zoukankan      html  css  js  c++  java
  • 资料收集

    1. https://github.com/1u4nx/Exploit-Exercises-Nebula
    2. c内存管理:http://www.inf.udec.cl/~leo/teoX.pdf
    3. 用Windbg和Python进行堆跟踪:http://www.freebuf.com/articles/system/103816.html
    4. Python和cdb结合案例(Python编写调试器):http://www.freebuf.com/sectool/89001.html
    5. 绕过security cookie的栈利用:https://www.zerodayinitiative.com/blog/2017/8/9/the-blue-frost-security-challenge-an-exploitation-journey-for-fun-and-free-drinks
    6. https://www.zerodayinitiative.com/blog/2017/8/1/pythonizing-the-vmware-backdoor
    7. Debugee in QEMU:http://bobao.360.cn/learning/detail/4265.html
    8. Digtool: A Virtualization-Based Framework for Detecting Kernel Vulnerabilities:https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-pan.pdf:结合虚拟化技术实现客户机系统调用/线程调度/内存访问监控,可以发现Unprobe/OOB/UAF/TOCTTOU漏洞。
    9. Qemu安全分析,360 in hitb:https://gsec.hitb.org/materials/sg2017/D1%20-%20Ashley%20Shen%20and%20Moonbeom%20Park%20-%20A%20Deep%20Dive%20into%20the%20Digital%20Weapons%20of%20the%20North%20Korean%20Cyber%20Army.pdf
    10. https://comsecuris.com/blog/posts/vmware_vgpu_shader_vulnerabilities/

    工具

    https://www.ctftools.com/down/

    Fuzzing Apache httpd server with American Fuzzy Lop + persistent mode

    https://sensepost.com/blog/2017/fuzzing-apache-httpd-server-with-american-fuzzy-lop-+-persistent-mode/

    vulscan - Vulnerability Scanning with Nmap:https://github.com/scipag/vulscan

    Bytecode Viewer - A Java 8 Jar & Android Apk Reverse Engineering Suite (Decompiler, Editor, Debugger & More):http://www.kitploit.com/2017/08/bytecode-viewer-java-8-jar-android-apk.html?m=1

    MTuner is a C/C++ memory profiler and memory leak finder for Windows:https://github.com/milostosic/MTuner

  • 相关阅读:
    如何用Django建立一个后台CRM系统02
    如何用Django建立一个后台CRM系统01
    多线程的UDP聊天器
    文件被导入时,能够直接执行的代码不需要被执行
    主动抛出异常
    python异常
    初始化动作只执行一次
    单例设计模式代码实现
    类的继承
    多态的案例演示
  • 原文地址:https://www.cnblogs.com/studyskill/p/6524439.html
Copyright © 2011-2022 走看看