SecWiki News 2020-04-21 Review | xxxSecWiki News 2020-04-21 Review – xxx
菜单

SecWiki News 2020-04-21 Review

四月 21, 2020 - Sec-wiki

Stowaway — Multi-hop Proxy Tool for pentesters by ph4ntom

MacOS Dylib Injection through Mach-O Binary Manipulation by re4lity

GhostBuild – MSBuild launchers for various GhostPack/.NET projects by re4lity

Lateral Movement: PowerShell Remoting by re4lity

Tinyshell Under the Microscope by re4lity

DLL hijacking vulnerabilities in Nirsoft tools by re4lity

Tale of two hypervisor bugs – Escaping from FreeBSD bhyve by re4lity

CryptoHack – A fun platform for learning cryptography by re4lity

joincap: Merge multiple pcap files together, gracefully. by re4lity

Building a Basic C2 by re4lity

Attacking and Auditing Docker Containers and Kubernetes Clusters by re4lity

Assistant plugin for vulnerability research by re4lity

Terminal Escape Injection by re4lity

OSS-Fuzz data in Vulners by re4lity

How We Hacked an Android Game And Ranked First globally by re4lity

Exploiting POST-based XSSI by re4lity

xioc: Extract IOCs from text, including “escaped” ones. by re4lity

The Hitchhiker’s Guide to Shellcoding by re4lity

Everything You Need to Know About IDOR by re4lity

Uninitialized Memory Disclosures in Web Applications by re4lity

Is BGP safe yet? · Cloudflare by re4lity

pingfisher: A ping detection tool for linux by re4lity

Sqlserver, or the Miner in the Basement by re4lity

Abusing HTTP Path Normalization and Cache Poisoning to steal accounts by re4lity

JSON Web Token Validation Bypass in Auth0 Authentication API by re4lity

The Zaheck of Android Deep Links! by re4lity

Xiaomi Mi9 (Pwn2Own 2019) by re4lity

Critical CSRF to RCE bug chain in Prestashop v1.7.6.4 and below by re4lity

Exploiting (Almost) Every Antivirus Software by re4lity

iOS acquisition methods compared: logical, full file system and iCloud by re4lity

Grammar based fuzzing PDFs with Domato by re4lity

CVE-2020-0791 by re4lity

SMBGhost pre-auth RCE abusing Direct Memory Access structs by re4lity

A HTTP PoC Endpoint for cve-2020-5260 by re4lity

Android Kernel Exploitation by re4lity

GHSL-2020-038: Use after free in Chrome WebAudio by re4lity

Dissecting the Windows Defender Driver by re4lity

awesome-virtualization: Collection of resources about Virtualization by re4lity

SystemToken: Steal privileged token to obtain SYSTEM shell by re4lity

Handbook of information collection for penetration testing and src by re4lity

This challenge is Inon Shkedy’s 31 days API Security Tips. by re4lity

AIL framework – Analysis Information Leak framework by re4lity

A Defender’s Guide For Rootkit Detection: Episode 1 by re4lity

更多最新文章,请访问SecWiki


Notice: Undefined variable: canUpdate in /var/www/html/wordpress/wp-content/plugins/wp-autopost-pro/wp-autopost-function.php on line 51