Web安全
利用不同技术发现多种XSS漏洞实例与分析
https://mp.weixin.qq.com/s/tBqZAIqf3hi7Ld0iYrIIoA
结合SQL注入与有效载荷探测RCE漏洞方法探讨
https://mp.weixin.qq.com/s/Ykdu7drNgh6janzEL1QK7g
泛微e-office 11.0通过SQL注入实现远程代码执行漏洞分析
https://mp.weixin.qq.com/s/UB2N7FhRSzda3v7RvxRDAQ
ASP.NET HttpModule机制下的内存马构建与事件绑定技术探讨
https://mp.weixin.qq.com/s/SIvWBhq0TEPnFf-Ym3zEsA
终端对抗
Hannibal:基于位置无关C语言开发的x64 Windows C2代理程序
https://github.com/silentwarble/Hannibal
https://silentwarble.github.io/posts/making-monsters-1/
shellcode-template:基于cmkr的Win32 shellcode模板
https://github.com/realoriginal/shellcode-template
WinDepends:程序依赖分析工具
https://github.com/hfiref0x/WinDepends
UAC绕过技术:模拟受信任文件夹
https://mp.weixin.qq.com/s/x6j15V6TuqRlWg6FIiFunQ
PanGP_Extractor:从Palo Alto GlobalProtect提取明文凭证
https://github.com/t3hbb/PanGP_Extractorhttps://shells.systems/extracting-plaintext-credentials-from-palo-alto-global-protect/
绕过noexec分区执行代码的技术探讨
https://mp.weixin.qq.com/s/cIo8ZpUWVqNLbfXX4dRnKA
漏洞相关
Windows 11 ksthunk.sys驱动整数溢出提权漏洞分析
https://ssd-disclosure.com/ssd-advisory-ksthunk-sys-integer-overflow-pe/
Linux内核堆漏洞利用与提权技术探讨
https://mp.weixin.qq.com/s/0SopDEch0N_fZmyTMkRchA
Wazuh安全软件的EDR漏洞分析与利用
https://neodyme.io/en/blog/wazuh_rce
https://gitlab.com/badsectorlabs/iscariot-suite
ClipSp驱动程序中发现的八个安全漏洞分析
https://blog.talosintelligence.com/finding-vulnerabilities-in-clipsp-the-driver-at-the-core-of-windows-client-license-platform/
7-Zip Zstandard解压整数下溢远程代码执行漏洞分析
https://zerodayinitiative.com
CVE-2024-52940:AnyDesk信息泄露漏洞复现分析
https://mp.weixin.qq.com/s/6TsGtQaC2i1OSmH8u3q22w
CVE-2024-46938:Sitecore 8.x-10.x命令执行漏洞分析及利用
https://blog.scrt.ch/2024/11/25/arbitrary-web-root-file-read-in-sitecore-before-v10-4-0-rev-010422/
https://www.assetnote.io/resources/research/leveraging-an-order-of-operations-bug-to-achieve-rce-in-sitecore-8-x---10-x
https://mp.weixin.qq.com/s/9tvVfCpW-eBi_n-mSQTTOw
云安全
BARK:用于攻击Azure Key Vault的BloodHound攻击研究工具
https://github.com/BloodHoundAD/BARK
人工智能和安全
大型语言模型及其系统的安全性风险与对策分析
https://www.redhat.com/en/blog/llm-and-llm-system-risks-and-safeguards
RTL-Breaker: 针对基于LLM的 HDL 代码生成后门攻击
其他
IMMI概念推动内核内存安全漏洞检测新方法研究
https://www.usenix.org/system/files/usenixsecurity24-liu-dinghao-detecting.pdf
https://www.usenix.org/system/files/usenixsecurity24_slides-liu-dinghao-detecting.pdf
CISA对美国关键基础设施进行红队评估以增强网络韧性
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-326a
DefenderYara:提取自Windows Defender的Yara规则
https://github.com/roadwy/DefenderYara
M01N Team公众号
聚焦高级攻防对抗热点技术
绿盟科技蓝军技术研究战队
官方攻防交流群
网络安全一手资讯
攻防技术答疑解惑
扫码加好友即可拉群
往期推荐