http://p0.qhimg.com/t01f7ef32da341925d2.jpg

X86 Shellcode混淆

https://breakdev.org/x86-shellcode-obfuscation-part-1/

如何建立一个反钓鱼培训

http://blog.neweggbusiness.com/news/how-to-set-up-free-anti-phishing-user-training/

走DNS的VPN

http://www.shellntel.com/blog/2016/3/30/vpn-over-dns-1

.NET serialiception

https://blog.scrt.ch/2016/05/12/net-serialiception/

EmPyre:python版的Empire agent

http://www.harmj0y.net/blog/empyre/building-an-empyre-with-python/

xss 盲打代码

http://brutelogic.com.br/blog/blind-xss-code/

PowerShell Obfuscator:混淆powershell代码,躲避杀毒

http://www.powertheshell.com/powershell-obfuscator/

MS16-059:微软媒体中心.MCL文件处理导致RCE的poc

https://www.exploit-db.com/exploits/39805/

破解JunOS pulse vpn客户端保存的密码的注册表项

http://www.openwall.com/lists/john-users/2014/06/27/1

分析和检测基于flash的恶意软件

https://user.informatik.uni-goettingen.de/~krieck/docs/2015-gordon.pdf

使用Concolic进行多平台的二进制程序测试

http://publications.lib.chalmers.se/records/fulltext/228478/228478.pdf

锡兰商业银行银行被黑,5.8G数据泄露,包含181,000个文件

http://bit.do/b2gJQ

可以用来做nmap nse脚本开发的ide

http://halcyon-ide.org/

检测被入侵的活着虚假的Facebook账号

https://www.benthamsgaze.org/2016/05/12/on-the-hunt-for-facebooks-army-of-fake-likes/

利用SSRF漏洞接管APP服务器

https://blogs.mcafee.com/mcafee-labs/server-side-request-forgery-takes-advantage-vulnerable-app-servers/

文章原文链接:https://www.anquanke.com/post/id/83906