SecWiki周刊(第314期)
2020/03/02-2020/03/08
安全技术
DIY | 树莓派搭载kali Linux
https://mp.weixin.qq.com/s/aOWEheNMxIYTBalDErSuMQ
https://mp.weixin.qq.com/s/aOWEheNMxIYTBalDErSuMQ
burpsuite pro 2020.2
https://mp.weixin.qq.com/s/WXdEvc0p04KjyOlmb4qtRg
https://mp.weixin.qq.com/s/WXdEvc0p04KjyOlmb4qtRg
远控免杀专题-C#加载shellcode免杀
https://mp.weixin.qq.com/s/Kvhfb13d2_D6m-Bu9Darog
https://mp.weixin.qq.com/s/Kvhfb13d2_D6m-Bu9Darog
《2020年SANS网络空间威胁情报(CTI)调查》解读
https://mp.weixin.qq.com/s/ERakfCjEjW_UfViz9KoxFQ
https://mp.weixin.qq.com/s/ERakfCjEjW_UfViz9KoxFQ
业务安全蓝军测评标准白皮书
https://mp.weixin.qq.com/s/23fcilR_XhrGLWSaKv21zA
https://mp.weixin.qq.com/s/23fcilR_XhrGLWSaKv21zA
Exchange 漏洞CVE-2020-0688 RCE复现
http://www.fr1sh.com/?post=24
http://www.fr1sh.com/?post=24
无密码登录他人QQ空间可查看加密相册
https://mp.weixin.qq.com/s/yEKD6vV_I4xvGcHodehiVg
https://mp.weixin.qq.com/s/yEKD6vV_I4xvGcHodehiVg
伪造windows登录屏幕窃取密码之FakeLogonScreen
https://bacde.me/post/Fake-Windows-Logon-Screen-To-Steal-Passwords/
https://bacde.me/post/Fake-Windows-Logon-Screen-To-Steal-Passwords/
远控免杀专题-C、C++加载shellcode免杀(下)
https://mp.weixin.qq.com/s/Kw3-fdyHyiettYn44WNZQw
https://mp.weixin.qq.com/s/Kw3-fdyHyiettYn44WNZQw
Windows Server 2016抓取明文密码
https://www.bacde.me/post/Windows-Server-2016-Get-Plaintext-Password/
https://www.bacde.me/post/Windows-Server-2016-Get-Plaintext-Password/
利用Cython将Python项目转化为单个.so
https://mp.weixin.qq.com/s/YRKY7FgLFw-w4QIlrNd-FA
https://mp.weixin.qq.com/s/YRKY7FgLFw-w4QIlrNd-FA
SecWiki周刊(第313期)
https://www.sec-wiki.com/weekly/313
https://www.sec-wiki.com/weekly/313
2019年Android 恶意软件专题报告
https://cert.360.cn/report/detail?id=0d66c8ba239680d6674f2dba9f2be5f7
https://cert.360.cn/report/detail?id=0d66c8ba239680d6674f2dba9f2be5f7
文本分类和序列标注“深度”实践
https://mp.weixin.qq.com/s/afO58DDDZGb5w_EEG8oW6Q
https://mp.weixin.qq.com/s/afO58DDDZGb5w_EEG8oW6Q
Cobalt Strike 4.0 手册
https://blog.ateam.qianxin.com/CobaltStrike4.0%E7%94%A8%E6%88%B7%E6%89%8B%E5%86%8C_%E4%B8%AD%E6%96%87%E7%BF%BB%E8%AF%91.pdf
https://blog.ateam.qianxin.com/CobaltStrike4.0%E7%94%A8%E6%88%B7%E6%89%8B%E5%86%8C_%E4%B8%AD%E6%96%87%E7%BF%BB%E8%AF%91.pdf
远控免杀专题-Python加载shellcode免杀
https://mp.weixin.qq.com/s/HyBSqrF_kl2ARaCYAMefgA
https://mp.weixin.qq.com/s/HyBSqrF_kl2ARaCYAMefgA
WebLogic CVE-2020-2551漏洞分析
http://blog.topsec.com.cn/weblogic-cve-2020-2551%e6%bc%8f%e6%b4%9e%e5%88%86%e6%9e%90/
