腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Fuzzing ] 如何使用Fuzzing挖掘ImageMagick的漏洞,作者同时公开了这个 Fuzzer 的代码: https://github.com/lcatro/Fuzzing-ImageMagick
-
[ Network ] 使用 Linux tracepoints, perf and eBPF 跟踪网络数据包的流程: https://blog.yadutaf.fr/2017/07/28/tracing-a-packet-journey-using-linux-tracepoints-perf-ebpf/ Github: https://github.com/yadutaf/tracepkt
-
[ Tools ] sRDI - 用 Shellcode 实现的 DLL 反射注入。可以将指定 DLL 文件转换成 Shellcode 输出: https://github.com/monoxgas/sRDI
-
[ Tools ] ShellLink - 处理 ShellLink(LNK) 文件的 .Net 类库: https://github.com/securifybv/ShellLink… https://t.co/afrnq0g9vW
-
[ Tools ] 自动化绕过安卓恶意软件检测系统的工具 - AVPASS 原理介绍,来自 Blackhat US 2017: https://www.blackhat.com/docs/us-17/thursday/us-17-Jung-AVPASS-Leaking-And-Bypassing-Anitvirus-Detection-Model-Automatically.pdf
-
[ Windows ] 滥用 GDI Palette 对象实现 MS17-017 提权漏洞的利用,来自 DEFCON 会议的演讲: https://sensepost.com/blog/2017/abusing-gdi-objects-for-ring0-primitives-revolution/ Github: https://github.com/sensepost/gdi-palettes-exp/raw/master/5A1F_Defcon_25_Demystifying_Kernel_Exploitation_By_Abusing_GDI_Objects_white_paper.pdf