Aggregator
云安全运营专家|腾讯云安全招聘火热进行中
云安全运营专家|腾讯云安全招聘火热进行中
云安全运营专家|腾讯云安全招聘火热进行中
云安全运营专家|腾讯云安全招聘火热进行中
JVN: Schneider Electric製Modiconにおける不適切な入力確認の脆弱性
未修补的 Windows 零日漏洞自 2017 年起遭 11 个国家级赞助威胁组织利用
新型“规则文件后门”攻击:黑客可通过 AI 代码编辑器注入恶意代码
Hunt-Sleeping-Beacons: identify beacons
Hunt-Sleeping-Beacons This project is ( mostly ) a callstack scanner which tries to identify IOCs indicating an unpacked or injected C2 agent. All checks are based on the observation that C2 agents wait between...
The post Hunt-Sleeping-Beacons: identify beacons appeared first on Penetration Testing Tools.
记一次 RCE 0day 的审计过程
记一次 RCE 0day 的审计过程
记一次 RCE 0day 的审计过程
记一次 RCE 0day 的审计过程
记一次 RCE 0day 的审计过程
记一次 RCE 0day 的审计过程
记一次 RCE 0day 的审计过程
记一次 RCE 0day 的审计过程
AlphaGolang: IDApython Scripts for Analyzing Golang Binaries
AlphaGolang AlphaGolang is a collection of IDAPython scripts to help malware reverse engineers master Go binaries. The idea is to break the scripts into concrete steps, thus avoiding brittle monolithic scripts, and mimicking the...
The post AlphaGolang: IDApython Scripts for Analyzing Golang Binaries appeared first on Penetration Testing Tools.
Malduck: make library for malware researchers
Malduck Malduck is your ducky companion in malware analysis journeys. It is mostly based on the Roach project, which derives many concepts from mlib library created by Maciej Kotowicz. The purpose of the fork was to make Roach...
The post Malduck: make library for malware researchers appeared first on Penetration Testing Tools.