http://blog.topsec.com.cn/weblogic-cve-2020-2551%e6%bc%8f%e6%b4%9e%e5%88%86%e6%9e%90/
初探利用angr进行漏洞挖掘(下)
https://xz.aliyun.com/t/7275
https://xz.aliyun.com/t/7275
日志实时数据监控的探索与实践
https://mp.weixin.qq.com/s/wal_BVdp8yunXXPFpUy-gw
https://mp.weixin.qq.com/s/wal_BVdp8yunXXPFpUy-gw
应急响应中常用的日志收集方法
https://mp.weixin.qq.com/s/ZY3gqly-z-L8XFW9ML5aow
https://mp.weixin.qq.com/s/ZY3gqly-z-L8XFW9ML5aow
FuzzBench - Fuzzer benchmarking as a service
https://github.com/google/FuzzBench
https://github.com/google/FuzzBench
v8 engine exploit零基础入门
https://www.anquanke.com/post/id/199702
https://www.anquanke.com/post/id/199702
初探利用angr进行漏洞挖掘(上)
https://xz.aliyun.com/t/7274
https://xz.aliyun.com/t/7274
远控免杀专题-C、C++加载shellcode免杀(上)
https://mp.weixin.qq.com/s/LftwV4bpuikDklIjuRw2LQ
https://mp.weixin.qq.com/s/LftwV4bpuikDklIjuRw2LQ
Hades - 静态代码脆弱性检测系统
https://github.com/zsdlove/Hades
https://github.com/zsdlove/Hades
安天对“超高能力网空威胁行为体”系列分析回顾
https://mp.weixin.qq.com/s/N0LxStDpc6GyzpyszYnguQ
https://mp.weixin.qq.com/s/N0LxStDpc6GyzpyszYnguQ
远控免杀专题-C、C++加载shellcode免杀(中)
https://mp.weixin.qq.com/s/McVWP386q5in6cQ8hRxwdA
https://mp.weixin.qq.com/s/McVWP386q5in6cQ8hRxwdA
Voyager: 安全工具集合平台
https://github.com/ody5sey/Voyager
https://github.com/ody5sey/Voyager
Java代码审计之跨站脚本攻击
https://mp.weixin.qq.com/s/lQNixguOJahjM-AXvPoHqQ
https://mp.weixin.qq.com/s/lQNixguOJahjM-AXvPoHqQ
QQ邮箱从Self-XSS到钓鱼攻击分析(多漏洞利用攻击链)
https://www.freebuf.com/vuls/228042.html
https://www.freebuf.com/vuls/228042.html
用模拟执行实现Objective-C代码自动化分析
https://wonderkun.cc/2020/03/02/%E7%94%A8%E6%A8%A1%E6%8B%9F%E6%89%A7%E8%A1%8C%E5%AE%9E%E7%8E%B0Objective-C%E4%BB%A3%E7%A0%81%E8%87%AA%E5%8A%A8%E5%8C%96%E5%88%86%E6%9E%90/
https://wonderkun.cc/2020/03/02/%E7%94%A8%E6%A8%A1%E6%8B%9F%E6%89%A7%E8%A1%8C%E5%AE%9E%E7%8E%B0Objective-C%E4%BB%A3%E7%A0%81%E8%87%AA%E5%8A%A8%E5%8C%96%E5%88%86%E6%9E%90/
nw-tips: Win内网_域控安全
https://github.com/renzu0/nw-tips
https://github.com/renzu0/nw-tips
全球高级持续性威胁(APT)2019年研究报告
http://pc1.gtimg.com/softmgr/files/apt_report_2019.pdf
http://pc1.gtimg.com/softmgr/files/apt_report_2019.pdf
谈谈蜜罐(调研)与内网安全
https://zhuanlan.zhihu.com/p/110886405
https://zhuanlan.zhihu.com/p/110886405
PHP代码加密面面观
https://www.anquanke.com/post/id/176767
https://www.anquanke.com/post/id/176767
evasions techniques
https://evasions.checkpoint.com/
https://evasions.checkpoint.com/
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第314期)
