Android App Reverse Engineering 101
maddiestone.github.io • Android Reverse Engineering

Android App逆向工程101 lanying37 • 2 hours ago

0   

Reverse Engineering Starling Bank (Part II): Jailbreak & Debugger Detection, Weaknesses & Mitigations
hot3eed.github.io

逆向工程Starling Bank(第二部分):越狱和调试器检测,弱点和缓解措施。 lanying37 • 2 hours ago

0   

CVE-2020-13379
rhynorater.github.io • Web

Unauthenticated Full-Read SSRF in Grafana Jett • 11 hours ago

0   

IDA Plugins
github.com

为 IDA 提供寄存器引用跟踪的插件 Jett • 11 hours ago

0   

cedowens/MacShellSwift
github.com • macOS Tools

用于 macOS 渗透测试中收集 Client 的信息 Jett • 11 hours ago

0   

Offense and Defense – A Tale of Two Sides: Group Policy and Logon Scripts
Fortinet Threat Research Blog

Windows 系统组策略对象(GPO)AD 域环境中的攻击与防御 Jett • 12 hours ago

0   

Vulnerability Spotlight: Microsoft issues security update for Azure Sphere
Talos Blog || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence

微软基于云的 SoC 平台 Azure Sphere 被发现多个漏洞 Jett • 12 hours ago

0   

The core of Apple is PPL: Breaking the XNU kernel's kernel
Project Zero • macOS iOS

The core of Apple is PPL: Breaking the XNU kernel's kernel Jett • 12 hours ago

0   

Tutorial of ARM Stack Overflow Exploit against SETUID Root Program
Fortinet Threat Research Blog

ARM 平台 setuid 程序栈溢出漏洞利用教程 Jett • 12 hours ago

0   

WastedLocker: technical analysis
Securelist • Malware

卡巴斯基对前两周 Garmin 公司被攻击涉及 WastedLocker 勒索软件的分析 Jett • 12 hours ago

0   

Attacks on Implementations of Secure Systems
github.com • Side Channel

Yossi Oren博士《对安全系统实施攻击》课程的相关资料已上传到github Schwarrzz • 13 hours ago

0   

CTF_Writeups/InCTF at master · 5h3r10ck/CTF_Writeups · GitHub
github.com • Forensics Tools

一例取证CTF题目的Writeup Schwarrzz • 13 hours ago

0   

Removing Kernel Callbacks Using Signed Drivers
br-sn.github.io • Windows Tools

使用签名的驱动程序删除内核回调 Schwarrzz • 13 hours ago

0   

Using syzkaller, part 4: Driver fuzzing
www.collabora.com • Tools Programming

如何使用syzkaller对驱动程序进行fuzzing Schwarrzz • 13 hours ago

0   

DeimosC2 - A Golang Command And Control Framework For Post-Exploitation
www.kitploit.com • Tools

由Golang和Vue.js编写的C2工具DeimosC2 Schwarrzz • 13 hours ago

0   

Debugging Incidents in Google's Distributed Systems
queue.acm.org • Programming

如何调试Google分布式系统中的事件 Schwarrzz • 13 hours ago

0   

Reverse-engineering the adder inside the Intel 8086
www.righto.com • Reverse Engineering

针对英特尔8086内部的加法器进行逆向工程研究。 lanying37 • 1 day ago

0   

Data Exfiltration with Base64
www.trenchesofit.com

使用Base64编码进行数据渗透测试。 lanying37 • 1 day ago

0   

GHSL-2020-072: Arbitrary file disclosure in JinJava - CVE-2020-12668
securitylab.github.com

JinJava 任意文件读漏洞分析(CVE-2020-12668) Jett • 3 days ago

0   

2035 - iOS: PPL bypass due to incorrect argument verification in pmap_protect_options_internal() and pmap_remove_options_internal() - project-zero
bugs.chromium.org • iOS

Issue 2035: iOS: PPL bypass due to incorrect argument verification in pmap_protect_options_internal() and pmap_remove_options_internal() Jett • 3 days ago

0   

Loading