10
6月

Tittle: 2018.6.12

0 作者:admin

The Rise of the Cryptocurrency Miners

Russian Service Centers Under Attack

New Trick up the Sleeve: Trickbot Delivered Via Fake Banking Forms

More Details on an ActiveX Vulnerability Recently Used to Target Users in South Korea

a detailed paper on EternalBlue and DoublePulsar of 2017–2018

色情直播:进击中的Android色情产业

高清无码|一条色情资源链竟由某博、某宝、某云盘无缝衔接

Full Disclosure of Highly-Manipulatable, tradeTrap-Affected ERC20 Tokens in Multiple Top Exchanges

权限控制不当:一些智能合约可被攻击者永久销毁

The Tale of SettingContent-ms Files-One click hyperlink execution, Office 2016 OLE block list evasion and ASR child proc rule evasion

利用ARM MMU硬件特性开启安卓8终端的上帝模式

共享软件中恶意代码插入技术研究

Cookies for dummies: Part 1 basic concepts

Cookies for dummies Part 2: Third-party tracking cookies

Cookies for dummies Part 3: Understanding security flags – Secure, HttpOnly and SameSite

利用chrome_remote_interface实现程序化、自动化Web安全测试

x33fcon slides

SecWiki周刊(2018/06/04-2018/06/10)

NodeJS: All versions of macaddress are vulnerable to command injection

tools EtherScamDB:Keep track of all current ethereum scams in a large database

tools chrome-remote-interface:Chrome Debugging Protocol interface for Node.js

tools chrome_remote_interface_python:Chrome Debugging Protocol interface for Python

tools bnida:Suite of plugins that provide the ability to transfer analysis data between Binary Ninja and IDA


评论


当前没有评论,快来评论吧!





来说点什么吧