网络安全笔记
@tsecrecord
7.37K
subscribers
109
photos
3
videos
571
files
642
links
从零开始、持续积累、开放共享、共同成长(网络安全、AI方向)
Download Telegram
Join
网络安全笔记
7.37K subscribers
网络安全笔记
RSAC2022幻灯片.zip
219.5 MB
网络安全笔记
https://github.com/h3xduck/TripleCross
GitHub
GitHub - h3xduck/TripleCross: A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and…
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities. - h3xduck/TripleCross
网络安全笔记
ebpf_offensive_rootkit.pdf
5.4 MB
网络安全笔记
https://github.com/netero1010/RDPHijack-BOF
GitHub
GitHub - netero1010/RDPHijack-BOF: Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote…
Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking. - netero1010/RDPHijack-BOF
网络安全笔记
Aurora_Agent_EN_2021_Nov.pdf
1.5 MB
网络安全笔记
2022年在野0day
https://googleprojectzero.blogspot.com/2022/06/2022-0-day-in-wild-exploitationso-far.html
Blogspot
2022 0-day In-the-Wild Exploitation…so far
Posted by Maddie Stone, Google Project Zero This blog post is an overview of a talk, “ 0-day In-the-Wild Exploitation in 2022…so far”,...
网络安全笔记
由SH某事件引发的业务上云原则、安全家长制管理弊端等探讨,关于金融个人信息保护对客户的法定姓名展示讨论_|_总第154周.pdf
2.2 MB
网络安全笔记
#API安全
网络安全笔记
API安全技术与实战.epub
4.8 MB
网络安全笔记
https://github.com/Cyber-Guy1/API-SecurityEmpire
GitHub
GitHub - Cyber-Guy1/API-SecurityEmpire: API Security Project aims to present unique attack & defense methods in API Security field
API Security Project aims to present unique attack & defense methods in API Security field - Cyber-Guy1/API-SecurityEmpire
网络安全笔记
https://pre.empt.dev/posts/maelstrom-edr-kernel-callbacks-hooks-and-callstacks/
网络安全笔记
ATT&CKV11.3更新
网络安全笔记
https://attack.mitre.org/versions/v11/
网络安全笔记
使用 Chainsaw、Wazuh 代理和 Sigma 规则进行Windows 注册表取证分析
https://socfortress.medium.com/windows-registry-forensic-analysis-using-chainsaw-wazuh-agent-and-sigma-rules-40dbceba7201
Medium
Windows Registry Forensic Analysis using Chainsaw, Wazuh Agent and Sigma Rules
Introduction.
网络安全笔记
https://engineering.mercari.com/en/blog/entry/20220513-detection-engineering-and-soar-at-mercari/
Mercari
Detection Engineering and SOAR at Mercari
This article is part of the Security Tech Blog Series: Spring Cleaning for Security, brought to you by David from the Se
网络安全笔记
https://engineering.mercari.com/en/blog/entry/20220610-securing-the-sdlc-at-mercari-solutions-for-automated-code-scanning/
Mercari
Securing the SDLC at Mercari: Solutions for Automated Code Scanning
PrefaceThis blog is part of the Security Tech Blog Series, written by Shaokang from the Mercari Product Security Team.In
网络安全笔记
网络安全笔记
When eBPF meets TLS.pdf
1.5 MB
👍
1
网络安全笔记
构建一个简单的蜜罐:
https://medium.com/evilcouncil/building-a-simple-http-honeypot-3cd9540078c4#id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6IjFiZDY4NWY1ZThmYzYyZDc1ODcwNWMxZWIwZThhNzUyNGM0NzU5NzUiLCJ0eXAiOiJKV1QifQ.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.Dn6jqTOMhrGpxGdONEQ1aywUCV-Z0LUWSwt6qoK4cNQJd0ZtkUoCOvYInLF_UXkRPz5nTWt5QNc220yFI9mihseXe1SU2zkoPgdiBfVN_pROxlmL7VQc6XAztaZK9IYx_PFfsJosOi0zvxHLYnB_14iD-Nkb_3RGMrw4IadOIRbXxoURJ9e2lfgo5JemWUjPjxHumk1QNVi5coFWtBlXUviHyNoZa14wlIoqiWGc6-NeyFbPOmnLnPxEcI0l4-C6ZJEpFVUTMpZb8iwNVXE9ZUT-7TN_Qhxh5_JRwxeo4D0VDkRZZa4OL4ofI1yqf56r47J6MnzkCFDs2OL0ECKwTQ
Medium
Building a Simple HTTP Honeypot
Honeypots are a useful tool to track scanners and new attack vectors. There are plenty of existing honeypot solutions readily available…
👍
2
网络安全笔记
兽爷丨祥子决定不拉车了
https://m.posts.careerengine.us/p/62ce5b9437a1d50b76f4de97
👍
1
网络安全笔记
https://fourcore.io/blogs/how-a-windows-process-is-created-part-2
FourCore
Genesis - The Birth of a Windows Process (Part 2)
What happens when you run an executable on your Windows machine? In this second and final part of the series, we will go through the exact flow CreateProcess carries out to launch a process on Windows.
👍
1