Escaping from a truly air gapped network via Apple AWDL
medium.com

利用 Apple AWDL 协议从物理隔离的环境中向外渗透数据 Jett • 6 hours ago

0   

Account Takeover (ATO) Checklist
github.com

Account Takeover (ATO) Checklist Jett • 6 hours ago

0   

Bypassing Authentication on Arcadyan Routers with CVE-2021–20090 and rooting some Buffalo
medium.com

利用 CVE-2021-20090 漏洞绕过 Arcadyan 路由器的认证 Jett • 6 hours ago

0   

Variant analysis of the ‘Sequoia’ bug
pwning.systems

基于 CodeQL 的 ‘Sequoia’ bug(CVE-2021-33909)变种分析 Jett • 6 hours ago

0   

Developing an exploit for the Jira Data Center Ehcache RCE (CVE-2020-36239)
dozer.nz

Jira Data Center Ehcache RCE (CVE-2020-36239) Exploit 构造 Jett • 6 hours ago

0   

Trash Panda as a Service: Raccoon Stealer steals cookies, cryptocoins, and more
news.sophos.com

Trash Panda 恶意软件最近开始窃取加密货币钱包信息 Jett • 6 hours ago

0   

APT31 new dropper. Target destinations: Mongolia, Russia, the U.S., and elsewhere
Positive Technologies - learn and secure

Positive 安全团队对 APT31 的新 Dropper 的分析 Jett • 6 hours ago

0   

Playing with PuTTY
/var/log/messages

F-Secure Labs 研究如何 Backdooring PuTTY 窃取用户的 SSH 认证凭据 Jett • 6 hours ago

0   

Building a new snapshot fuzzer & fuzzing IDA
Diary of a reverse-engineer • Fuzzing Tools

Building a new snapshot fuzzer & fuzzing IDA Jett • 6 hours ago

0   

Kunyu - more efficient corporate asset collection tool
www.youtube.com • Tools

Kunyu(坤舆) - 更高效的企业资产收集工具演示视频。 lanying37 • 19 hours ago

0   

Rotten Apples: MacOS Codesigning Translocation Vulnerability – OccamSec
occamsec.com • macOS

Rotten Apples: MacOS Codesigning Translocation Vulnerability Jett • 1 day ago

0   

Table of Contents
github.com • Windows

Windows Non-Paged-Pool 溢出漏洞的利用(CVE-2020-17087) Jett • 1 day ago

0   

Detecting Jackson deserialization vulnerabilities with CodeQL
blog.gypsyengineer.com

利用 CodeQL 检测 Jackson 中的反序列化漏洞 Jett • 1 day ago

0   

The Linux Kernel Module Programming Guide
sysprog21.github.io

Linux 内核模块编程指南 Jett • 1 day ago

0   

Universal Privilege Escalation and Persistence – Printer
pentestlab.blog

Universal Privilege Escalation and Persistence – Printer Jett • 1 day ago

0   

The path to code execution in the era of EDR, Next-Gen AVs, and AMSI
klezvirus.github.io

利用各类技术绕过 AV-EDR 检测的框架 Jett • 1 day ago

1   

If someone wants to learn MacOS IR/forensics what’s the best resource for that?
gist.github.com

macOS 应急响应与取证分析相关的部分资料 Jett • 1 day ago

0   

Potential remote code execution in PyPI
blog.ryotak.me

PyPI 仓库 GitHub Actions 配置不当导致的 pypi.org 任意代码执行漏洞 Jett • 1 day ago

0   

Reprogramming "old" Sennheiser Microphone - Part 4 - PLL
vgnotepad.blogspot.com

重新编译旧的森海塞尔麦克风 -第4部分-PLL(锁相环) lanying37 • 1 day ago

0   

Breaking Protocol (Buffers): Reverse Engineering gRPC Binaries
labs.ioactive.com • Reverse Engineering

破解协议(缓冲区):逆向工程分析 gRPC 二进制文件。 lanying37 • 1 day ago

1   

Loading