-
-
[分享]国外最新安全推文整理(第18期)
-
发表于: 2018-1-7 18:52 2897
-
有些可能需要VPN访问,安全性方面自己多留意。
Kernel privilege escalation enumeration and exploitation framework
Hypervisor-based debugger
EDB is a cross platform x86/x86-64 debugger
A retargetable machine-code decompiler based on LLVM
A Dynamic Binary Instrumentation framework based on LLVM
Simple SMT solver
PoC for breaking hypervisor ASLR using branch target buffer collisions
Monero (XMR) CPU miner
Some system tools (PeRebuilder, MemoryBootkit, AppContainers)
PacSec 2017 Slides
BlueHat v17 Slides
ZeroNights 2017 Slides
34c3 Schedule
BlackHoodie 17 Slides
OffensiveCon 2018 Agenda
The Bad Neighbor, Out-of-Order Execution and Its Applications, Slides
The Battle For Protected Memory, Slides
Hex-Rays Plugin Contest 2017 Result
A new unpatched Windows 7-10 kernel pool pointer leak
VMware's Launch escape SYSTEM
Making something out of Zeros: Alternative primitive for Windows Kernel Exploitation
Exploiting Windows 10 in a Local Network with WPAD/PAC and JScript
Exploiting Word: CVE-2017-11826
Chakrazy - exploiting type confusion bug in ChakraCore engine
Escaping Docker container using waitid() - CVE-2017-5123
A Peculiar Case of Orcus RAT Targeting Bitcoin Investors
Thoughts about "Process Doppelganging" and proof-of-concepts
Dissecting LLVM Obfuscator Part 1
Weird machines, exploitability, and provable unexploitability
Network Cheat Sheets
Inside Intel Management Engine, Slides
Where there's a JTAG, there's a way: Obtaining full system access via USB
[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!
赞赏
他的文章
- [推荐]CTF『Pwn』版块精选帖分类索引 55080
- [原创]20周年征文 | 那些年,我们一起看雪 5775
- [原创]小窥安全研究方向在今后的一些发展趋势 6942
看原图
赞赏
雪币:
留言: