cnbird's blog

cnbird's blog

ruxcon slide

https://ruxcon.org.au/slides/

2014-10-31 22:26:55

阅读数 611

评论数 0

内核hook工具

systemtap

2014-10-31 13:50:07

阅读数 691

评论数 0

Managing and Exploring Malware Samples with Viper

Keeping track of all the samples on your plate can become cumbersome and at times, next to impossible; that's where projects like Viper come in. Vi...

2014-10-31 11:28:01

阅读数 688

评论数 0

Drupal 7.31 GetShell via /includes/database/database.inc SQL Injection Exploit

http://www.beebeeto.com/pdb/poc-2014-0100/

2014-10-29 15:28:21

阅读数 1829

评论数 0

Uncover Security Design Flaws Using The STRIDE Approach

http://msdn.microsoft.com/en-us/magazine/cc163519.aspx This article discusses: The importance of threat modeling How to model a sy...

2014-10-29 13:04:49

阅读数 2478

评论数 0

威胁建模工具

http://www.youtube.com/results?search_query=threat+modeling+tool+2014+

2014-10-27 14:07:44

阅读数 2078

评论数 0

二进制比对工具

http://corelabs.coresecurity.com/index.php?module=Wiki&action=view&type=tool&name=turbodiff

2014-10-27 10:13:38

阅读数 1321

评论数 0

GRRCON 2014 video

http://www.securitytube.net/video/11380

2014-10-26 18:39:21

阅读数 567

评论数 0

Windows API Index

http://msdn.microsoft.com/en-us/library/windows/desktop/ff818516(v=vs.85).aspx

2014-10-24 18:01:25

阅读数 857

评论数 0

Storm在实时网络攻击检测和分析的应用与改进

http://www.slideshare.net/hdhappy001/storm-29273863

2014-10-23 22:59:16

阅读数 938

评论数 0

Testing your Cisco ASA appliance for vulnerabilities with Nmap

Finally finished some scripts that I have been working on for a while. Should have had them completed long ago but was not able to get to it until to...

2014-10-22 22:19:43

阅读数 782

评论数 0

redline教程

http://www.youtube.com/watch?v=sAobJ1kmyqA

2014-10-22 20:06:51

阅读数 959

评论数 0

威胁情报分析工具

https://code.google.com/p/collective-intelligence-framework/wiki/ThreatIntelligenceTools

2014-10-22 15:14:21

阅读数 1519

评论数 0

基于hadoop恶意样本分析

http://www.slideshare.net/jasontrost/binary-24851796 https://github.com/endgameinc/binarypig

2014-10-22 10:54:09

阅读数 631

评论数 0

IRMA Incident Response Malware Analysis

http://irma.quarkslab.com/

2014-10-21 17:30:36

阅读数 990

评论数 0

Advisory: Oracle Forms 10g Unauthenticated Remote Code Execution (CVE-2014-4278)

Vulnerability Description: Oracle Forms 10g contains code that does not properly validate user input. This could allow an unauthenticated user to ...

2014-10-20 17:49:02

阅读数 851

评论数 0

SSLStrip 的未来 —— HTTPS 前端劫持

http://www.cnblogs.com/index-html/p/ssl-frontend-hijack.html

2014-10-18 12:04:23

阅读数 1094

评论数 0

SSH 安全性和配置入门

http://www.ibm.com/developerworks/cn/aix/library/au-sshsecurity/

2014-10-17 10:26:47

阅读数 658

评论数 0

kafka strom elasticsearch demo

https://github.com/mvalleavila/Kafka-Storm-ElasticSearch

2014-10-10 21:15:29

阅读数 2307

评论数 0

storm组件学习

场景 伴随着信息科技日新月异的发展,信息呈现出爆发式的膨胀,人们获取信息的途径也更加多样、更加便捷,同时对于信息的时效性要求也越来越高。举个搜索场景中的例子,当一个卖家发布了一条宝贝信息时,他希望的当然是这个宝贝马上就可以被卖家搜索出来、点击、购买啦,相反,如果这个宝贝要等到第二天或者更久才...

2014-10-10 21:14:38

阅读数 2026

评论数 0

提示
确定要删除当前文章?
取消 删除
关闭
关闭