
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Exploit ] FILE 结构体的漏洞利用(绕过'vtable'检查): https://dhavalkapil.com/blogs/FILE-Structure-Exploitation/
-
-
[ Others ] Rotten Potato 提权工具与管理员 Token 的获取: https://decoder.cloud/2018/01/13/potato-and-tokens/
-
[ Pentest ] Linux 渗透测试命令速查手册: https://techincidents.com/important-penetration-testing-cheat-sheet/
-
-
[ Tools ] 针对 PowerStager 工具的分析: https://researchcenter.paloaltonetworks.com/2018/01/unit42-powerstager-analysis/
-
[ Tools ] Daily-dose-of-malware - 从各大平台上收集恶意软件与 C&C 服务器信息的脚本: https://github.com/woj-ciech/Daily-dose-of-malware
-
[ Tools ] security-apis - 安全相关服务的公共 JSON API 收集列表: https://github.com/deralexxx/security-apis
-
[ Tools ] p0wnedShell - 不依赖 powershell.exe 执行 PowerShell 脚本代码的环境: https://github.com/Cn33liz/p0wnedShell
-
-
[ Hardware ] Intel 发布预测执行侧信道缓解(Speculative Execution Side Channel Mitigations)白皮书: https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf
-