网络安全笔记
@tsecrecord
7.38K
subscribers
109
photos
3
videos
571
files
642
links
从零开始、持续积累、开放共享、共同成长(网络安全、AI方向)
Download Telegram
Join
网络安全笔记
7.38K subscribers
网络安全笔记
https://youtu.be/9fqDUrJWR9o
YouTube
You need to take control
Stop making excuses.
// David Bombal Memberships //
Free: https://courses.davidbombal.com/p/david-bombal-free-courses
All-Inclusive Membership (includes Boson ExSim and NetSim): https://courses.davidbombal.com/p/all-inclusive-subscription-course
// FREE…
网络安全笔记
https://youtu.be/EVBCoV8lpWc
内存狩猎
YouTube
Taking Hunting to the Next Level: Hunting in Memory - SANS Threat Hunting Summit 2017
The vast majority of threat hunting takes place on easily visible and accessible system artifacts. These include log entries, network data, command line histories, persistence locations, and many other locations on a system or in the environment. Thanks to…
👍
1
网络安全笔记
https://blog.criminalip.io/2022/06/05/criminal-ip-analysis-report-on-zero-day-vulnerability-in-atlassian-confluence/
CIP Blog
Criminal IP Analysis Report on Zero-Day Vulnerability in Atlassian Confluence | CIP Blog
According to Volexity 1), a cybersecurity company based in Washington, DC, a webshell was discovered in the Atlassian Confluence server during an incident response investigation. Initially believed to be an issue specific to Atlassian Confluence, Volexity…
网络安全笔记
https://www.intezer.com/blog/research/new-linux-threat-symbiote/
Intezer
Symbiote: A New, Nearly-Impossible-to-Detect Linux Threat
Symbiote is a new Linux
®
malware we discovered that acts in a parasitic nature, infecting other running processes to inflict damage on machines.
网络安全笔记
《主机安全能力建设指南》.pdf
1.2 MB
网络安全笔记
一件事最可怕的时刻,总是在你开始做之前。
网络安全笔记
https://telegra.ph/weekly-210-06-17
Telegraph
科技爱好者周刊(第 210 期):为什么软件变得复杂
这里记录每周值得分享的科技内容,周五发布。 本杂志开源(GitHub: ruanyf/weekly),欢迎提交 issue,投稿或推荐科技内容。 周刊讨论区的帖子《谁在招人?》,提供大量程序员就业信息,欢迎访问或发布工作/实习岗位。 封面图 中国科学家绘制的世界首幅、最详细的1:250万月球全月地质图发布,统计出月球包含12341个撞击坑、17种岩石、14类地质构造。(via) 本周话题:为什么软件变得复杂 我一直认为,软件开发的最大关注点,就是避免复杂性。软件设计越简单越好,太多的程序员以构建复杂的解决方案为荣。…
网络安全笔记
网传学习通撞库导致大量qq号被盗。抓紧改密码
网络安全笔记
WarCon22 - Modern Initial Access and Evasion Tactics.pdf
5.9 MB
网络安全笔记
https://github.com/microsoft/krabsetw
GitHub
GitHub - microsoft/krabsetw: KrabsETW provides a modern C++ wrapper and a .NET wrapper around the low-level ETW trace consumption…
KrabsETW provides a modern C++ wrapper and a .NET wrapper around the low-level ETW trace consumption functions. - microsoft/krabsetw
网络安全笔记
第九届欧盟ATT&CK社区研讨会PPT.zip
41.1 MB
网络安全笔记
平安SRC线上沙龙第二期.zip
12.3 MB
👍
1
网络安全笔记
macOS文件管理指南.zip
77.8 MB
网络安全笔记
RSAC2022幻灯片.zip
219.5 MB
网络安全笔记
https://github.com/h3xduck/TripleCross
GitHub
GitHub - h3xduck/TripleCross: A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and…
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities. - h3xduck/TripleCross
网络安全笔记
ebpf_offensive_rootkit.pdf
5.4 MB
网络安全笔记
https://github.com/netero1010/RDPHijack-BOF
GitHub
GitHub - netero1010/RDPHijack-BOF: Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote…
Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking. - netero1010/RDPHijack-BOF
网络安全笔记
Aurora_Agent_EN_2021_Nov.pdf
1.5 MB
网络安全笔记
2022年在野0day
https://googleprojectzero.blogspot.com/2022/06/2022-0-day-in-wild-exploitationso-far.html
Blogspot
2022 0-day In-the-Wild Exploitation…so far
Posted by Maddie Stone, Google Project Zero This blog post is an overview of a talk, “ 0-day In-the-Wild Exploitation in 2022…so far”,...
网络安全笔记
由SH某事件引发的业务上云原则、安全家长制管理弊端等探讨,关于金融个人信息保护对客户的法定姓名展示讨论_|_总第154周.pdf
2.2 MB
网络安全笔记
#API安全