Skip to content

Latest commit

 

History

History
95 lines (76 loc) · 8.51 KB

tech_info_20210209.md

File metadata and controls

95 lines (76 loc) · 8.51 KB

互联网安全 推荐

ts title url

玄武实验室 推荐

ts title url

安全维基 推荐

ts title url
20210209 全球高级持续性威胁(APT)2020年度报告 https://ti.qianxin.com/uploads/2021/02/08/dd941ecf98c7cb9bf0111a8416131aa1.pdf
20210209 2020年勒索软件分析 https://mp.weixin.qq.com/s/yrtU2_VxEt94DWF4eQWujA
20210209 云安全架构连载之二-Azure云平台威胁检测详解 https://mp.weixin.qq.com/s/Dffk-_TSCaR2SWVAIMCQUA
20210209 基于威胁情报周期模型的APT木马剖析 https://mp.weixin.qq.com/s/CYxGbdRGDfXGY8wupnGbrw
20210209 邮件钓鱼入门到入土 https://mp.weixin.qq.com/s/hhBs3wryDCum1DrD6CxeRw

CVE Github 推荐

ts cve_id title url cve_detail
20210209T23:22:34Z CVE-2020-5844 Null https://github.com/TheCyberGeek/CVE-2020-5844 index.php?sec=godmode/extensions&sec2=extensions/files_repo in Pandora FMS v7.0 NG allows authenticated administrators to upload malicious PHP scripts, and execute them via base64 decoding of the file location. This affects v7.0NG.742_FIX_PERL2020.
20210209T22:31:49Z CVE-2021-3156 PoC for CVE-2021-3156 (sudo heap overflow) https://github.com/stong/CVE-2021-3156 Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via %sudoedit -s% and a command-line argument that ends with a single backslash character.
20210209T21:31:38Z cve-2020-8554 Null https://github.com/alebedev87/gatekeeper-cve-2020-8554 未查询到CVE信息
20210209T21:09:29Z CVE-2020-8835 Null https://github.com/ret2hell/CVE-2020-8835 In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) did not properly restrict the register bounds for 32-bit operations, leading to out-of-bounds reads and writes in kernel memory. The vulnerability also affects the Linux 5.4 stable series, starting with v5.4.7, as the introducing commit was backported to that branch. This vulnerability was fixed in 5.6.1, 5.5.14, and 5.4.29. (issue is aka ZDI-CAN-10780)
20210209T18:48:13Z CVE-2020-1350 HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019. https://github.com/ZephrFish/CVE-2020-1350 A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests, aka %Windows DNS Server Remote Code Execution Vulnerability%.
20210209T14:41:20Z cve-2020-17523 shiro-cve-2020-17523 漏洞的两种绕过姿势分析(带漏洞环境) https://github.com/jweny/shiro-cve-2020-17523 未查询到CVE信息
20210209T07:22:16Z cve-2021-3156 보안취약점 확인 https://github.com/gmldbd94/cve-2021-3156 未查询到CVE信息
20210209T03:15:11Z CVE-2020-17527 Null https://github.com/forse01/CVE-2020-17527-Tomcat While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.
20210209T03:14:51Z CVE-2020-25213 Null https://github.com/forse01/CVE-2020-25213-Wordpress
20210209T01:27:49Z CVE-2020-5902 simple bash script of F5 BIG-IP CVE-2020-5902 checker https://github.com/faisalfs10x/F5-BIG-IP-CVE-2020-5902-shodan-scanner In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages.

