21
6月

Tittle: 2018.6.22

0 作者:admin

Drupal Vulnerability (CVE-2018-7602) Exploited to Deliver Monero-Mining Malware

GZipDe: An Encrypted Downloader Serving Metasploit

Credit card stealing malware on Magento websites takes its code from Pastebin

Scammy App That Infects Phones for Ad-clicking and Info-Stealing Controls Over 60,000 Devices

后门病毒通过下载站传播 全面劫持各大主流浏览器

analyzing an integer overflow in bitdefender av: part 2 – the exploit

The (in)security of the TP-Link Technologies TL-WA850RE Wi-Fi Range Extender*

tools EXP of TP-Link TL-WA850RE - Remote Command Execution

EMC RecoverPoint < 5.1.2/5.1.1.3 username command injection (remote root exploit)

true story: the case of a hacked baby monitor (gwelltimes p2p cloud)

FastJson反序列化漏洞(续)

A quick analysis malicious RTF to write yara rule part 1

Detecting Kernel Memory Disclosure – Whitepaper

Kernel Forensics and Rootkits

Enumerating Anti-Sandboxing Techniques

Automated Binary Analysis on iOS – a Case Study on Cryptographic Misuse in iOS Applications

信息安全知识库(vipread)2018全站离线打包11.7 GB

XSS in Google Colaboratory + CSP bypass

Using a GitHub app to escalate to an organization owner for a $10,000 bounty

tools Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296)

tools Test CVE-2018-0296 and extract usernames

tools poc of Apache CouchDB Remote Code Execution

tools Windows 10 - Desktop Bridge Activation Arbitrary Directory Creation Privilege Escalation

tools Gpredict is a real time satellite tracking and orbit prediction program for the Linux desktop.

tools SubFinder is a subdomain discovery tool that can enumerate massive amounts of valid subdomains for any target

tools delta-debugging:Debugging library to quickly get the minimal crashing test case


评论


当前没有评论,快来评论吧!





来说点什么吧