1、对微软智能手环的越狱
http://www.b0n0n.com/2016/04/20/ms-jailbreak/
2、TeslaCrypt 4.1A的恶意欺诈软件的攻击链
https://www.endgame.com/blog/your-package-has-been-successfully-encrypted-teslacrypt-41a-and-malware-attack-chain
3、MAC平台上的恶意欺诈软件检测
https://objective-see.com/blog/blog_0x0F.html
4、加固linux容器
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/april/understanding-and-hardening-linux-containers/
5、基于java的分析TLS库的框架
https://github.com/RUB-NDS/TLS-Attacker
6、一些web安全方面的学习资源列表
https://forum.bugcrowd.com/t/researcher-resources-getting-started/115
7、Bypassing Browser Security Policies for Fun and Prof 视频放出
https://www.youtube.com/watch?v=P5R4KeCzO-Q
8、Panda Banker: 新的银行木马
https://www.proofpoint.com/us/threat-insight/post/panda-banker-new-banking-trojan-hits-the-market
9、扫描磁盘镜像的计算机取证工具
http://securityblog.gr/3360/computer-forensics-tool-to-scan-disk-images/
10、nuitduhack-2016 ctf writeup
https://github.com/avlidienbrunn/ctf-writeups/tree/master/nuitduhack-2016/night_daemonic_heap
11、Bettercap 使用指南
https://danielmiessler.com/study/bettercap/
12、使用wsl在win10上运行fedora
https://www.variantweb.net/blog/running-fedora-on-windows-10-using-wsl/
13、构建你自己的botnet
https://www.sans.org/reading-room/whitepapers/threats/byob-build-botnet-33729
14、Dridex分析第二部分,第一部分在http://www.malwaretech.com/2016/03/lets-analyze-dridex-part-1.html
http://www.malwaretech.com/2016/04/lets-analyze-dridex-part-2.html
15、从csv到cmd再到qwery.(通过在excel中注入net use \IP命令,抓取hash)
http://www.exploresecurity.com/from-csv-to-cmd-to-qwerty/
16、Maltego的shodan模块发行
http://maltego.blogspot.tw/2016/04/abracadabra-its-shodan-time.html
17、完全反汇编固件(在ida中重构函数)
https://harryskon.com/2015/02/04/disassemble-firmware-completely-rebuild-functions-in-ida/
18、Windows Kernel – DrawMenuBarTemp Wild-Write (MS16-039) POC
https://www.exploit-db.com/exploits/39712/
发表评论
您还未登录,请先登录。
登录