首页
课程
问答
CTF
社区
招聘
峰会
发现
排行榜
知识库
工具下载
看雪20年
看雪商城
证书查询
登录
注册
首页
社区
课程
招聘
发现
问答
CTF
排行榜
知识库
工具下载
峰会
看雪商城
证书查询
社区
茶余饭后
发新帖
4
0
[分享]国外最新安全推文整理(第2期)
发表于: 2016-11-6 08:24
3423
[分享]国外最新安全推文整理(第2期)
BDomne
5
2016-11-6 08:24
3423
有些可能需要VPN访问,安全性方面自己多留意:D
CANToolz - framework for black-box CAN network analysis
https://github.com/eik00d/CANToolz
Playing with the Tigress binary protection. Automatic deobfuscation using symbolic execution and LLVM
https://github.com/JonathanSalwan/Tigress_protection
RePEconstruct to auto unpack Windows binary & rebuild the Import Address Table
https://github.com/DavidKorczynski/RePEconstruct
A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers
https://github.com/mwrlabs/win_driver_plugin
FireEye Labs Obfuscated String Solver - Automatically extract obfuscated strings from malware
https://github.com/fireeye/flare-floss
APK backdoor embedder
https://github.com/suraj-root/spade
Android Emulator for mobile security testing
https://github.com/mseclab/nathan
Reflective SO injection
https://github.com/infosecguerrilla/ReflectiveSOInjection
Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)
https://github.com/mempodippy/vlany
static program analysis tool that generates return-oriented exploits for ELF binaries
https://github.com/wizh/rop-chainer
A collection of Windows, Linux and MySQL privilege escalation scripts and exploits
https://github.com/1N3/PrivEsc
A little bit about a linux kernel
https://github.com/0xAX/linux-insides
This framework is for fuzzing OSX kernel vulnerability based on passive inline hook mechanism in kernel mode
https://github.com/SilverMoonSecurity/PassiveFuzzFrameworkOSX
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems
https://github.com/CISOfy/lynis
A repository for learning various heap exploitation techniques
https://github.com/shellphish/how2heap
.NET assembly editor, decompiler, and debugger
https://github.com/0xd4d/dnSpy
INTERLOCK - file encryption front end
https://github.com/inversepath/interlock
a small suite of tools to test various properties of sandboxes on Windows
https://github.com/google/sandbox-attacksurface-analysis-tools
POC code for our Event Tracing for Widows (ETW) presentation at Ruxcon 2016
https://github.com/CyberPoint/Ruxcon2016ETW
Ruxcon 2016 slides
https://ruxcon.org.au/slides
The Hack.lu 2016 conference was great! Missed a talk? Slides
http://archive.hack.lu/2016/
Write C++ code in the browser and see the compiled x86 assembly code in real time
https://gcc.godbolt.org/
Breaking BHAD: Getting Local Root on the Belkin WeMo Switch
https://www.invincealabs.com/blog/2016/11/wemo-hardware-bypass/
Pixhawk Firmware Hooking
https://www.invincealabs.com/blog/2016/10/pixhawk-firmware-hooking/
Exploiting AMI Aptio firmware on example of Intel NUC
http://blog.cr4.sh/2016/10/exploiting-ami-aptio-firmware.html
Inside The Bulb: Adventures in Reverse Engineering Smart Bulb Firmware
https://hackernoon.com/inside-the-bulb-adventures-in-reverse-engineering-smart-bulb-firmware-1b81ce2694a6
The DrK (De-randomizing Kernel ASLR) attack
https://github.com/sslab-gatech/DrK
Breaking Kernel Address Space Layout Randomization with Intel TSX
http://www.cc.gatech.edu/~yjang37/assets/papers/2016/jang:drk-ccs.pdf
Jump Over ASLR: Attacking Branch Predictors to Bypass ASLR
http://www.cs.ucr.edu/~nael/pubs/micro16.pdf
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR
https://gruss.cc/files/prefetch.pdf
Rootkit analysis Use case on HideDRV
http://www.sekoia.fr/blog/wp-content/uploads/2016/10/Rootkit-analysis-Use-case-on-HIDEDRV-v1.6.pdf
Technical Analysis of the Pegasus Exploits on iOS
https://info.lookout.com/rs/051-ESQ-475/images/pegasus-exploits-technical-details.pdf
Advances in Modern Malware and Memory Analysis
http://www.eurecom.fr/en/publication/4686/download/sec-publi-4686.pdf
Trading Off a Vulnerability: Does Software Obfuscation Increase the Risk of ROP Attacks
http://riverpublishers.com/journal/journal_articles/RP_Journal_2245-1439_444.pdf
The Missing Link: Explaining ELF Static Linking, Semantically
https://www.cl.cam.ac.uk/~pes20/rems/papers/oopsla-elf-linking-2016.pdf
Secure Application Programming in the Presence of Side Channel Attacks
https://www.riscure.com/benzine/documents/Paper_Side_Channel_Patterns.pdf
AtomBombing: Brand New Code Injection for Windows
https://breakingmalware.com/injection-techniques/atombombing-brand-new-code-injection-for-windows/
Exploiting Linux kernel heap using a real UAF method against CVE-2016-6187 vulnerability
https://cyseclabs.com/blog/cve-2016-6187-heap-off-by-one-exploit
Microsoft Kernel Integer Overflow Vulnerability MS16-124 / CVE-2016-0070
https://blog.fortinet.com/2016/10/31/microsoft-kernel-integer-overflow-vulnerability
writeup for CVE-2016-4622
http://www.phrack.org/papers/attacking_javascript_engines.html
How to Make a Computer Operating System in C/C++ from scratch
https://samypesse.gitbooks.io/how-to-create-an-operating-system/content/
A walk along the PEB: Stepping through PE structures to find function addresses
http://ropgadget.com/posts/pebwalk.html
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课
收藏
・
4
免费
・
0
支持
分享
分享到微信
分享到QQ
分享到微博
赞赏记录
参与人
雪币
留言
时间
查看更多
赞赏
×
1 雪花
5 雪花
10 雪花
20 雪花
50 雪花
80 雪花
100 雪花
150 雪花
200 雪花
支付方式:
微信支付
赞赏留言:
快捷留言
感谢分享~
精品文章~
原创内容~
精彩转帖~
助人为乐~
感谢分享~
最新回复
(
2
)
QuebecJY
雪 币:
281
活跃值:
(11)
能力值:
( LV2,RANK:10 )
在线值:
发帖
3
回帖
86
粉丝
0
关注
私信
QuebecJY
2
楼
谢谢分享。。。。
2016-11-6 08:57
0
BlackTrace
雪 币:
1305
活跃值:
(228)
能力值:
( LV5,RANK:75 )
在线值:
发帖
4
回帖
160
粉丝
0
关注
私信
BlackTrace
3
楼
多谢分享
2016-11-6 09:59
0
游客
登录
|
注册
方可回帖
回帖
表情
雪币赚取及消费
高级回复
返回
BDomne
5
53
发帖
157
回帖
270
RANK
关注
私信
他的文章
[推荐]CTF『Pwn』版块精选帖分类索引
54994
[原创]20周年征文 | 那些年,我们一起看雪
5765
[原创]小窥安全研究方向在今后的一些发展趋势
6938
关于我们
联系我们
企业服务
看雪公众号
专注于PC、移动、智能设备安全研究及逆向工程的开发者社区
看原图
赞赏
×
雪币:
+
留言:
快捷留言
为你点赞!
返回
顶部