector

tools Otseca - Open source security auditing tool to search and dump system configuration

tools 特斯拉用于Model S和Model X的Linux源代码


评论


当前没有评论,快来评论吧!





来说点什么吧