一个硬件安全工程师眼中的Meltdown
https://media.weibo.cn/article?id=2309404193352517074988
Meltdown variant 3a的PoC(在用户态dump出ARM系统寄存器)
https://github.com/lgeek/spec_poc_arm
In-Spectre-Meltdown:检测Meltdown & Spectre漏洞的工具
https://github.com/Viralmaniar/In-Spectre-Meltdown
shimit:实现Golden SAML攻击的工具
https://github.com/cyberark/shimit
IPFS—http的终极杀手
https://weibo.com/ttarticle/p/show?id=2309404179043187580696
文件上传漏洞扫描及利用工具
https://github.com/almandin/fuxploider
Setting up a DNS Firewall on steroids
https://navytitanium.github.io/DNSMasterChef/
Very vulnerable ARM application (CTF风格的利用教程)
https://github.com/bkerler/exploit_me
Realmode Assembly – Writing bootable stuff – Part 6
https://0x00sec.org/t/realmode-assembly-writing-bootable-stuff-part-6/4915
Emotet Grinch又回归了
https://blog.minerva-labs.com/the-emotet-grinch-is-back
恶意软件反编译和脱壳
https://0x00sec.org/t/malware-decompiling-and-unpacking-loda-keylogger/4896
作者:安全客小编2
如若转载,请注明出处: https://www.anquanke.com/post/id/93881