网络安全笔记
@tsecrecord
7.37K
subscribers
109
photos
3
videos
571
files
642
links
从零开始、持续积累、开放共享、共同成长(网络安全、AI方向)
Download Telegram
Join
网络安全笔记
7.37K subscribers
网络安全笔记
https://github.com/microsoft/krabsetw
GitHub
GitHub - microsoft/krabsetw: KrabsETW provides a modern C++ wrapper and a .NET wrapper around the low-level ETW trace consumption…
KrabsETW provides a modern C++ wrapper and a .NET wrapper around the low-level ETW trace consumption functions. - microsoft/krabsetw
网络安全笔记
第九届欧盟ATT&CK社区研讨会PPT.zip
41.1 MB
网络安全笔记
平安SRC线上沙龙第二期.zip
12.3 MB
👍
1
网络安全笔记
macOS文件管理指南.zip
77.8 MB
网络安全笔记
RSAC2022幻灯片.zip
219.5 MB
网络安全笔记
https://github.com/h3xduck/TripleCross
GitHub
GitHub - h3xduck/TripleCross: A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and…
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities. - h3xduck/TripleCross
网络安全笔记
ebpf_offensive_rootkit.pdf
5.4 MB
网络安全笔记
https://github.com/netero1010/RDPHijack-BOF
GitHub
GitHub - netero1010/RDPHijack-BOF: Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote…
Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking. - netero1010/RDPHijack-BOF
网络安全笔记
Aurora_Agent_EN_2021_Nov.pdf
1.5 MB
网络安全笔记
2022年在野0day
https://googleprojectzero.blogspot.com/2022/06/2022-0-day-in-wild-exploitationso-far.html
Blogspot
2022 0-day In-the-Wild Exploitation…so far
Posted by Maddie Stone, Google Project Zero This blog post is an overview of a talk, “ 0-day In-the-Wild Exploitation in 2022…so far”,...
网络安全笔记
由SH某事件引发的业务上云原则、安全家长制管理弊端等探讨,关于金融个人信息保护对客户的法定姓名展示讨论_|_总第154周.pdf
2.2 MB
网络安全笔记
#API安全
网络安全笔记
API安全技术与实战.epub
4.8 MB
网络安全笔记
https://github.com/Cyber-Guy1/API-SecurityEmpire
GitHub
GitHub - Cyber-Guy1/API-SecurityEmpire: API Security Project aims to present unique attack & defense methods in API Security field
API Security Project aims to present unique attack & defense methods in API Security field - Cyber-Guy1/API-SecurityEmpire
网络安全笔记
https://pre.empt.dev/posts/maelstrom-edr-kernel-callbacks-hooks-and-callstacks/
网络安全笔记
ATT&CKV11.3更新
网络安全笔记
https://attack.mitre.org/versions/v11/
网络安全笔记
使用 Chainsaw、Wazuh 代理和 Sigma 规则进行Windows 注册表取证分析
https://socfortress.medium.com/windows-registry-forensic-analysis-using-chainsaw-wazuh-agent-and-sigma-rules-40dbceba7201
Medium
Windows Registry Forensic Analysis using Chainsaw, Wazuh Agent and Sigma Rules
Introduction.
网络安全笔记
https://engineering.mercari.com/en/blog/entry/20220513-detection-engineering-and-soar-at-mercari/
Mercari
Detection Engineering and SOAR at Mercari
This article is part of the Security Tech Blog Series: Spring Cleaning for Security, brought to you by David from the Se
网络安全笔记
https://engineering.mercari.com/en/blog/entry/20220610-securing-the-sdlc-at-mercari-solutions-for-automated-code-scanning/
Mercari
Securing the SDLC at Mercari: Solutions for Automated Code Scanning
PrefaceThis blog is part of the Security Tech Blog Series, written by Shaokang from the Mercari Product Security Team.In
网络安全笔记