1.FIT 2017
威脅情報:
1.2016中國電腦惡意程序偽裝與欺騙性研究報告 by 360安全衛士
PT姿勢:
1.Explore Hidden Networks With Double Pivoting by Mucahit Karadag
2.Powershell tricks::Hide Process by kd.exe by 3gstudent
基礎概念教學:
1.PentesterLab 的Padding Oracle 漏洞靶機測試 by RAJ CHANDEL;翻譯:MottoIN
2.scrapy爬蟲教程導航 by Bruce Tang
3.安卓Hook函數的複雜參數如何給定? by aqcxbom
4.6步教你搞定網絡威脅建模 by E安全
5.Mind-Map - 各種安全相關思維導圖整理收集 by phithon
6.科普VT EPT by ugvjewxf
漏洞分析:
1.Python 格式化字符串漏洞(Django為例) by phithon
2.Analyzing Embedded Operating System Random Number Generators by samvartaka
3.e107 CMS 小於等於2.1.2 權限提升漏洞分析 by 西風微雨
4.RESTful架構風格下的4大常見安全問題 by ThoughtWorks_馬偉
5.TIMA Arbitrary Kernel Module Verification Bypass by laginimaineb
6.Kaspersky: SSL interception differentiates certificates with a 32bit hash by taviso
7.Windows Kernel Exploit - Uninitialized Heap Variables(Paged Pool) by Tistory
工具:
1.BARF -- 二進制分析及逆向框架 by Programa STIC
2.SMB Relay with Snarf by Jeff Dimmock
3.Fresh Veil Automatically Generating Payloads by Jeff Dimmock
4.Operative - The Fingerprint Framework by James Bond
5.Choronzon - An evolutionary knowledge-based fuzzer by CENSUS
6.Invoke-TheHash - PowerShell Pass The Hash Utils by Kevin Robertson
7.基於Spark的公安大數據實時運維技術實踐 by秦海龍
沒有留言:
張貼留言