X86 Shellcode混淆
https://breakdev.org/x86-shellcode-obfuscation-part-1/
如何建立一个反钓鱼培训
http://blog.neweggbusiness.com/news/how-to-set-up-free-anti-phishing-user-training/
走DNS的VPN
http://www.shellntel.com/blog/2016/3/30/vpn-over-dns-1
.NET serialiception
https://blog.scrt.ch/2016/05/12/net-serialiception/
EmPyre:python版的Empire agent
http://www.harmj0y.net/blog/empyre/building-an-empyre-with-python/
xss 盲打代码
http://brutelogic.com.br/blog/blind-xss-code/
PowerShell Obfuscator:混淆powershell代码,躲避杀毒
http://www.powertheshell.com/powershell-obfuscator/
MS16-059:微软媒体中心.MCL文件处理导致RCE的poc
https://www.exploit-db.com/exploits/39805/
破解JunOS pulse vpn客户端保存的密码的注册表项
http://www.openwall.com/lists/john-users/2014/06/27/1
分析和检测基于flash的恶意软件
https://user.informatik.uni-goettingen.de/~krieck/docs/2015-gordon.pdf
使用Concolic进行多平台的二进制程序测试
http://publications.lib.chalmers.se/records/fulltext/228478/228478.pdf
锡兰商业银行银行被黑,5.8G数据泄露,包含181,000个文件
可以用来做nmap nse脚本开发的ide
检测被入侵的活着虚假的Facebook账号
https://www.benthamsgaze.org/2016/05/12/on-the-hunt-for-facebooks-army-of-fake-likes/
利用SSRF漏洞接管APP服务器
文章原文链接:https://www.anquanke.com/post/id/83906