-
-
[分享]国外最新安全推文整理(第10期)
-
发表于: 2017-5-1 15:26 3413
-
有些可能需要VPN访问,安全性方面自己多留意:P
Universal PatchGuard and Driver Signature Enforcement Disable
https://github.com/hfiref0x/UPGDSED
Assembly syntax highlighting, code completion and folding for Visual Studio
https://github.com/HJLebbink/asm-dude
Start with LLVM for security research
https://github.com/roachspray/opcde2017
AFL/QEMU fuzzing with full-system emulation
https://github.com/nccgroup/TriforceAFL
Dynamic binary analysis tool
https://github.com/trailofbits/manticore
Decompiles Exe created by Py2Exe using uncompyle6
https://github.com/endgameinc/Py2ExeDecompiler
Wordlists sorted by probability originally created for password generation and testing
https://github.com/berzerk0/Probable-Wordlists
Source code and binaries of FlexiSpy from the Flexidie dump
https://github.com/Te-k/flexidie
A collection of various awesome lists for hackers, pentesters and security researchers
https://github.com/Hack-with-Github/Awesome-Hacking
CanSecWest 2017 Slides
https://cansecwest.com/csw17archive.html
HITB2017AMS Slides
http://conference.hitb.org/hitbsecconf2017ams/materials/
BlackHat USA 2017 Briefings
https://www.blackhat.com/us-17/briefings.html
Slides about Component Object Model (COM)
http://infiltratecon.com/archives/COM%20in%2060%20Seconds%2016-9.pdf
Spotless Sandboxes: Evading Malware Analysis Systems using Wear-and-Tear Artifacts
http://securitee.org/files/wearntear-oakland2017.pdf
A Tough call: Mitigating Advanced Code-Reuse Attacks At The Binary Level
http://syssec.rub.de/media/emma/veroeffentlichungen/2016/05/01/Tough-call-Oakland16.pdf
DeepCloak: Masking Deep Neural Network Models for Robustness Against Adversarial Samples
https://arxiv.org/pdf/1702.06763.pdf
Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
https://arxiv.org/pdf/1704.08996.pdf
EviPlant: An efficient digital forensic challenge creation, manipulation and distribution solution
https://arxiv.org/ftp/arxiv/papers/1704/1704.08990.pdf
Intel ME: The Way of Static Analysis
http://blog.ptsecurity.com/2017/04/intel-me-way-of-static-analysis.html
ARM Releases Machine Readable Architecture Specification
https://alastairreid.github.io/alastairreid.github.io/ARM-v8a-xml-release/
Notes on Windows Uniscribe Fuzzing
https://googleprojectzero.blogspot.com/2017/04/notes-on-windows-uniscribe-fuzzing.html
KFUZZ, a fuzzer story
https://repret.wordpress.com/2017/04/27/kfuzz-a-fuzzer-story/
Modernizing the DOM tree in Microsoft Edge
https://blogs.windows.com/msedgedev/2017/04/19/modernizing-dom-tree-microsoft-edge/
Chrome Oilpan - Meta Data, Freelists and more
http://struct.github.io/oilpan_metadata.html
Using Debugging Tools to Find Token and Session Leaks
Disarming Control Flow Guard Using Advanced Code Reuse Attacks
https://www.endgame.com/blog/disarming-control-flow-guard-using-advanced-code-reuse-attacks
VM escape - QEMU Case Study
http://www.phrack.org/papers/vm-escape-qemu-case-study.html
ntoskrnl v10.0.15063_nt!_SEP_TOKEN_PRIVILEGES – Single Write EoP Protect
http://www.anti-reversing.com/ntoskrnl-v10-0563_nt_sep_token_privileges-single-write-eop-protect/
Stuxnet drivers: detailed analysis
http://artemonsecurity.blogspot.com/2017/04/stuxnet-drivers-detailed-analysis.html
Elusive Moker Trojan is back
https://blog.malwarebytes.com/threat-analysis/2017/04/elusive-moker-trojan/
Malware Analysis Cheats And Tools list
https://gbhackers.com/malware-analysis-cheat-sheet-and-tools-list/
ApiScout: Painless Windows API information recovery
http://byte-atlas.blogspot.com/2017/04/apiscout.html
Writing Optimized Windows Shellcode
https://dimitrifourny.github.io/2017/04/28/optimized-windows-shellcode/
Solution for the OPCDE crackme
https://opctf.opcde.com/opcde_sol_halsten.pdf
Writing a libemu/Unicorn Compatability Layer
https://www.fireeye.com/blog/threat-research/2017/04/libemu-unicorn-compatability-layer.html
Resources To Create Programming Languages
https://tomassetti.me/resources-create-programming-languages/
Full decrypted dump of all releases and files by Shadow Brokers, including screenshots & configs
https://mega.nz/#!RRl3TYAQ!b0Kr-wfL7rctVGn75XafYUJM8xBcCDcClI8iTohVDX0
Android Applications Reversing 101
https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/
Reverse engineering the APFS filesystem format
https://blog.cugu.eu/post/apfs/
Debugging macOS Kernel using VirtualBox
https://klue.github.io/blog/2017/04/macos_kernel_debugging_vbox/
Exception-oriented exploitation on iOS
https://googleprojectzero.blogspot.com/2017/04/exception-oriented-exploitation-on-ios.html
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)
赞赏
- [推荐]CTF『Pwn』版块精选帖分类索引 55086
- [原创]20周年征文 | 那些年,我们一起看雪 5775
- [原创]小窥安全研究方向在今后的一些发展趋势 6942