首页
课程
问答
CTF
社区
招聘
峰会
发现
排行榜
知识库
工具下载
看雪20年
看雪商城
证书查询
登录
注册
首页
社区
课程
招聘
发现
问答
CTF
排行榜
知识库
工具下载
峰会
看雪商城
证书查询
社区
外文翻译
发新帖
8
0
[分享]国外最新安全推文整理(第6期)
发表于: 2017-1-28 11:05
5822
[分享]国外最新安全推文整理(第6期)
BDomne
5
2017-1-28 11:05
5822
有些可能需要VPN访问,安全性方面自己多留意:D
PowerShell Obfuscator
https://github.com/danielbohannon/Invoke-Obfuscation
Fancy Bear Source Code
https://github.com/rickey-g/fancybear
List of awesome reverse engineering resources
https://github.com/wtsxDev/reverse-engineering
List of Windows Exploitation resources
https://github.com/enddo/awesome-windows-exploitation
List of really interesting open source projects
https://github.com/lk-geimfari/awesomo
ELF, Mach-O and PE (SVG and PDF available)
https://github.com/corkami/pics
No-meaning Assembly Omitter for IDA pro
https://github.com/tkmru/nao
WOW64Ext is a helper library for x86 programs that runs under WOW64 layer on x64 versions
https://github.com/rwfpl/rewolf-wow64ext
DRAKVUF is a virtualization based agentless black-box binary analysis system
https://github.com/tklengyel/drakvuf
LibVMI is a virtual machine introspection library
https://github.com/libvmi/libvmi
Windows support for Intel Processor Trace
https://github.com/talos-vulndev/WindowsIntelPT
VUzzer: Application-aware Evolutionary Fuzzing
http://www.cs.vu.nl/~giuffrida/papers/vuzzer-ndss-2017.pdf
What Else is Revealed by Order-Revealing Encryption
https://eprint.iacr.org/2016/786.pdf
The JTAG Interface: An Attacker's Perspective
https://optivstorage.blob.core.windows.net/web/file/55e86eae3f04450d9bafcbb3a94559ca/JTAG.Whitepaper.pdf
Intel debugger interface open to hacking via USB
http://blog.ptsecurity.com/2017/01/intel-debugger-interface-open-to.html
Attacking UEFI Runtime Services and Linux
http://blog.frizk.net/2017/01/attacking-uefi-and-linux.html
Set up a Global Descriptor Table in Unicorn-Engine
https://scoding.de/setting-global-descriptor-table-unicorn
Exploiting services and readers that support the ePub book format
https://s1gnalcha0s.github.io/epub/2017/01/25/This-book-reads-you.html
PDF - How to steal PDFs by injecting JavaScript
http://insert-script.blogspot.com/2016/10/pdf-how-to-steal-pdfs-by-injecting.html
Reversing C++ Virtual Functions: Part 2
https://alschwalm.com/blog/static/2017/01/24/reversing-c-virtual-functions-part-2-2/
Part 17: Kernel Exploitation -> GDI Bitmap Abuse (Win7-10 32/64bit)
https://www.fuzzysecurity.com/tutorials/expDev/21.html
Bypassing Control Flow Guard in Windows 10 - Part II
https://improsec.com/blog//bypassing-control-flow-guard-on-windows-10-part-ii
Manual Control Flow Guard in C
http://nullprogram.com/blog/2017/01/21/
5-Level Paging and 5-Level EPT
https://software.intel.com/sites/default/files/managed/2b/80/5-level_paging_white_paper.pdf
Harmful prefetch on Intel
http://blog.ioactive.com/2017/01/harmful-prefetch-on-intel.html
Virtual Memory, Page Tables, and One Bit - CVE-2016-7255
http://ricklarabee.blogspot.com/2017/01/virtual-memory-page-tables-and-one-bit.html
