https://andrewmohawk.com/2016/06/05/hackfu-2016-writeup/
HackFu 2016 Writeup
http://www.harmj0y.net/blog/powershell/upgrading-powerup-with-psreflect/
powerup的psreflect模块更新
https://github.com/IMcPwn/browser-backdoor
浏览器后门:跨平台的websocket远程访问工具
https://isc.sans.edu/forums/diary/Neutrino+EK+and+CryptXXX/21141
Neutrino EK 和 CryptXXX 恶意欺诈勒索软件
https://github.com/sogeti-esec-lab/ransomware-xtbl-decrypt-tool
Xtbl恶意软件解密工具
https://github.com/lcatro/vuln_javascript
模拟一个存在漏洞的JavaScript 运行环境,用来学习浏览器漏洞原理和练习如何编写Shellcode
https://github.com/Necrosys/zerowine-tryout
Zero Wine Tryouts: 一个开源的恶意软件分析工具
https://github.com/pldupont/SQLIDetectionDriver
基于JDBC 驱动的SQL注入检测工具
https://github.com/wtakuo/BOFDemo
IA-32架构的简单缓冲区溢出漏洞DEMO
https://github.com/bittorrent3389/demo-physmap-spraying
通过ret2dir绕过 smep & NX保护实现提权的DEMO
https://www.fireeye.com/blog/threat-research/2016/06/rotten_apples_apple.html
模仿iCloud,apple官方域名的钓鱼攻击
https://paraschetal.in/writing-your-own-shellcode/
写你自己的SHELLCODE
https://blog.zsec.uk/pwning-pornhub/
Pwning Pornhub
http://esec-lab.sogeti.com/posts/2016/06/07/the-story-of-yet-another-ransomfailware.html
尝试反向工程一个恶意欺诈勒索软件
http://www.securityfocus.com/archive/1/538617
Microsoft Education – 代码执行漏洞
http://j00ru.vexillium.org/?p=2245
(CVE-2014-2240, CVE-2014-9659) 在Adobe CFF 中的基于栈的缓冲区溢出漏洞细节
http://old.iseclab.org/people/andrew/download/oakland09.pdf
恶意软件模拟器自动反向工程
https://blogs.mcafee.com/mcafee-labs/threat-actors-employ-com-technology-shellcode-evade-detection/
使用COM技术逃避检测的SHELLCODE
https://www.helpnetsecurity.com/2016/06/07/fastpos-malware/
FastPOS恶意软件寻找数据后立即提取数据,报告地址在http://documents.trendmicro.com/assets/fastPOS-quick-and-easy-credit-card-theft.pdf
https://packetstormsecurity.com/files/137343/valvesteam-escalate.txt
Valve Steam 3.42.16.13本地提权漏洞
https://blog.didierstevens.com/2016/06/07/recovering-a-ransomed-pdf/
恢复一个被恶意软件加密的PDF文件
发表评论
您还未登录,请先登录。
登录