Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Security: goolum/security

Security

security.md

国外最新安全推文整理

Read, write, and execute kernel-mode code from the command prompt(对 ring0 读写执行的工具)

https://github.com/ionescu007/r0ak

Kernel memory taint tracking to detect disclosure of uninitialized memory(内核信息泄露检测)

https://github.com/google/bochspwn-reloaded

TrueType and OpenType font fuzzing toolset(字体 fuzzing)

https://github.com/google/BrokenType

Monitoring and instrumenting API calls on Windows(hook 库更新,支持 ARM64)

https://github.com/Microsoft/Detours

HyperPlatform is an Intel VT-x based hypervisor(基于 Intel VT-x 的 hypervisor)

https://github.com/tandasat/HyperPlatform

Hardware backdoors in some x86 CPUs(硬件后门)

https://github.com/xoreaxeaxeax/rosenbridge

Resources related to Industrial Control System (ICS) security(工控安全)

https://github.com/hslatman/awesome-industrial-control-system-security

Original and decompiled files of TRISIS/TRITON/HATMAN malware(工控恶意样本)

https://github.com/ICSrepo/TRISIS-TRITON-HATMAN

HITB GSEC 2018 Slides

https://gsec.hitb.org/materials/sg2018/

Linux Security Summit North America 2018 Slides

https://events.linuxfoundation.org/events/linux-security-summit-north-america-2018/program/slides/

From Compiler Optimization to Code Execution - VirtualBox VM Escape(VBox CVE-2018-2844 漏洞)

https://www.voidsecurity.in/2018/08/from-compiler-optimization-to-code.html

Hyper-V HyperClear Mitigation for L1 Terminal Fault(L1TF 漏洞防护措施)

https://blogs.technet.microsoft.com/virtualization/2018/08/14/hyper-v-hyperclear/

Hypervisor From Scratch – Part 1: Basic Concepts & Configure Testing Environment(基于硬件的虚拟化)

https://rayanfam.com/topics/hypervisor-from-scratch-part-1/

Floating-Poison Math in Chakra(Chakra CVE-2018-0953 漏洞)

https://www.zerodayinitiative.com/blog/2018/8/22/floating-poison-math-in-chakra

The Problems and Promise of WebAssembly(WebAssembly 的特性及攻击面)

https://googleprojectzero.blogspot.com/2018/08/the-problems-and-promise-of-webassembly.html

A Modern History of Offensive Security Research, Slides(漏洞利用技术的发展)

https://docs.google.com/presentation/d/19HfkIojyLE8L8X8aZT-lJont96JqIg4PqEhb2juIK2c/

Block Oriented Programming: Automating Data-Only Attacks(CFI 保护绕过)

http://nebelwelt.net/publications/files/18CCS.pdf

Find which process is using the microphone, from a kernel-mode driver(查找使用麦克风的进程)

https://gracefulbits.com/2018/08/13/find-which-process-is-using-the-microphone-from-a-kernel-mode-driver/

The 35th International Conference on Machine Learning, papers(ICML 2018 的论文)

https://icml.cc/Conferences/2018/Schedule?type=Poster

Active Directory Security Presentations(有关 Active Directory 的资料)

https://adsecurity.org/?page_id=1352

Bokbot: The (re)birth of a banker(Bokbot 溯源)

https://blog.fox-it.com/2018/08/09/bokbot-the-rebirth-of-a-banker/

Analysis of an unusual Turla backdoor(Turla Outlook 后门分析)

https://www.welivesecurity.com/wp-content/uploads/2018/08/Eset-Turla-Outlook-Backdoor.pdf

BIOS Boots What? Finding Evil in Boot Code at Scale(Bootkit 检测)

https://www.fireeye.com/blog/threat-research/2018/08/bios-boots-what-finding-evil-in-boot-code-at-scale.html

Remote UEFI Firmware Attacks(UEFI 固件安全)

https://blog.eclypsium.com/2018/08/27/uefi-remote-attacks

There aren't any published security advisories