1.Lobotomy介绍第一部分
https://rotlogix.com/2015/12/26/introduction-to-lobotomy-part-one/
2.#32C3会议的流媒体和记录
https://events.ccc.de/2015/12/26/32c3-lecture-streaming-and-recording/
3.Shellcode注入
https://dhavalkapil.com/blogs/Shellcode-Injection/
4.dnscat2 0.05发行,发行的版本说明在https://blog.skullsecurity.org/2015/dnscat2-0-05-with-tunnels
https://github.com/iagox86/dnscat2/releases/tag/v0.05
5.解析iOS的“频繁的位置
http://www.mac4n6.com/blog/2015/12/20/parsing-the-ios-frequent-locations
6.注册表hive基础知识介绍第一到第五部分
http://binaryforay.blogspot.in/2015/08/registry-hive-basics-part-5-lists.html
http://binaryforay.blogspot.jp/2015/02/registry-hive-basics-part-4-sk-records.html
http://binaryforay.blogspot.jp/2015/01/registry-hive-basics-part-3-vk-records.html
7.Tinder取证分析
http://parthasarathyalwar.com/2015/12/22/a-forensic-analysis-of-tinder-ios/
8.kdv:OS X/iOS下的Kdebug发行(用于跟踪系统调用/中断)
http://newosxbook.com/tools/kdv.html
9.Stenographer:google发行的包处理工具,可快速将网络包保存到硬盘
https://github.com/google/stenographer
10.在ida中执行haskell代码
https://github.com/kvnesterov/IdaHaskell
11.使用k-d树模糊测试遗传算法
https://codesachin.wordpress.com/2015/12/26/fuzzy-speciation-in-genetic-algorithms-using-k-d-trees/
12.DSInternals PowerShell模块开源,包含活动目录undocumented功能
https://www.dsinternals.com/en/
13.从Trezor中提取私钥
https://jochen-hoenicke.de/trezor-power-analysis/
14.Gajim Roster 推送攻击/ 消息劫持
http://gultsch.de/gajim_roster_push_and_message_interception.html
15.来自32C3会议的PPT "The Great Train Cyber Robbery"
http://www.slideshare.net/AlexanderTimorin/the-great-train-cyber-robbery-scadastrangelove
16.来自32C3会议的PPT “Lifting the Fog on RedStar OS”
https://raw.githubusercontent.com/takeshixx/redstar-tools/master/RedStar_OS_32c3.pdf
发表评论
您还未登录,请先登录。
登录