unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Detecting Mimikatz with Busylight
In 2015 Raphael Mudge released an article [1] that detailed that versions of mimikatz released a...
2022-9-30 16:0:0 | 阅读: 22 |
收藏
|
research.nccgroup.com
mimikatz
busylight
hid
github
umdf
Whitepaper – Project Triforce: Run AFL On Everything (2017)
Six years ago, NCC Group researchers Tim Newsham and Jesse Burns released...
2022-9-28 03:28:27 | 阅读: 22 |
收藏
|
research.nccgroup.com
triforceafl
jennifer
fuzzer
fernick
fuzzy
Tool Release – Project Kubescout: Adding Kubernetes Support to Scout Suite
tl;dr You can now have Scout Suite scan notonly your cloud environments, but your Kubernetes cl...
2022-9-23 01:41:29 | 阅读: 24 |
收藏
|
research.nccgroup.com
scout
kubernetes
scoutsuite
kubescout
virtualenv
Technical Advisory – Multiple Vulnerabilities in Juplink RX4-1800 WiFi Router (CVE-2022-37413, CVE-2022-37414)
Juplink’s RX4-1800 WiFi router was found to have multiple vulnerabilities...
2022-9-22 23:0:0 | 阅读: 41 |
收藏
|
research.nccgroup.com
juplink
1800
attacker
rx4
A Guide to Improving Security Through Infrastructure-as-Code
Modern organizations evolved and took the next step when they became digital. Organizations...
2022-9-19 18:0:0 | 阅读: 22 |
收藏
|
research.nccgroup.com
cloud
security
github
microsoft
iac
Tool Release – ScoutSuite 5.12.0
We are excited to announce the release of a new version of our open-source...
2022-9-14 01:32:41 | 阅读: 34 |
收藏
|
research.nccgroup.com
cloud
gcp
monitoring
scout
scoutsuite
Public Report – Penumbra Labs Decaf377 Implementation and Poseidon Parameter Selection Review
During the summer of 2022, Penumbra Labs, Inc. engaged NCC Group to conduc...
2022-9-13 04:13:15 | 阅读: 15 |
收藏
|
research.nccgroup.com
fernick
jennifer
poseidon
decaf377
377
Tool Release – Monkey365
Monkey 365 is an Open Source security tool that can be used to easily...
2022-9-8 02:27:26 | 阅读: 41 |
收藏
|
research.nccgroup.com
monkey365
security
monkey
unblock
microsoft
Sharkbot is back in Google Play
Authored by Alberto Segura (main author) and Mike Stokkel (co-author)Editor’s note: This...
2022-9-7 02:32:7 | 阅读: 22 |
收藏
|
research.nccgroup.com
sharkbot
c2
victim
Constant-Time Data Processing At a Secret Offset, Privacy and QUIC
NCC Group Cryptography Services team assessed security aspects of several implementations of...
2022-9-5 21:0:0 | 阅读: 21 |
收藏
|
research.nccgroup.com
ct
reveal
declaim
timing
usize
There’s Another Hole In Your SoC: Unisoc ROM Vulnerabilities
UNISOC (formerly Spreadtrum) is a rapidly growing semiconductor company that is nowadays focused...
2022-9-3 02:37:37 | 阅读: 137 |
收藏
|
research.nccgroup.com
bootrom
payload
unisoc
pubkey
sig
Conference Talks – September/October 2022
Throughout September and October, members of NCC Group will be presenting...
2022-9-1 23:29:59 | 阅读: 20 |
收藏
|
research.nccgroup.com
mimikatz
security
jenkins
bucsay
SETTLERS OF NETLINK: Exploiting a limited UAF in nf_tables (CVE-2022-32250)
Introductionnetlink and nf_tablesOverviewSetsExpressionsSet ExpressionsStateful Expr...
2022-9-1 16:56:41 | 阅读: 28 |
收藏
|
research.nccgroup.com
nf
elem
netfilter
dynset
payload
Writing FreeBSD Kernel Modules in Rust
At present all major operating system kernels are written in C/C++,languages which provide no o...
2022-8-31 22:51:28 | 阅读: 22 |
收藏
|
research.nccgroup.com
cdev
memory
debugln
unload
NCC Con Europe 2022 – Pwn2Own Austin Presentations
Cedric Halbronn, Aaron Adams, Alex Plaskett and Catalin Visinescu presente...
2022-8-30 18:22:23 | 阅读: 23 |
收藏
|
research.nccgroup.com
pwn2own
contest
printer
exploited
internals
Tool Release – JWT-Reauth
When testing APIs with short-lived authentication tokens, it can be frustr...
2022-8-26 00:20:19 | 阅读: 40 |
收藏
|
research.nccgroup.com
reauth
burp
proxy
github
Back in Black: Unlocking a LockBit 3.0 Ransomware Attack
Authored by: Ross Inman (@rdi_x64)tl;drThis post explores some...
2022-8-19 22:30:21 | 阅读: 92 |
收藏
|
research.nccgroup.com
windows
cobalt
ransomware
lockbit
Wheel of Fortune Outcome Prediction – Taking the Luck out of Gambling
Authored by: Jesús Miguel Calderón MarínIntroductionTwo years ago I carried out research...
2022-8-17 03:50:20 | 阅读: 37 |
收藏
|
research.nccgroup.com
wheel
betting
winning
segments
positions
Detecting DNS implants: Old kitten, new tricks – A Saitama Case Study
Max Groot & Ruud van LuijkTL;DRA recently uncovered malware sample dubbed ‘Saitama’ was...
2022-8-11 23:20:24 | 阅读: 26 |
收藏
|
research.nccgroup.com
saitama
c2
client
tunnelling
fox
Implementing the Castryck-Decru SIDH Key Recovery Attack in SageMath
IntroductionLast weekend (July 30th) a truly incredible piece of mathematical/cryptanalysis...
2022-8-9 05:44:48 | 阅读: 35 |
收藏
|
research.nccgroup.com
sagemath
sidh
isogeny
magma
isogenies
Previous
8
9
10
11
12
13
14
15
Next