网络安全笔记
@tsecrecord
7.43K
subscribers
109
photos
3
videos
571
files
642
links
从零开始、持续积累、开放共享、共同成长(网络安全、AI方向)
Download Telegram
Join
网络安全笔记
7.43K subscribers
网络安全笔记
Live stream started
网络安全笔记
Live stream finished (11 seconds)
网络安全笔记
globant.rar.torrent
718.8 KB
网络安全笔记
https://github.com/mcdulltii/SpringShell_0-day
GitHub
GitHub - mcdulltii/SpringShell_0-day: Spring Core RCE 0-day Vulnerability (https://share.vx-underground.org/)
Spring Core RCE 0-day Vulnerability (https://share.vx-underground.org/) - mcdulltii/SpringShell_0-day
网络安全笔记
https://github.com/pqlx/CVE-2022-1015
GitHub
GitHub - pqlx/CVE-2022-1015: Local privilege escalation PoC for Linux kernel CVE-2022-1015
Local privilege escalation PoC for Linux kernel CVE-2022-1015 - pqlx/CVE-2022-1015
网络安全笔记
2022年unit42恶意软件威胁报告
网络安全笔记
2022-unit42-ransomware-threat-report-final.pdf
1.6 MB
网络安全笔记
#红队工具
通过azure cloud 传输c2流量
网络安全笔记
https://github.com/Flangvik/CobaltBus
GitHub
GitHub - Flangvik/CobaltBus: Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus
Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus - Flangvik/CobaltBus
网络安全笔记
The Threat Hunter’s Handbook.pdf
2.9 MB
网络安全笔记
发一下吧,虽然大部分人是读不明白的
网络安全笔记
Linux_Kernel_Debugging_Leverage_open_source_tools_and_advanced_techniques.epub
10.6 MB
网络安全笔记
https://github.com/FULLSHADE/WindowsExploitationResources
GitHub
GitHub - FULLSHADE/WindowsExploitationResources: Resources for Windows exploit development
Resources for Windows exploit development. Contribute to FULLSHADE/WindowsExploitationResources development by creating an account on GitHub.
网络安全笔记
深入理解sysmon
#蓝队工具
https://rootdse.org/posts/understanding-sysmon-events/
RootDSE
Understanding Sysmon Events using SysmonSimulator
Introduction
网络安全笔记
SysmonSimulator
#蓝队工具
模拟恶意软件攻击行为
https://github.com/ScarredMonk/SysmonSimulator
GitHub
GitHub - ScarredMonk/SysmonSimulator: Sysmon event simulation utility which can be used to simulate the attacks to generate the…
Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detections and correlation rules by Blue teams. - ScarredMonk/SysmonS...
网络安全笔记
Suricata官方初级课程.zip
350.8 MB
网络安全笔记
Suricata培训课程
👍
2
网络安全笔记
https://m.bilibili.com/video/BV1RP4y1K7RM?share_source=weixin_web&share_times=1
Bilibili
什么是XDR、EDR和MDR?一个视频全部了解_哔哩哔哩_bilibili
https://www.youtube.com/watch?v=SFFdbeogLFc非常优秀的网络安全相关专业知识科普视频,欢迎关注,持续推送。, 视频播放量 3643、弹幕量 2、点赞数 33、投硬币枚数 6、收藏人数 77、转发人数 25, 视频作者 安全思维实验室, 作者简介 专注网络安全科普,提升网络安全意识。,相关视频:黑客最常用且简单的技术—密码暴力破解!(网络安全),【2025】奇安信网络安全内部培训入职教程200集全,网络安全就业/兼职副业/考证/护网行动等必看!,我让AI当黑客!基于…
网络安全笔记
LAPSUSS TTP 和 MITRE ATT&CK 映射
网络安全笔记
https://mp.weixin.qq.com/s/1pJo_b979rqqKP9ldC13Vg
Weixin Official Accounts Platform
ATT&CK 变成安全“元宇宙”?
从某种意义来看,ATT\x26amp;CK框架包含了太多的安全场景,从“元宇宙”的现实表达和普遍包容性这个点上来看,ATT\x26amp;CK可能是安全领域的“元宇宙”层面的存在。
网络安全笔记
https://www.microsoft.com/security/blog/2022/04/13/dismantling-zloader-how-malicious-ads-led-to-disabled-security-tools-and-ransomware/
Microsoft News
Dismantling ZLoader: How malicious ads led to disabled security tools and ransomware
Microsoft took action against the ZLoader trojan by working with telecommunications providers around the world to disrupt key ZLoader infrastructure. In this blog, we detail the various characteristics for identifying ZLoader activity, including its associated…