首页
社区
课程
招聘
[分享]国外最新安全推文整理(第10期)
发表于: 2017-5-1 15:26 3413

[分享]国外最新安全推文整理(第10期)

2017-5-1 15:26
3413

有些可能需要VPN访问,安全性方面自己多留意:P


Universal PatchGuard and Driver Signature Enforcement Disable

https://github.com/hfiref0x/UPGDSED


Assembly syntax highlighting, code completion and folding for Visual Studio

https://github.com/HJLebbink/asm-dude


Start with LLVM for security research

https://github.com/roachspray/opcde2017


AFL/QEMU fuzzing with full-system emulation

https://github.com/nccgroup/TriforceAFL


Dynamic binary analysis tool

https://github.com/trailofbits/manticore


Decompiles Exe created by Py2Exe using uncompyle6

https://github.com/endgameinc/Py2ExeDecompiler


Wordlists sorted by probability originally created for password generation and testing

https://github.com/berzerk0/Probable-Wordlists


Source code and binaries of FlexiSpy from the Flexidie dump

https://github.com/Te-k/flexidie


A collection of various awesome lists for hackers, pentesters and security researchers

https://github.com/Hack-with-Github/Awesome-Hacking


CanSecWest 2017 Slides

https://cansecwest.com/csw17archive.html


HITB2017AMS Slides

http://conference.hitb.org/hitbsecconf2017ams/materials/


BlackHat USA 2017 Briefings

https://www.blackhat.com/us-17/briefings.html


Slides about Component Object Model (COM) 

http://infiltratecon.com/archives/COM%20in%2060%20Seconds%2016-9.pdf

https://github.com/comaeio/OPCDE/blob/master/Windows%20Operating%20System%20Archaeology%20-%20Matt%20Nelson/Windows%20Operating%20System%20Archaeology.pdf


Spotless Sandboxes: Evading Malware Analysis Systems using Wear-and-Tear Artifacts

http://securitee.org/files/wearntear-oakland2017.pdf


A Tough call: Mitigating Advanced Code-Reuse Attacks At The Binary Level

http://syssec.rub.de/media/emma/veroeffentlichungen/2016/05/01/Tough-call-Oakland16.pdf


DeepCloak: Masking Deep Neural Network Models for Robustness Against Adversarial Samples

https://arxiv.org/pdf/1702.06763.pdf


Machine Learning Can Be More Secure! A Case Study on Android Malware Detection

https://arxiv.org/pdf/1704.08996.pdf


EviPlant: An efficient digital forensic challenge creation, manipulation and distribution solution

https://arxiv.org/ftp/arxiv/papers/1704/1704.08990.pdf


Intel ME: The Way of Static Analysis

http://blog.ptsecurity.com/2017/04/intel-me-way-of-static-analysis.html


ARM Releases Machine Readable Architecture Specification

https://alastairreid.github.io/alastairreid.github.io/ARM-v8a-xml-release/


Notes on Windows Uniscribe Fuzzing

https://googleprojectzero.blogspot.com/2017/04/notes-on-windows-uniscribe-fuzzing.html


KFUZZ, a fuzzer story

https://repret.wordpress.com/2017/04/27/kfuzz-a-fuzzer-story/


Modernizing the DOM tree in Microsoft Edge

https://blogs.windows.com/msedgedev/2017/04/19/modernizing-dom-tree-microsoft-edge/


Chrome Oilpan - Meta Data, Freelists and more

http://struct.github.io/oilpan_metadata.html


Using Debugging Tools to Find Token and Session Leaks

https://blogs.technet.microsoft.com/askds/2017/04/05/using-debugging-tools-to-find-token-and-session-leaks/


Disarming Control Flow Guard Using Advanced Code Reuse Attacks

https://www.endgame.com/blog/disarming-control-flow-guard-using-advanced-code-reuse-attacks


VM escape - QEMU Case Study

http://www.phrack.org/papers/vm-escape-qemu-case-study.html


ntoskrnl v10.0.15063_nt!_SEP_TOKEN_PRIVILEGES – Single Write EoP Protect

http://www.anti-reversing.com/ntoskrnl-v10-0563_nt_sep_token_privileges-single-write-eop-protect/


Stuxnet drivers: detailed analysis

http://artemonsecurity.blogspot.com/2017/04/stuxnet-drivers-detailed-analysis.html


Elusive Moker Trojan is back

https://blog.malwarebytes.com/threat-analysis/2017/04/elusive-moker-trojan/


Malware Analysis Cheats And Tools list

https://gbhackers.com/malware-analysis-cheat-sheet-and-tools-list/


ApiScout: Painless Windows API information recovery

http://byte-atlas.blogspot.com/2017/04/apiscout.html


Writing Optimized Windows Shellcode

https://dimitrifourny.github.io/2017/04/28/optimized-windows-shellcode/


Solution for the OPCDE crackme

https://opctf.opcde.com/opcde_sol_halsten.pdf


Writing a libemu/Unicorn Compatability Layer

https://www.fireeye.com/blog/threat-research/2017/04/libemu-unicorn-compatability-layer.html


Resources To Create Programming Languages

https://tomassetti.me/resources-create-programming-languages/


Full decrypted dump of all releases and files by Shadow Brokers, including screenshots & configs

https://mega.nz/#!RRl3TYAQ!b0Kr-wfL7rctVGn75XafYUJM8xBcCDcClI8iTohVDX0


Android Applications Reversing 101

https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/


Reverse engineering the APFS filesystem format

https://blog.cugu.eu/post/apfs/


Debugging macOS Kernel using VirtualBox

https://klue.github.io/blog/2017/04/macos_kernel_debugging_vbox/


Exception-oriented exploitation on iOS

https://googleprojectzero.blogspot.com/2017/04/exception-oriented-exploitation-on-ios.html



[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)

收藏
免费 0
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回
//