su20_aarch64_wp_presentation.pdf:https://cloud.tsinghua.edu.cn/f/6abcbae919064bdcbffe/
・ Windows" Phone 果然有问题——浅谈手机 SoC 启动,AArch64 UEFI/ACPI 适配和应用 – Jett
CVE-2020–1088 — Yet another arbitrary delete EoP:https://medium.com/csis-techblog/cve-2020-1088-yet-another-arbitrary-delete-eop-a00b97d8c3e2
・ Windows wersvc.dll!CEtwSession::FlushBuffered 任意文件删除本地提权漏洞分析(CVE-2020–1088 ) – Jett
[Tools] Releases · frida/frida · GitHub:https://github.com/frida/frida/releases
・ Frida 更新 12.8 版本,重点优化了 Stalker 引擎 – Jett
双尾蝎组织(APT-C-23)针对中东地区的最新攻击活动:https://blogs.360.cn/post/APT-C-23_target_at_Middle_East.html
・ 双尾蝎组织(APT-C-23)针对中东地区的最新攻击活动 – Jett
GitHub - d0k3/GodMode9: GodMode9 Explorer - A full access file browser for the Nintendo 3DS console:https://github.com/d0k3/GodMode9
・ GodMode9 - 任天堂 3DS console 文件管理器 – Jett
CVE-2020-11022/CVE-2020-11023: jQuery 3.5.0 Security Fix details:https://mksben.l0.cm/2020/05/jquery3.5.0-xss.html?m=1
・ jQuery 3.5.0 版本修复的 CVE-2020-11022/CVE-2020-11023 漏洞的分析 – Jett
Exploiting PHP deserialization:https://link.medium.com/rkOjYq6Ny6
・ PHP 序列化漏洞的利用 – Jett
[CTF] FCSC 2020 - Keykoolol (Reverse) - Write-up:https://re-dojo.github.io/write-ups/2020-05-09-fcsc-2020-keykoolol/
・ FCSC 2020 CTF 代码混淆逆向题 Keykoolol 的 writeup – Jett
[Windows] CVE-2019-0685 win32k reference count leak in DirectComposition — sigpwn:https://sigpwn.io/blog/2020/5/7/cve-2019-0685-win32k-reference-count-leak
・ win32k DirectComposition 组件引用计数泄漏漏洞分析(CVE-2019-0685) – Jett
[CTF] LYoungJoo/keml_exploit.c Created 2 hours ago:https://gist.github.com/LYoungJoo/4d225668991c6812701b1fcad6e18646
・ DEFCON 2020 CTF keml exploit 代码 – Jett
Detecting secrets in code committed to gitlab (in real time):https://www.slideshare.net/ChandrapalBN/detecting-secrets-in-code-committed-to-gitlab-in-real-time-234096458
・ 实时检测提交到 GitLab 中的密钥凭据信息 – Jett
[Windows] CVE-2018-8611 Exploiting Windows KTM Part 4/5 – From race win to kernel read and write primitive:https://research.nccgroup.com/2020/05/18/cve-2018-8611-exploiting-windows-ktm-part-4-5-from-race-win-to-kernel-read-and-write-primitive/
・ CVE-2018-8611 Exploiting Windows KTM Part 4/5 – From race win to kernel read and write primitive – Jett
[Conference] CTFs, Bugbounty and your security career:https://www.slideshare.net/IbrahimElSayed6/ctfs-bugbounty-and-your-security-career
・ CTFs, Bugbounty and your security career – Jett
* 查看或搜索历史推送内容请访问:
https://sec.today
* 微信公众号: 腾讯玄武实验室
+关注
快速开通微博你可以查看更多内容,还可以评论、转发微博。