8
8月

Tittle: 2018.8.10

0 作者:admin

A Malware Campaign Targeting the Tibetan Diaspora Resurfaces

Bokbot: The (re)birth of a banker

Examining Code Reuse Reveals Undiscovered Links Among North Korea’s Malware Families

Linux kernel: CVE-2017-18344: arbitrary-read vulnerability in the timer subsystem

tools Exploit for CVE-2017-18344

An Analysis of the DLL Address Leaking Trick used by the “Double Kill” Internet Explorer Zero-Day exploit (CVE-2018-8174)

iOS jailbreak internals (2): Escaping sandbox using callbacks on iOS 11.4

Android Operating System: One Potential Vulnerability per 4000 Lines of C++ Code

Breaking down the door to emergency services through cellular IoT gateways

the path to EL1 in iOS 11

Attacking Client-Side JIT Compilers

iOS越狱细节揭秘:危险的用户态只读内存

Practical Web Cache Poisoning

Breaking Parser Logic!:Take Your Path Normalization Off and Pop 0days Out

How to Hack WebSockets and Socket.io

Case studies in Rich Header analysis and hunting

WebKit浏览器漏洞面面观

BlackHat2018 ppt陆续可下载

threat-intelligence:收集的一些国外能提供提供威胁情报的公司,涵盖网络安全、工控安全、终端安全、移动安全等领域

Clickjackings in Google worth 12644.7$

tools rosenbridge:Hardware backdoors in x86 CPUs

tools social_mapper:A Social Media Enumeration & Correlation Tool

tools Rattle is an EVM binary static analysis framework designed to work on deployed smart contracts.

tools EKTotal is an integrated analysis tool that can automatically analyze the traffic of Drive-by Download attacks.

tools Fuzzlyn:Fuzzer for the .NET toolchains

tools surya:A set of utilities for exploring Solidity contracts

tools Jumpserver是全球首款完全开源的堡垒机,是符合 4A 的专业运维审计系统


评论


当前没有评论,快来评论吧!





来说点什么吧