1、严重的joomla 0day漏洞影响1.5到3.4版本,已经被大范围利用超过2天,问题出在/libraries/joomla/database/driver/mysqli.php文件的析构函数__destruct()调用了disconnect(),而disconnect()里调用了call_user_func_array()
https://blog.sucuri.net/2015/12/remote-command-execution-vulnerability-in-joomla.html
2、Mimikatz使用的非官方使用辅导
https://adsecurity.org/?page_id=1821
3、telegram消息协议分析
http://cs.au.dk/~jakjak/master-thesis.pdf
4、FireStorm:下一代防火墙的一些安全问题
http://www.bugsec.com/news/firestorm/
5、adobe flash 的IExternalizable.readExternal当本地序列化的时候引发类型冲突漏洞的POC
https://www.exploit-db.com/exploits/38969/
6、ObjectEncoder.dynamicPropertyWriter序列化的时候引发类型冲突漏洞的POC
https://www.exploit-db.com/exploits/38970/
7、MS15-124 POC
https://www.exploit-db.com/exploits/38972/
8、directX 运行时hooking技术
http://www.codereversing.com/blog/archives/282
9、flashlight:渗透测试时,自动化信息收集工具
https://github.com/galkan/flashlight
10、QEMU virtfs-proxy-helper 本地提权漏洞,仅仅影响Gentoo
https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=183dd7394703b49c7af441a9c4227b4b91453510
11、Qemu: usb: ehci_advance_state无限循环导致DOS漏洞
https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02124.html
12、Hidden Process Finder发布
http://www.novirusthanks.org/products/hidden-process-finder/
13、六种方式自动发现软件BUG的PAPER
http://www.cse.ust.hk/~gfan/docs/fangang_pqe.pdf
14、微软Word Intruder crimeware kit利用工具包升级
15、SAML2 :burpsuite扩展
https://github.com/SAMLRaider/SAMLRaider/
16、maltrail:恶意流量监测系统
https://github.com/stamparm/maltrail
17、autoresponder:自动从responder日志中载入ntlm哈希,然后发送给hashcat破解的脚本
https://github.com/sensepost/autoresponder
18、3篇有关通过内核监控进程创建的文章
https://objective-see.com/blog/blog_0x0A.html
https://objective-see.com/blog.html#blogEntry9
https://objective-see.com/blog/blog_0x0B.html
19、Polycom VVX-Series商业多媒体电话路径递归漏洞
https://depthsecurity.com/blog/polycom-vvx-series-business-media-phones-path-traversal-vulnerability