18
6月

Tittle: 2018.6.19

0 作者:admin

Six Years and Counting:Inside the Complex Zacinlo Ad Fraud Operation

New Telegram-abusing Android RAT discovered in the wild

Decrypting APT33’s Dropshot Malware with Radare2 and Cutter – Part 2

A Brief Overview of the AMMYY RAT Downloader

僵尸永远不死,Satori也拒绝凋零

Significant Vulnerabilities in Axis Cameras

Google Chrome WebAssembly Locals Processing Integer Overflow Vulnerability (CVE-2018-6092)

Microsoft Windows Remote Kernel Crash Vulnerability(CVE-2018-1040)

Marshalling to SYSTEM - An analysis of CVE-2018-0824

Another ColdFusion RCE – CVE-2018-4939

Cache Me Outside (Apple's 'QuickLook' cache may leak encrypted data)

Cracking SSL pinning in AFNetwork

BYOL presents a powerful new technique for red teamers to remain undetected during their engagements

Exploring PowerShell AMSI and Logging Evasion

Advanced CORS Exploitation Techniques

Android Hardening - an incomplete archive of Android hardening.

Backdooring your server through its BMC: the HPE iLO4 case

Modern Linux Malware Exposed

Ransomware Payment in the Bitcoin Ecosystem

A collection of fully annotated iOS and Android exploits

天枢CTF线下赛-2018

Reflected Client XSS at Amazon.com

tools 工业控制系统(ICS)安全专家必备的测试工具和安全资源

tools Safari Exploit for iOS 11.3.1 - the exploit obtains tfp0 from the WebContent sandbox via two known bugs: CVE-2018-4233 and CVE-2018-4243

tools house:A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.

tools Sutekh:An example rootkit that gives a root shell

tools XXEGen:XXE payloads generator online

tools PE-Linux:Linux Privilege Escalation Tool


评论


当前没有评论,快来评论吧!





来说点什么吧