Hardening Windows 10 with zero-day exploit mitigations
https://blogs.technet.microsoft.com/mmpc/2017/01/13/hardening-windows-10-with-zero-day-exploit-mitigations/
Abusing GDI for ring0 exploit primitives
https://www.coresecurity.com/blog/abusing-gdi-for-ring0-exploit-primitives
Windows 10 Anniversary Update "GDI kernel memory addresses disclosure" is back
https://www.coresecurity.com/system/files/publications/2016/10/Abusing-GDI-Reloaded-ekoparty-2016_0.pdf
The Unpatched LSASS Remote Denial of Service (MS16-137)
https://www.coresecurity.com/blog/unpatched-lsass-remote-denial-service-ms16-137
Effective Patch Analysis for Microsoft Updates
http://powerofcommunity.net/poc2016/brian.pdf
WinDbg commands
http://expdev-kiuhnm.rhcloud.com/2015/05/17/windbg/
On the Forensic Trail - Guid Partition Table (GPT)
http://www.invoke-ir.com/2015/06/ontheforensictrail-part3.html
Anti-Debug Protection Techniques: Implementation and Neutralization
https://www.codeproject.com/articles/1090943/anti-debug-protection-techniques-implementation-an
Art of Anti Detection 2 – PE Backdoor Manufacturing
https://pentest.blog/art-of-anti-detection-2-pe-backdoor-manufacturing/
Wingbird rootkit analysis
http://artemonsecurity.blogspot.com/2017/01/wingbird-rootkit-analysis.html
Finfisher rootkit analysis
http://artemonsecurity.blogspot.com/2017/01/finfisher-rootkit-analysis.html
Remote Exploit, Shellcode without Sockets
https://0x00sec.org/t/remote-exploit-shellcode-without-sockets/1440
Practical Android Debugging Via KGDB
http://blog.trendmicro.com/trendlabs-security-intelligence/practical-android-debugging-via-kgdb/
Solving an Android Crackme with a Little Symbolic Execution
http://www.vantagepoint.sg/blog/81-solving-an-android-crackme-with-a-little-symbolic-execution
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课
收藏
・
8
免费
・
0
支持
分享
分享到微信
分享到QQ
分享到微博
赞赏记录
参与人
雪币
留言
时间
查看更多
赞赏
×
1 雪花
5 雪花
10 雪花
20 雪花
50 雪花
80 雪花
100 雪花
150 雪花
200 雪花
支付方式:
微信支付
赞赏留言:
快捷留言
感谢分享~
精品文章~
原创内容~
精彩转帖~
助人为乐~
感谢分享~
最新回复
(
5
)
anqi
雪 币:
33
活跃值:
(14)
能力值:
( LV2,RANK:10 )
在线值:
发帖
1
回帖
15
粉丝
0
关注
私信
anqi
2
楼
pretty helpful. could u share the original RSS link?
感谢分享, 请问可不可以分享下RSS的链接?打算长期订阅关注下
2017-1-28 12:53
0
anqi
雪 币:
33
活跃值:
(14)
能力值:
( LV2,RANK:10 )
在线值:
发帖
1
回帖
15
粉丝
0
关注
私信
anqi
3
楼
btw, Happy Chinese new year!! 新年快乐
2017-1-28 12:56
0
BDomne
雪 币:
4230
活跃值:
(1435)
能力值:
(RANK:270 )
在线值:
发帖
53
回帖
157
粉丝
88
关注
私信
BDomne
5
4
楼
内容整理自关注的twitter,觉得有用就记录下来了。
2017-1-28 13:52
0
anqi
雪 币:
33
活跃值:
(14)
能力值:
( LV2,RANK:10 )
在线值:
发帖
1
回帖
15
粉丝
0
关注
私信
anqi
5
楼
有心人啊,赞一个。
如果有RSS就更好了。
2017-1-28 14:49
0
yangya
雪 币:
58
活跃值:
(1130)
能力值:
( LV2,RANK:10 )
在线值:
发帖
5
回帖
318
粉丝
1
关注
私信
yangya
6
楼
BDomne
内容整理自关注的twitter,觉得有用就记录下来了。
不错
2018-1-15 21:25
0
游客
登录
|
注册
方可回帖
回帖
表情
雪币赚取及消费
高级回复
返回
BDomne
5
53
发帖
157
回帖
270
RANK
关注
私信
他的文章
[推荐]CTF『Pwn』版块精选帖分类索引
55080
[原创]20周年征文 | 那些年,我们一起看雪
5775
[原创]小窥安全研究方向在今后的一些发展趋势
6942
关于我们
联系我们
企业服务
看雪公众号
专注于PC、移动、智能设备安全研究及逆向工程的开发者社区
看原图
赞赏
×
雪币:
+
留言:
快捷留言
为你点赞!
返回
顶部