Description
github.com

Bareflank Hypervisor - 一款轻量级的 Hypervisor SDK,用于快速在 64 位机器上快速构建 hypervisor Jett • 10 hours ago

1   

[PDF] https://i.blackhat.com/Asia-22/Thursday-Materials/AS-22-Qiuhao-Recursive-MMIO-final.pdf
i.blackhat.com

Hunting and Exploiting Recursive MMIO Flaws in QEMU/KVM,来自 BlackHat Asia 会议 Jett • 10 hours ago

0   

Writing a simple rootkit for linux
0x00sec.org

如何写一个简单的 Linux Rootkit Jett • 10 hours ago

0   

emba, an analyzer for Linux-based firmware of embedded devices
github.com • Tools

emba - 嵌入式设备固件分析工具 EMBA 更新 v1.0 版本 Jett • 10 hours ago

0   

Hacking Swagger-UI - from XSS to account takeovers
www.vidocsecurity.com • Web

Hacking Swagger-UI - from XSS to account takeovers Jett • 10 hours ago

0   

Stealing Google Drive OAuth tokens from Dropbox
blog.stazot.com

Stealing Google Drive OAuth tokens from Dropbox Jett • 10 hours ago

0   

Interactive decompilation with rellic-xref
Trail of Bits Blog

rellic-xref - Rellic 是个将 LLVM Module 反编译为 C 代码的工具,rellic-xref 为 Rellic 提供了交互式使用的能力 Jett • 10 hours ago

0   

HOW DO YOU ACTUALLY FIND BUGS?(译文)
跳跳糖 - 安全与分享社区

HOW DO YOU ACTUALLY FIND BUGS?(译文) lanying37 • 23 hours ago

0   

Rari Capital 攻击事件的分析和复现
paper - Last paper

Rari Capital 攻击事件的分析和复现 lanying37 • 23 hours ago

0   

UpdateAgent malware adapts again
www.jamf.com • Malware

macOS 平台 UpdateAgent 恶意样本的分析 Jett • 1 day ago

0   

Post mortem on this weekend’s DNS event
spiritswap.medium.com

SpiritSwap 发布公告,有攻击者社工 GoDaddy 员工修改域名配置导致 SpiritSwap DNS 被劫持 Jett • 1 day ago

0   

SMM Callouts in HP Products
nstarke.github.io

HP ProBook G4 650 笔记本固件被发现 SMM Callout 提权漏洞 Jett • 1 day ago

0   

[PDF] https://i.blackhat.com/Asia-22/Friday-Materials/AS-22-Delarea-Backdooring-of-real-time-automotive-os-devices.pdf
i.blackhat.com

Backdooring of Real Time Automotive OS Devices,来自 BlackHat Asia 会议 Jett • 1 day ago

0   

About the security content of iOS 15.5 and iPadOS 15.5 - Apple 支持 (中国)
support.apple.com

Apple 发布 iOS 15.5 和 macOS 12.4 安全更新 Jett • 1 day ago

0   

Technical Advisory – Tesla BLE Phone-as-a-Key Passive Entry Vulnerable to Relay Attacks
research.nccgroup.com

利用 BLE Reply 攻击 Bypass 手机解锁特斯拉汽车的距离限制 Jett • 1 day ago

0   

From Project File to Code Execution: Exploiting Vulnerabilities in XINJE PLC Program Tool
claroty.com • Tools

信捷 PLC 编程工具被发现工程文件解析导致的代码执行漏洞 Jett • 1 day ago

0   

idaholab/Malcolm
github.com • Tools

Malcolm - 网络流量分析工具 Jett • 1 day ago

0   

Tetragon - eBPF-based Security Observability & Runtime Enforcement
isovalent.com

Tetragon - 基于内核层 eBPF 实现的运行时进程防护工具 Jett • 1 day ago

0   

[PDF] https://i.blackhat.com/Asia-22/Friday-Materials/AS-22-He-The-Hidden-RCE-Surfaces-That-Control-The-Droids.pdf
i.blackhat.com

Android 的 RCE 攻击面以及动态二进制 Fuzzing,来自 BlackHat Asia 会议 Jett • 2 days ago

1   

Loading