首页
社区
课程
招聘
[分享]国外最新安全推文整理(第18期)
发表于: 2018-1-7 18:52 2897

[分享]国外最新安全推文整理(第18期)

2018-1-7 18:52
2897
有些可能需要VPN访问,安全性方面自己多留意。

Kernel privilege escalation enumeration and exploitation framework

Hypervisor-based debugger

EDB is a cross platform x86/x86-64 debugger

A retargetable machine-code decompiler based on LLVM

A Dynamic Binary Instrumentation framework based on LLVM

Simple SMT solver

PoC for breaking hypervisor ASLR using branch target buffer collisions

Monero (XMR) CPU miner

Some system tools (PeRebuilder, MemoryBootkit, AppContainers)

PacSec 2017 Slides

BlueHat v17 Slides

ZeroNights 2017 Slides

34c3 Schedule

BlackHoodie 17 Slides

OffensiveCon 2018 Agenda

The Bad Neighbor, Out-of-Order Execution and Its Applications, Slides

The Battle For Protected Memory, Slides

Hex-Rays Plugin Contest 2017 Result

A new unpatched Windows 7-10 kernel pool pointer leak

VMware's Launch escape SYSTEM

Making something out of Zeros: Alternative primitive for Windows Kernel Exploitation

Exploiting Windows 10 in a Local Network with WPAD/PAC and JScript

Exploiting Word: CVE-2017-11826

Chakrazy - exploiting type confusion bug in ChakraCore engine

Escaping Docker container using waitid() - CVE-2017-5123

A Peculiar Case of Orcus RAT Targeting Bitcoin Investors

Thoughts about "Process Doppelganging" and proof-of-concepts

Dissecting LLVM Obfuscator Part 1

Weird machines, exploitability, and provable unexploitability

Network Cheat Sheets

Inside Intel Management Engine, Slides

Where there's a JTAG, there's a way: Obtaining full system access via USB


[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!

收藏
免费 0
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回
//