SecWiki周刊(第164期)
2017/04/17-2017/04/23
安全资讯
任意伪造域名-你能分辨出钓鱼网站的域名吗 App Store 刷榜黑幕大揭秘
安全技术
学习使用Clang Libfuzzer Fuzz C/Cpp代码 Apache Log4j反序列化漏洞(CVE-2017-5645) Esteemaudit漏洞复现过程 CVE-2017-0199漏洞复现过程 NSA Explodingcan 漏洞分析与调试 NSA/fuzzbunch Edge – SOP bypass courtesy of the reading mode NSA Eternalblue SMB 漏洞分析 木马实现技术概述 浅谈漏洞挖掘及代码审计(一) Linux、Windows提权命令速记 EternalPulsar实践 子域名挖掘修改版 利用机器学习实时对抗Java恶意软件 Eternalromance (永恒浪漫) 漏洞分析 打造免费企业安全:便宜没好货吗?(一) Web Service 渗透测试从入门到精通 sicklepoc:Web扫描器开源 leakPasswd: Python 密码泄露查询模块 weibo_terminater: 微博终结者爬虫 基于Python与Face++实现人脸识别 D2T4 - Emmanuel Gadaix - A Surprise Encounter With a Telco APT python-uncompyle6: Python 反编译工具 Boostnote:开源的程序员专属笔记应用工具 MySQL注入攻击与防御 Malcom Malware Communication Analyzer y Bro IDS. Parte I 每周技术分享第三期--科普WAF Black Hat Python: Infinite possibilities with the Scapy Module VulnTrack Windows绝赞应用 8dot8 on Vimeo A quick analysis of the latest Shadow Brokers dump Run virtual routers with docker 深入分析NSA用了5年的IIS漏洞 安全相关免费电子书集合 awesome-cve-poc:A curated list of CVE PoCs Exploit toolkit CVE-2017-0199 - v2.0 The Shadow over Android Heap exploitation assistance for Android’s libc allocato Cheetah:一款基于字典的webshell密码爆破工具 Android malware anti-emulation techniques 深度!近期所谓“优酷数据泄露事件”的客观事实还原 通过云Fuzz挖掘TCPDump的漏洞 GitLab 的员工手册-远程办公协作 Benchmarks: 常用服务器、数据库、中间件安全配置基线 [0day] Text/Plain Considered Harmful Studies in AI & Pixels & Waves - #5 【重磅推荐】安全客2017季刊第一期新鲜出炉! Metasploit Framework docker 版本 python奇技淫巧 Exploit Monday: Updating Device Guard Code Integrity Policies doublepulsar-c2-traffic-decryptor: 网络层检测DOUBLEPULSAR攻击 Design flaws in Lastpass 2FA implementation THUOCL:清华大学开放中文词库 Automating APT Scanning with Loki Scanner and Splunk 使用业务和技术有关的上下文对网络威胁情报(CTI)进行排序 PowerShell Gallery | PowerShellCookbook 1.3.6 Magnitude EK delivers Cerber | Zerophage Malware Twitter账户活动情况分析工具 – Simple Twitter Profile Analyzer SSL&TLS安全测试 Studies in AI & Pixels & Waves - #11 Tamper Chrome 浅谈linux安全加固 2016年网络安全威胁的回顾与展望 Studies in AI & Pixels & Waves - #8 Studies in AI & Pixels & Waves - #7 通过APC实现Dll注入——绕过Sysmon监控 2016-2017年第一季度工业控制网络安全态势白皮书 ARM Releases Machine Readable Architecture Specification Into the symmetry: Meh : CSRF in Facebook Delegated Account Recovery jSQL Injection: herramienta automatizada en Java para realizar ataques SQL SEC Consult: Abusing NVIDIA's node.js to bypass application whitelisting Studies in AI & Pixels & Waves - #10 Studies in AI & Pixels & Waves - #6 IEETWCollector Arbitrary Directory/File Deletion Pr PHP HOOK的若干方法 全面监听:以斯塔西的名义 长城宽带内网严重隐患:边界模糊不清 android 安全编码指南 SecWiki周刊(第163期) A Closer Look at Chrome's Security: Understanding V8 EternalPulsar — A practical example of a made up name Android漏洞测试套件 百度网盘自动添加资源项目(更新GUI版本) All videos of Android Security Symposium 2017 Memory corruption in Array concat Chrome and Firefox Phishing Attack Uses Domains Identical to Known Safe Sites Hadoop Security for beginners Introducing CFI in HardenedBSD | SOLDIERX.COM encoding-web-shells-in-png-idat-chunks Smart TV Hack via the Broadcast Signal DNS Intrusion Detection in Office 365 list-of-waf-security-bypass-research Studies in AI & Pixels & Waves - #9 Studies in AI & Pixels & Waves - #1 EITEST CAMPAIGN RIG EK / HOEFLERTEXT CHROME POPUP Bypassing Browser Memory Protections Studies in AI & Pixels & Waves - #3 Introducing SafeStack in HardenedBSD Ad-LDAP-Enum Studies in AI & Pixels & Waves - #2 Studies in AI & Pixels & Waves - #4-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第164期)