china   xuanwulab


How to find a new way to persist (1)
Behavioral analysis of lightweight malware through dynamic binary detection (1)
December 31, 2018 PHP 5.6.x security support will officially stop, about 62% of Internet sites will run unsupported PHP versions (1)
Detailed analysis of the Firefox JavaScript type confusion RCE vulnerability (CVE-2018-12386) (1)
Describe in detail what Proto-PTE is and how Windows VMM uses it (1)
Dexter - an extensible forensic framework (1)
Graphical TLS connection principle (1)
Execute macros directly in Office 2011 for Mac using the Sylk file format (1)
How do I attack the payment application of modern vending machines? (1)
The attacker uses a fake browser to update the MikroTik router that attacks the intranet (1)
Learn more about how the Linux configuration/build system works (1)
Unc0ver - jailbreak for iOS 11.0 - 11.4b3 (1)
Introduction to error in cache array state in iOS 12 Safari (1)
Multiple attacks on LDAP, Kerberos, and MSRPC in Active Directory (1)
HEVD exploit code for Windows 10 v1703 x64 (1)
Describe in detail how hackers implement actual credit card fraud attacks (1)
Wi-Fi call service security research and proof-of-concept attack (Paper) (1)
Introduction to low-power Bluetooth attacks (1)
Mining Windows GDI Vulnerabilities by Time Travelling Debugging (CVE-2018-8472) (1)
Obtaining system privileges through the vulnerability of DirectX Kernel, from Tencent Zhanyi Lab (1)
Introduction to Minikube's Remote Code Execution and Virtual Machine Escape Vulnerability (CVE-2018-1002103) (1)
'Introducing radare2 for humans',radare2 Introduction (1)
Metasploit's first anti-virus software escape module introduction (1)
Canada Cyber Centre and its partners (AUS, NZ, UK, USA) jointly released a comprehensive report on public hacking tools (1)
ICS Tactical Security Trends: An Analysis of the Most Common Security Risks from FireEye (1)
WebAssembly reverse static code analysis (1)
Research on Powershell Code Anti-aliasing Technology (1)
Build an application traffic interception system (1)
STACKLEAK What is the protection mechanism for improving Linux kernel security? (1)
Cisco Talos's technical analysis of GPlayed Android's new Trojan (1)