klee on Github 推荐

ts title url stars forks
20210209T20:52:24Z Spring 2021 Geography 817 work folder https://github.com/klee12/klee12.github.io 0 0
20210209T13:55:52Z An open-source Chinese font derived from Fontworks% Klee One. 一款基于 FONTWORKS 的 Klee One 的开源中文字体。 https://github.com/lxgw/LxgwWenKai 32 1
20210209T12:21:24Z Null https://github.com/fontworks-fonts/Klee 357 9

s2e on Github 推荐

ts title url stars forks

exploit on Github 推荐

ts title url stars forks
20210209T23:20:53Z This bash script will help you to hack remote hosts https://github.com/FabioDefilippo/linuxallremote 4 1
20210209T21:36:07Z Explorations and exploitations of the UWP platform https://github.com/alexpisquared/UWP 0 0
20210209T21:34:28Z Web Server with exploitable code. DO NOT USE THIS FOR A SERVER https://github.com/hmm-ship-it/Stinky-Server-Socks 1 0
20210209T21:29:35Z Null https://github.com/Raycodex/Exploiting 0 0
20210209T20:52:28Z KDMapper is a simple tool that exploits iqvw64e.sys Intel driver to manually map non-signed drivers in memory https://github.com/TheCruZ/kdmapper 147 69
20210209T20:13:34Z Null https://github.com/roExploit/roExploit 0 0
20210209T19:52:49Z Automates searching CVEs in the Metasploit database of exploits. https://github.com/ferdinandmudjialim/metasploit-cve-search 0 0
20210209T19:19:32Z Vulnerabilities% Risk of Exploitation https://github.com/thiagofigcosta/V-REx 0 0
20210209T18:31:20Z Various techniques for exploiting Windows https://github.com/billchaison/Windows-Trix 5 0
20210209T18:11:07Z Development of code to exploit LSST and VISTA imaging https://github.com/lsst-uk/lsst-ir-fusion 0 0

backdoor on Github 推荐

ts title url stars forks
20210209T23:27:42Z RATata is a simple python RAT to setup and use ! https://github.com/loTus04/RATata 0 0
20210209T22:09:29Z PyHoox https://github.com/dorian9007/PyHoox 0 0
20210209T20:39:28Z Backdoor para Windows e Linux https://github.com/medn1c/reverse-shell 2 0
20210209T20:28:58Z A commandline backdoor accessible from the windows login and lock screen to manipulate files and directories. https://github.com/KabueMurage/Windows-Backdoor 10 2
20210209T19:03:00Z A sample app to demonstrate how to create Xamarin UITests using the Page Object architecture, Backdoor Methods and App Links (aka Deep Linking) https://github.com/brminnick/UITestSampleApp 32 25
20210209T18:25:23Z Null https://github.com/EjHvorSerDuVildUdJim/backdoor 0 0
20210209T17:19:34Z Null https://github.com/Shahtr1/reverse_backdoor 0 0
20210209T15:03:05Z Null https://github.com/mikkelskov1/backdoor2 0 0
20210209T11:24:26Z FUD cross-platform python2 backdoor with C2 https://github.com/7h3w4lk3r/pyback 16 5
20210209T11:13:42Z The official backdoor of the Bane Project for Android https://github.com/datteroandrea/banedroid 1 1

fuzz on Github 推荐

ts title url stars forks
20210209T23:23:10Z A cross-platform browser fuzzing framework https://github.com/MozillaSecurity/grizzly 227 30
20210209T23:18:21Z FuzzBench - Fuzzer benchmarking as a service. https://github.com/google/fuzzbench 593 98
20210209T22:49:11Z Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based) https://github.com/google/honggfuzz 2129 430
20210209T22:10:13Z Practical activities developed for Fuzzy Systems course (ELE075) at UFMG. https://github.com/thaismenegaldi/Fuzzy-Systems 0 0
20210209T21:55:43Z Generate code for json encoders/decoders, codecs, fuzzers, generators, and more https://github.com/MartinSStewart/elm-review-todo-it-for-me 0 0
20210209T21:44:52Z Go fuzzy matching tool using Levenshtein distance calculation https://github.com/datahappy1/go_fuzzymatch 0 0
20210209T21:18:25Z Write unit and fuzz tests for Elm code. https://github.com/elm-explorations/test 194 28
20210209T21:02:19Z Null https://github.com/VahalaSly/Fuzzy_System 0 0
20210209T21:00:57Z Null https://github.com/lutzer/node-red-contrib-fuzzywuzzy 1 0
20210209T20:05:17Z Null https://github.com/primosz/FuzzySandbox 0 0

日更新程序