SecWiki周刊(第7期)
2014/04/14-2014/04/20
安全技术
一个可大规模悄无声息窃取淘宝/支付宝账号与密码的漏洞
http://drops.wooyun.org/papers/1426
http://drops.wooyun.org/papers/1426
浏览器安全策略说之内容安全策略CSP | WooYun知识库
http://drops.wooyun.org/tips/1439
http://drops.wooyun.org/tips/1439
ScyllaHide:open-source x64/x86 usermode Anti-Anti-Debug library
https://tuts4you.com/download.php?view.3560
https://tuts4you.com/download.php?view.3560
workerman-satistics:PHP 统计监控系统
http://www.workerman.net/workerman-statistics
http://www.workerman.net/workerman-statistics
Jenny:linux 下web漏洞扫描器
http://xiaoyu.ws/jenny/
http://xiaoyu.ws/jenny/
Pydio, formerly AjaXplorer:文件共享平台
http://pyd.io/
http://pyd.io/
2014年最新华为HCNP认证全套讲解视频教程(共22个课时)
http://edu.51cto.com/course/course_id-1176.html#6720061-tsina-1-55867-beb47058ad4ce5a6b43f97ee91cac13a
http://edu.51cto.com/course/course_id-1176.html#6720061-tsina-1-55867-beb47058ad4ce5a6b43f97ee91cac13a
NASA_Software_Catalog_2014
http://vdisk.weibo.com/s/zdEEhwOoanw4j
http://vdisk.weibo.com/s/zdEEhwOoanw4j
How I obtained the private key for www.cloudflarechallenge.com
https://gist.github.com/epixoip/10570627
https://gist.github.com/epixoip/10570627
2014年中国数据库技术大会(DTCC)PPT合集
http://wenku.it168.com/huiyi/2083
http://wenku.it168.com/huiyi/2083
窥探Android内核:crash & Treasure
http://pan.baidu.com/s/1kTG6QEV#0-tsina-1-69192-397232819ff9a47a7b7e80a40613cfe1
http://pan.baidu.com/s/1kTG6QEV#0-tsina-1-69192-397232819ff9a47a7b7e80a40613cfe1
LTE-Cell-Scanner:An OpenCL accelerated TDD/FDD LTE Scanner
https://github.com/JiaoXianjun/LTE-Cell-Scanner
https://github.com/JiaoXianjun/LTE-Cell-Scanner
Kismet:wireless network detector, sniffer, and intrusion detection system
http://www.kismetwireless.net/
http://www.kismetwireless.net/
Pyston:Dropbox 正开发的开源 Python 解释器
http://blog.jobbole.com/65414/
http://blog.jobbole.com/65414/
网站日志实时分析工具 GoAccess
http://blog.sae.sina.com.cn/archives/3534
http://blog.sae.sina.com.cn/archives/3534
CanSecWest Applied Security Conference 2014
https://cansecwest.com/csw14archive.html
https://cansecwest.com/csw14archive.html
50 Great Examples of Data Visualization
http://www.webdesignerdepot.com/2009/06/50-great-examples-of-data-visualization/
http://www.webdesignerdepot.com/2009/06/50-great-examples-of-data-visualization/
一个爬虫项目记录
http://ichuan.net/post/59/%E4%B8%80%E4%B8%AA%E7%88%AC%E8%99%AB%E9%A1%B9%E7%9B%AE%E8%AE%B0%E5%BD%95/
http://ichuan.net/post/59/%E4%B8%80%E4%B8%AA%E7%88%AC%E8%99%AB%E9%A1%B9%E7%9B%AE%E8%AE%B0%E5%BD%95/
RATDecoders:Python Decoders for Common Remote Access Trojans
https://github.com/kevthehermit/RATDecoders
https://github.com/kevthehermit/RATDecoders
从Code Review 谈如何做技术
http://coolshell.cn/articles/11432.html
http://coolshell.cn/articles/11432.html
Targeted Cyber Attacks Book
http://secniche.blogspot.com/2014/04/targeted-cyber-attacks-book-syngress.html
http://secniche.blogspot.com/2014/04/targeted-cyber-attacks-book-syngress.html
VisualThreat 免费开放移动应用隐私泄露分析API和云端沙盒动态分析服务
http://www.valleytalk.org/2014/04/13/visualthreat-%e5%85%8d%e8%b4%b9%e5%bc%80%e6%94%be%e7%a7%bb%e5%8a%a8%e5%ba%94%e7%94%a8%e9%9a%90%e7%a7%81%e6%b3%84%e9%9c%b2%e5%88%86%e6%9e%90api%e5%92%8c%e4%ba%91%e7%ab%af%e6%b2%99%e7%9b%92%e5%8a%a8/
http://www.valleytalk.org/2014/04/13/visualthreat-%e5%85%8d%e8%b4%b9%e5%bc%80%e6%94%be%e7%a7%bb%e5%8a%a8%e5%ba%94%e7%94%a8%e9%9a%90%e7%a7%81%e6%b3%84%e9%9c%b2%e5%88%86%e6%9e%90api%e5%92%8c%e4%ba%91%e7%ab%af%e6%b2%99%e7%9b%92%e5%8a%a8/
Android Adobe Reader 任意代码执行分析(附POC)
http://drops.wooyun.org/papers/1440
http://drops.wooyun.org/papers/1440
Announcing ModSecurity v2.8.0
http://blog.spiderlabs.com/2014/04/announcing-modsecurity-v280.html
http://blog.spiderlabs.com/2014/04/announcing-modsecurity-v280.html
无线安全の七年之病_杨哲3
http://pan.baidu.com/s/1ntsMe1r
http://pan.baidu.com/s/1ntsMe1r
Crimeware or APT? Malware’s “Fifty Shades of Grey”
http://www.fireeye.com/blog/technical/malware-research/2014/04/crimeware-or-apt-malwares-fifty-shades-of-grey.html
http://www.fireeye.com/blog/technical/malware-research/2014/04/crimeware-or-apt-malwares-fifty-shades-of-grey.html
动态可视化库Vis.js:秀外慧中,可处理大量动态数据
http://code.csdn.net/news/2819345
http://code.csdn.net/news/2819345
好的开发人员在项目经理眼中应该具备哪些素质
http://iamzhongyong.iteye.com/blog/2049097
http://iamzhongyong.iteye.com/blog/2049097
Xtreme RAT analysis
https://code.google.com/p/malware-lu/wiki/en_xtreme_RAT
https://code.google.com/p/malware-lu/wiki/en_xtreme_RAT
Wordpress 3.8.2补丁分析 HMAC timing attack
http://drops.wooyun.org/papers/1404
http://drops.wooyun.org/papers/1404
Debugging Embedded Systems With JTAG
http://www.devttys0.com/wp-content/uploads/2014/04/JTAG_Slides.pdf
http://www.devttys0.com/wp-content/uploads/2014/04/JTAG_Slides.pdf
Introducing Microsoft Threat Modeling Tool 2014
http://blogs.msdn.com/b/sdl/archive/2014/04/15/introducing-microsoft-threat-modeling-tool-2014.aspx
http://blogs.msdn.com/b/sdl/archive/2014/04/15/introducing-microsoft-threat-modeling-tool-2014.aspx
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第7期)
