SSRF exploitation in Spreedsheet to PDF converter | by R4id3n | Jan, 2021 | Medium
medium.com

SSRF exploitation in Spreedsheet to PDF converter Jett • 1 day ago

0   

Making Win32 APIs More Accessible to More Languages
blogs.windows.com

Windows 准备为 Win32 API 开发多个语言 Bindings,新开源 Rust Binding Jett • 1 day ago

0   

CSRF Protection Bypass in Atlassian Confluence Server – yeuchimse
yeuchimse.com

CSRF Protection Bypass in Atlassian Confluence Server Jett • 1 day ago

0   

When vulnerable library is actually your physical book
wojciechregula.blog

Docker on macOS 本地提权漏洞分析 Jett • 1 day ago

0   

Analyzing Bugzilla Testcases with Bugmon
Mozilla Hacks – the Web developer blog

Analyzing Bugzilla Testcases with Bugmon Jett • 1 day ago

0   

Process on a diet: anti-debug using job objects
secret.club

利用 Job 对象限制进程内存使用的方式实现 Anti Debug Jett • 1 day ago

0   

Windows Exploitation Tricks: Trapping Virtual Memory Access
Project Zero

James Forshaw 对 Windows 内核 Double Fetch 条件竞争漏洞利用新思路的分享 Jett • 1 day ago

0   

Three Bugs in Orion’s Belt: Chaining Multiple bugs for Unauthenticated RCE in the SolarWinds Orion Platform
Zero Day Initiative - Blog

利用 3 个漏洞实现 SolarWinds Orion RCE Jett • 1 day ago

0   

GitHub - xie19900123/spring-boot-learning: springboot系列教程,基于1.5.x版本
github.com

springboot系列教程资源。 lanying37 • 2 days ago

0   

windows 计划任务隐藏新姿势分享
paper - Last paper

Windows 计划任务隐藏新姿势分享。 lanying37 • 2 days ago

0   

基于机器学习的敏感信息泄露治理探索
腾讯安全响应中心

基于机器学习的敏感信息泄露治理探索. lanying37 • 2 days ago

0   

example:
github.com

渗透测试时枚举 OneDrive 合法用户的工具 Jett • 2 days ago

0   

How to bypass the Cloudflare WAF using a padding technique - Swascan
www.swascan.com

如何利用 padding 技术绕过 Cloudflare WAF Jett • 2 days ago

0   

gophish/gophish
github.com • Tools

gophish - 渗透测试中一款开源的钓鱼工具套件 Jett • 2 days ago

0   

Bad Pods: Kubernetes Pod Privilege Escalation
labs.bishopfox.com

Bad Pods: Kubernetes Pod Privilege Escalation Jett • 2 days ago

0   

Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop - Microsoft Security
www.microsoft.com

Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop Jett • 2 days ago

1   

Blowing the Cover of Android Binary Fuzzing - Speaker Deck
speakerdeck.com

Blowing the Cover of Android Binary Fuzzing Jett • 2 days ago

1   

Exploiting CVE-2014-3153 (Towelroot)
elongl.github.io

Exploiting CVE-2014-3153 (Towelroot) Jett • 2 days ago

0   

Exploiting CVE-2020-15994 Chrome WebAssembly Engine UAF Vulnerability
blog.br0vvnn.io

Exploiting CVE-2020-15994 Chrome WebAssembly Engine UAF Vulnerability Jett • 2 days ago

1   

Emulation of Kernel Mode Rootkits With Speakeasy
Threat Research

利用 Speakeasy 工具模拟执行内核态 Rootkits Jett • 2 days ago

1   

Loading