Safety technology
[vulnerability analysis] MSSQL implements command execution through agent jobs (Chinese) http://www.button.com/89870.html
[web security] binproxy introduction http://www.motoin.com/89877.html
[vulnerability analysis] vulnerability analysis and improvement of shadowsocks protocol https://github.com/breakwa11/shadowlocks-rss/issues/38
[web security] [preliminary code audit] beescms v4.0_rsql injection https://www.ohlige.cn/php/beescms_sqli.html
[forensic analysis] mailsniper: a tool for searching every user's email for sensitive data http://www.blackhillsinfosec.com/? P = 5296
[O & M security] wyproxy: http / HTTPS, Socks5 proxy server, saved to the background database https://github.com/ring04h/wyproxy
[vulnerability analysis] application and analysis of winafl: an intelligent fuzzy testing tool http://blog.jowto.com/? P = 150
[web security] several ways to attack SQL server without password http://www.button.com/89825.html
[web security] cobalt strike 3.5 release enhanced Linux post penetration (with cracked) http://www.motoin.com/89862.html
[data mining] tinyflow: build your own deep learning system in 2K lineshttps://github.com/tqchen/tinyflow
Chen Rd
[web security] CSRF protection bypass on any Django powered site via Google Analytics https://hackeron.com/reports/26647
[malicious analysis] use Netshell to execute malicious DLLs to realize host persistence control http://www.motoin.com/89905.html
[vulnerability analysis] Mozilla security / fuzzy data: fuzzy resources for feeding variable Fuzzers with inphttps://github.com/mozilla security/fuzzy data
0 × Rd
& srcid = 0928ai1xd4en5qtiworjgc1 & from = timelin
[web security] cloud knowledge base online search platform http://cb.drops.wiki/
[vulnerability analysis] practice: reverse engineering challengeshttps://challenges.re/
[malicious analysis] bypass techniques of virtual machine detection found in malicious documents http://www.button.com/89888.html
Chen Rd
[malicious analysis] project apt: how to build an ICS network and have fun at the same timehttp://blog.talosintel.com/2016/09/apt-kegerator.html × more
[forensic analysis] real time crime forecasting challenge http://www.nij.gov/funding/pages/fy16-crime-forecasting-challenge.aspx
[operation and maintenance security] DDoS attack status and defense mechanism analysis http://bobao.360.cn/news/detail/3592.html
[data mining] principle and implementation of simhash algorithm http://yanyiwu.com/work/2014/01/30/simhash-shi-xian-xiang-jie.html
[web security] dawnscanner: static analysis security scanner for ruby applicationshttps://github.com/thesp0ge/dawnscanner
[other] Research on security products and manufacturers http://www.youxia.org/china-security-vender-list.html
[web security] ponnhub storage Cross Station worth 1500 US dollars http://www.motoin.com/89795.html
[malicious analysis] Lucky Strike: an evil office document generator http://www.shellntel.com/blog/2016/9/13/lucky strike-a-database-backed-evil-macro-generator
[vulnerability analysis] book: reverse engineering for beginners https://beginners.re/re4b-en.pdf