19
6月

Tittle: 2018.6.20

0 作者:admin

Olympic Destroyer is still alive

New analysis of SamSam ransomware

ZeroFont Phishing: Manipulating Font Size to Get Past Office 365 Security

Backswap malware analysis

Kardon Loader is malware downloader advertised on underground forums as a paid open beta product.

剪贴板幽灵瞄准虚拟货币,出师不利1个月亏损4000万?

(Pwn2Own 2018 exploit-chain part 2)Timeless Debugging of Complex Software-Root Cause Analysis of a Non-Deterministic JavaScriptCore Bug

Windows: Desktop Bridge Virtual Registry CVE-2018-0880 Incomplete Fix EoP

Windows: Desktop Bridge Activation Arbitrary Directory Creation EoP( CVE-2018-8208)

analyzing an integer overflow in bitdefender av: part 1 – the vulnerability(CVE-2017-17408)

Intel LazyFP vulnerability: Exploiting lazy FPU state switching(updated)

ATN抵御合约攻击的报告 --基于ERC223与DS-AUTH的混合漏洞

AWS Privilege Escalation – Methods and Mitigation

Deserialization Vulnerabilities: Attacking Deserialization in JS

IOTFUZZER: Discovering Memory Corruptions in IoT Through App-based Fuzzing

Hiding in Plain Sight: Using the Office 365 Activities API to Investigate Business Email Compromises

Introduction to Trusted Execution Environment: ARM's TrustZone

2亿苹果用户的魔咒,博彩短信背后的黑产王国

SecWiki周刊(2018/06/11-2018/06/17)

tools Walrus:An Android app that lets you use your access control card cloning devices in the field.

tools tumbleRF -Unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis

tools Reverse-engineered Diablo source code

tools kconfig-hardened-check:A script for checking the hardening options in the Linux kernel config

tools Mallet is a tool for creating proxies for arbitrary protocols, along similar lines to the familiar intercepting web proxies

tools UnblockableChains is a POC project of a fully functional C&C infrastructure on top of the public Ethereum network.

tools Scout2:Security auditing tool for AWS environments

tools Security Tools Lists for AWS


评论


当前没有评论,快来评论吧!





来说点什么吧