每日安全动态推送(02-22)

渗透技巧 2年前 (2022) admin
742 0 0
Tencent Security Xuanwu Lab Daily News


• README.md:
https://github.com/mzlogin/awesome-adb

   ・ Awesome ADB(Android Debug Bridge) – Jett


• 一道有趣的CTF赛题-unicode引发的WebAssembly与js交互问题:
https://tttang.com/archive/1434/

   ・ 一道有趣的CTF赛题-unicode引发的WebAssembly与js交互问题. – lanying37


• Scaling Dumb Fuzzing with Kubernetes:
https://www.archcloudlabs.com/projects/dumb_fuzzing/

   ・ 在 Kubernetes 管理的容器中大规模 Fuzz radare2 – Jett


• Find You: Building a stealth AirTag clone:
https://positive.security/blog/find-you

   ・ Positive 团队将 AirTag 改造成跟踪器的研究 – Jett


• GitHub – midisec/BypassAnti-Virus: 免杀姿势学习、记录、复现。:
https://github.com/midisec/BypassAnti-Virus

   ・ BypassAnti-Virus: 免杀技术学习资料. – lanying37


• [Fuzzing] loiclec/fuzzcheck-rs:
https://github.com/loiclec/fuzzcheck-rs

   ・ Fuzzcheck is a modular, structure-aware, and feedback-driven fuzzing engine for Rust functions. – Jett


• [Linux] Linux kernel Use-After-Free (CVE-2021-23134) PoC.:
https://ruia-ruia.github.io/NFC-UAF/

   ・ Linux 内核 NFC 子系统的一个 UAF 漏洞 – Jett


• Meet Kraken: A New Golang Botnet in Development:
https://www.zerofox.com/blog/meet-kraken-a-new-golang-botnet-in-development/

   ・ Kraken – Zerofox 对一款 Go 语言写的 Botnet 的分析 – Jett


• [Vulnerability] Finding an unseen SQL Injection by bypassing escape functions in mysqljs/mysql:
https://flattsecurity.medium.com/finding-an-unseen-sql-injection-by-bypassing-escape-functions-in-mysqljs-mysql-90b27f6542b4

   ・ mysqljs/mysql 的 escape 实现导致的 SQL 注入 – Jett


• [Windows] Process Overwriting:
https://github.com/hasherezade/process_overwriting

   ・ Process Overwriting – 在进程中注入 PE 文件 – Jett


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(02-22)

版权声明:admin 发表于 2022年2月22日 上午4:12。
转载请注明:每日安全动态推送(02-22) | CTF导航

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...