23
8月

Tittle: 2018.8.27

0 作者:admin

In-Depth Reversing of Recent Gozi ISFB Banking Malware Version 2.16 & "client.dll"

Remote NTLM relaying through meterpreter on Windows port 445

CVE-2018-8414 Samples In The Wild

CVE-2018-8414:SettingContent-ms文件任意代码执行漏洞及在野攻击分析

CVE-2018-15685 - Electron WebPreferences Remote Code Execution

tools POC for CVE-2018-15685

Google Chrome Blink "ReadableStreamBytesConsumer::OnFulfilled::Call()" Type Confusion Vulnerability (CVE-2018-6124)

Fortnite Installer downloads are vulnerable to hijacking

thinkphp3.2_find_select_delete注入

ThinkPHP3.2 框架sql注入漏洞分析(2018-08-23)

Windows Process Injection: Extra Window Bytes

A Look Into Signal’s Encrypted Profiles-Can this feature get abused for OSINT discovery?

Stealing Certificates with Apostille

Air Conditioner Remote Reverse Engineered Despite Esoteric Protocol

(Meltdown&Spectre&TLBleed&NetSpectre&L1TF )The spectre of hardware bugs – How to avoid the security meltdown

以太坊智能合约多个攻击案例分析

2018上半年暗网研究报告

Remote Code Execution on a Facebook server

tools burpsuite_pro_v2.0beta抢先测试版

tools POC for Apache Struts CVE-2018-11776

tools findsubdomains:Find subdomains online

tools Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware.

tools Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.

tools WAM is a platform powered by Python to monitor "Web App"

tools Deepo:包含几乎所有主流深度学习框架的Docker镜像


评论


当前没有评论,快来评论吧!





来说点什么吧