Windows authentication attacks – part 1
blog.redforce.io • Windows

Windows身份验证攻击教程–第1部分 lanying37 • 14 hours ago

0   

Architecting mobile banking apps against attackers | F-Secure
www.f-secure.com

针对攻击者对手机移动银行的应用软件安全分析。 lanying37 • 14 hours ago

0   

Android Security Bulletin—April 2020  |  Android Open Source Project
source.android.com • Android

Android 安全公告-2020年4月 lanying37 • 14 hours ago

0   

Bypassing Xamarin Certificate Pinning on Android | GoSecure
www.gosecure.net • Android

Based on Frida,Bypassing Xamarin Certificate Pinning on Android Jett • 17 hours ago

0   

JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms
arxiv.org • Hardware Side Channel

通过共享的 FPGA-CPU 内存子系统实现高效的 Rowhammer 攻击 Jett • 18 hours ago

0   

Attacks Simultaneously Exploiting Vulnerability in IE (CVE-2020-0674) and Firefox (CVE-2019-17026) - JPCERT/CC Eyes
blogs.jpcert.or.jp • Browser

日本 CERT 对近期出现的针对 IE/Firefox 浏览器的野外利用攻击的分析 Jett • 18 hours ago

0   

GitHub - bats3c/Ghost-In-The-Logs: Evade sysmon and windows event logging
github.com • Tools

帮助逃逸 Sysmon 和 Windows Event Logging 监控的工具 Jett • 18 hours ago

0   

Securely donate CPU time with Windows Sandbox
techcommunity.microsoft.com • Tools

基于 Windows-Sandbox-Utilities 开源项目搭建运行恶意软件的沙箱环境 Jett • 18 hours ago

0   

GitHub - 0xgalz/Virtuailor: IDAPython tool for creating automatic C++ virtual tables in IDA Pro
github.com • Reverse Engineering Tools

Virtuailor - 基于 IDA Python 编写的用于为 IDA Pro 还原 C++ 代码虚表的工具 Jett • 18 hours ago

0   

Zero-Day Exploitation Increasingly Demonstrates Access to Money, Rather than Skill — Intelligence for Vulnerability Management, Part One
Threat Research

FireEye 对 2019 年各个国家 0Day 使用情况的分析 Jett • 18 hours ago

0   

Unkillable xHelper and a Trojan matryoshka
Securelist • Malware

Android 手机删不掉的 xHelper 木马 Jett • 18 hours ago

0   

Same Same But Different: Discovering SQL Injections Incrementally with Isomorphic SQL Statements
spaceraccoon.dev • Web

Same Same But Different: Discovering SQL Injections Incrementally with Isomorphic SQL Statements Jett • 18 hours ago

0   

Adobe Reader XFA Heap Address Leak
starlabs.sg

Adobe Reader XFA Heap Address Leak Jett • 18 hours ago

0   

Vulnerability
starlabs.sg

Adobe Reader xfa.loadXML Use-after-Free Jett • 18 hours ago

0   

Nightmare - Nightmare
guyinatuxedo.github.io • CTF Exploit

基于 CTF 的二进制代码利用技术教程 Jett • 18 hours ago

0   

qilingframework/qiling
github.com • Tools Fuzzing

基于 Qiling Framework 编写的 Fuzzer Jett • 18 hours ago

0   

Join GitHub today
github.com • Linux

IPE - 微软为 Linux 开发的用于为系统提供代码完整性检查的 LSM 模块 Jett • 18 hours ago

0   

Yara-Rules/RANSOM_coronavirus.yar at master · advanced-threat-research/Yara-Rules · GitHub
github.com • Malware

McAfee 开源的用于检测 Corona Virus Installer 的 Yara 规则 Jett • 18 hours ago

0   

Analyzing & Decrypting L4NC34’s Simple Ransomware
blog.sucuri.net • Malware

分析与解密L4NC34勒索软件研究。 lanying37 • 1 day ago

0   

Fuzzing Like A Caveman
h0mbre.github.io • Fuzzing

Fuzzing Like A Caveman Jett • 1 day ago

0   

Loading