GitHub - netzob/netzob: Netzob: Protocol Reverse Engineering, Modeling and Fuzzing
github.com

Netzob:用于协议逆向工程,建模与模糊测试项目脚本工具。 lanying37 • 16 minutes ago

0   

Fashion retailer BrandBQ exposes 1 TB of customers, contractors data
www.hackread.com

波兰电商 BrandBQ 因 Elasticsearch 服务器泄露 1TB 用户数据 Jett • 11 hours ago

0   

GHSL-2020-113: Command injection vulnerability in limdu - CVE-2020-4066
securitylab.github.com

GitHub labs 对开源库 limdu 命令注入漏洞的分析(CVE-2020-4066) Jett • 11 hours ago

0   

EkoParty - Advanced Fuzzing Workshop
github.com

EkoParty - Advanced Fuzzing Workshop Jett • 11 hours ago

0   

DPDK security advisory for multiple vhost crypto issues
Open Source Security

DPDK 开发套件修复了多个漏洞,包括一个 vhost crypto 问题导致 Host 虚拟机逃逸的漏洞 Jett • 11 hours ago

0   

emba, an analyzer for Linux-based firmware of embedded devices
github.com • Tools IoT

emba - 用于分析基于 Linux 的嵌入设备的固件的工具 Jett • 11 hours ago

0   

Local Data Encryption in Chromium
textslashplain.com • Browser

Chromium 浏览器的本地数据加密机制分析 Jett • 11 hours ago

0   

某游戏外挂团队针对大量企业员工发起网络攻击活动
ti.dbappsecurity.com.cn

某游戏外挂团队针对大量企业员工发起网络攻击活动 Jett • 11 hours ago

0   

ductf2020 pwn-or-web v8 challenge
seb-sec.github.io • CTF

ductf2020 pwn-or-web v8 challenge writeup Jett • 11 hours ago

1   

Release v3.0.2.0 · lgandx/Responder
github.com • Tools

LLMNR/NBT-NS/mDNS 协议攻击工具 Responder 更新 3.0.2.0 版本 Jett • 11 hours ago

0   

Taking down the SSO, Account Takeover in the Websites of Kolesa due to Insecure JSONP Call | by Yasho | InfoSec Write-ups | Sep, 2020 | Medium
medium.com • Web

利用不安全的 JSONP 调用接管 Kolesa 站点的任意账户 Jett • 11 hours ago

0   

VirusTotal APK Malware Detection Data - Week 39: 20200921-20200927
Trustlook blog

VirusTotal APK恶意软件检测数据-第39周 Schwarrzz • 13 hours ago

0   

Cobalt Strike 绕过流量审计
paper - Last paper

Cobalt Strike 绕过流量审计. lanying37 • 1 day ago

0   

Kernel exploitation: weaponizing CVE-2020-17382 MSI Ambient Link driver
www.matteomalvica.com

Windows 系统第三方 MSI Ambient Link 驱动漏洞的分析及利用 Jett • 1 day ago

0   

GitHub - kov4l3nko/MEDUZA: A more or less universal SSL unpinning tool for iOS
github.com

MEDUZA - 基于 Frida,针对越狱 iOS 系统编写的 SSL unpinning 工具 Jett • 1 day ago

1   

Demystifying the “SVCHOST.EXE” Process and Its Command Line Options | by Nasreddine Bencherchali | Sep, 2020 | Medium
medium.com • Windows

svchost.exe 进程及其支持的命令行参数分析 Jett • 1 day ago

0   

(C) 2008 Nicolas Pouvesle [email protected] / Tenable Network Security
github.com

用于从 IDL 接口文件中提取 RPC 接口定义的 IDA 插件 Jett • 1 day ago

0   

Waiting for the redirectiron...
objective-see.com • macOS Malware

macOS 平台 FinSpy 恶意软件样本的分析 Jett • 1 day ago

0   

Undocumented Fastboot Oem Commands
carlo.marag.no

Android 10 及更新版本的 Fastboot OEM 命令枚举 Jett • 1 day ago

0   

1-click meterpreter exploit chain with BeEF and AV/AMSI bypass
medium.com • Tools

1-click meterpreter exploit chain with BeEF and AV/AMSI bypass Jett • 1 day ago

0   

Loading