china   xuanwulab


Detailed Guide to Dirb Tools in Kali Linux (1)
Bitdefender GravityZone arbitrary code execution vulnerability disclosure (CVE-2018-8955) (1)
Problems and solutions caused by unaligned access in C/C++ (1)
Linux exploit development technology (user mode) tutorial (1)
A variety of ways to make Windwos slower in different operations Part 2 (1)
Inject code into the Windows protection process via COM Part 1, from Project Zero (1)
Introduction to Multiple Command Injection Vulnerabilities in Linksys ESeries (1)
Libssh 0.8.4 and 0.7.6 release security update to fix authentication bypass vulnerability (CVE-2018-10933) (1)
R2vmi - a Hypervisor-level debugger (1)
Modernizing IDA Pro: how to make processor module glitches go away , how to fix some of the issues in IDA (1)
Oracle releases security updates and vulnerabilities for multiple products (1)
Microsoft SQL Server Management Studio 17.9 / 18.0 Preview 4 XML Injection Vulnerability Exposure for XEL File Processing (CVE-2018-8527) (1)
How to simulate ARM IoT firmware from Hack.LU 2018 Conference (1)
VLC Media Player - MKV UAF Vulnerability Metasploit Utilization Module (CVE-2018-11529) (1)
Google Chrome 70 stable release, including multiple security updates (1)
Store arbitrary text data by hijacking HTML canvas and PNG images (1)
Deception and bait technology in Active Directory (1)
drAFL - AFL + DynamoRIO can have fuzzing Linu x binary files without source code (1)
Backdoor introduction for Oracle JDBC (1)
A detailed introduction to the Symbolic Emulator: Part 1 (1)
Automate the analysis of the heap allocator by using symbolic execution techniques to assess whether a patch can mitigate the attack (paper) (1)
'How to irregular cyber warfare', an introduction to the irregular network war strategy (1)
Mozilla's Firefox Application Update Service Security Audit Report (1)
In-depth analysis of Hancitor malicious samples: 1) (1)
Not a fair game, Dice2win fairness analysis (1)
Censys-subdomain-finder - a tool for collecting subdomains from Censys' certificate transparent logs (1)
Security analysis tool for proprietary car protocol CANalyzat0r (1)
Tcpbin - a tool for logging TCP Socket detailed logs (1)
ReconDog - Swiss Army Knife for detecting information (1)
Haxxmap - a tool for proxy IMAP services to get passwords (1)