ClassPathXmlApplicationContext
github.com

CVE-2020–14882 Weblogic Unauthorized bypass RCE Jett • 1 day ago

0   

Osmocom Cellular Network Infrastructure
github.com

3G 版本的 Osmocom 蜂窝网络实现 Jett • 1 day ago

0   

GitHub - talos-systems/talos: Talos is a modern OS for Kubernetes.
github.com

Talos - 为 Kubernetes 环境准备的操作系统 Jett • 1 day ago

0   

Attacks exploiting Netlogon vulnerability (CVE-2020-1472)
Microsoft Security Response Center

前段时间爆出的 Netlogon 漏洞 (CVE-2020-1472)出现野外攻击 Jett • 1 day ago

0   

Remote Desktop Services Shadowing – Beyond the Shadowed Session – PT SWARM
swarm.ptsecurity.com

Remote Desktop Services Shadowing – Beyond the Shadowed Session Jett • 1 day ago

0   

Not-So-Random: Using LD_PRELOAD to Hijack the rand() Function - Security Boulevard
securityboulevard.com

利用 LD_PRELOAD 环境变量的方式劫持 rand 随机数函数 Jett • 1 day ago

0   

NetblockTool: The Easy Way to Find IP Addresses Owned by a Company
NetSPI Blog

NetblockTool - 用于自动化分析归属于某公司及子公司的 IP 列表 Jett • 1 day ago

0   

Electron: Abusing the lack of context isolation - CureCon(en)
speakerdeck.com

Electron: Abusing the lack of context isolation Jett • 2 days ago

0   

remote use-after-free in icmp6
lists.freebsd.org

FreeBSD 修复 icmp6 的一个远程 UAF 漏洞 Jett • 2 days ago

0   

Releases
github.com

辅助 Ghidra 分析二进制文件的脚本 Jett • 2 days ago

0   

README.md
github.com

ThreatPursuit-VM - FireEye 开源的用于威胁情报分析和收集的虚拟机 Jett • 2 days ago

0   

DDoS attacks in Q3 2020
Securelist

由卡巴斯基官方发布2020年第三季度的DDoS攻击分析报告。 lanying37 • 2 days ago

0   

疑似中国台湾方向相关组织近期攻击活动分析
ti.dbappsecurity.com.cn

疑似中国台湾方向相关组织近期攻击活动分析 Jett • 3 days ago

0   

A story of three CVE's in Ubuntu Desktop
www.eyecontrol.nl

Ubuntu Desktop D-Bus 协议漏洞分析 Jett • 3 days ago

0   

Exploiting a textbook use-after-free in Chrome - GitHub Security Lab
securitylab.github.com

Chrome 浏览器 textbook UAF 漏洞的利用方法分析 Jett • 3 days ago

0   

How I got hacked, lost crypto and what it says about Apple’s security. Part 1 | by Raman Shalupau | Oct, 2020 | Medium
ksaitor.medium.com

How I got hacked, lost crypto and what it says about Apple’s security. Part 1 Jett • 3 days ago

0   

Abusing Teams client protocol to bypass Teams security policies
o365blog.com

滥用 Office Teams Client 协议 Bypass Teams 的安全策略 Jett • 3 days ago

0   

Repo Jacking: Exploiting the Dependency Supply Chain
blog.securityinnovation.com

GitHub Repo 劫持供应链代码注入攻击分析 Jett • 3 days ago

0   

The Tale of the Lost, but not Forgotten, Undocumented NetSync: Part 1 | TrustedSec
www.trustedsec.com

The Tale of the Lost, but not Forgotten, Undocumented NetSync: Part 1 Jett • 3 days ago

0   

When a stupid oplock leads you to SYSTEM – Decoder's Blog
decoder.cloud

When a stupid oplock leads you to SYSTEM Jett • 3 days ago

0   

Loading