2
8月

Tittle: 2018.8.3

0 作者:admin

The Gorgon Group: Slithering Between Nation State and Cybercrime

Who Are You Mr.Dropper? (APT malware targeted at Korean financial institutions disguised as resume.)

中国香港地区 DDoS-botnet 分析报告

Google Chrome PDFium "CPDF_ExpIntFunc::v_Call" Heap-based Buffer Overflow Vulnerbility (CVE-2018-6120)

Throwing Shade: Analysis Of A Foxit Integer Overflow(CVE-2018-14295)

Infiniband Linux Driver UAF(CVE-2018-14737)

Imperva SecureSphere <= v13 - Privilege Escalation

ASP.NET resource files (.RESX) and deserialisation issues

Exploiting a Microsoft Edge Vulnerability to Steal Files

Rooting your Router ZTE F670E by abusing an old Samba

Escaping the Sandbox – Microsoft Office on MacOS

Tackling Android Stego Apps in the Wild

Exploitable or Not Exploitable? Using REVEN to Examine a NULL Pointer Dereference.

Bypassing and exploiting Bucket Upload Policies and Signed URLs

Breaking Full Disk Encryption from a Memory Dump

记一次Java反序列化漏洞的发现和修复

Tips for Penetration Testing a PCI environment

从solidity语言特性深度解读以太坊智能合约漏洞原理和攻击利用

Google Project Zero team:Adventures in vulnerability reporting

Malware Sandbox Emulation in Python

Collection of pentest cheatsheets

2018年上半年中国互联网安全报告

tools a PoC for CVE-2017-18344, a Linux kernel arbitrary-read vulnerability in the timer subsystem

tools Eventlogedit-evt--General:Remove individual lines from Windows Event Viewer Log (EVT) files

tools windowsblindread:A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system

tools Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.

tools Volatility Plugin for Detecting Cobalt Strike Beacon


评论


当前没有评论,快来评论吧!





来说点什么吧