Skip to content

Latest commit

 

History

History
96 lines (77 loc) · 10.9 KB

tech_info_20210226.md

File metadata and controls

96 lines (77 loc) · 10.9 KB

互联网安全 推荐

ts title url

玄武实验室 推荐

ts title url
20210226 Issue 2123: Microsoft DirectWrite heap-based buffer overflow in fsg_ExecuteGlyph while processing variable TTF fonts https://bugs.chromium.org/p/project-zero/issues/detail?id=2123
20210226 Fuzzing native Python extensions with Atheris https://www.youtube.com/watch?v=oM-7lt43-GA
20210226 Issue 2163: Package Control: Arbitrary File Write on packagecontrol.io https://bugs.chromium.org/p/project-zero/issues/detail?id=2163
20210226 OPPO 对 Android App deeplinks 安全威胁的分析 https://security.oppo.com/en/noticeDetail?notice_only_key=NOTICE-1359026676922851328
20210226 49 款 JSON Parsers 解析过程的差异以及由此带来的安全威胁 https://labs.bishopfox.com/tech-blog/an-exploration-of-json-interoperability-vulnerabilities
20210226 Security of the Intel Graphics Stack - Part 2 - FW <-> GuC https://igor-blue.github.io/2021/02/24/graphics-part2.html
20210226 基于 cicuta_virosa 漏洞实现 iOS 内核任意地址读写 https://github.com/pattern-f/TQ-pre-jailbreak
20210226 ISC BIND server GSSAPI SPNEGO 组件 RCE 漏洞分析(CVE-2020-8625) https://www.thezdi.com/blog/2021/2/24/cve-2020-8625-a-fifteen-year-old-rce-bug-returns-in-isc-bind-server
20210226 Poisoning your Cache for 1000$ - Approach to Exploitation Walkthrough https://galnagli.com/Cache_Poisoning/

安全维基 推荐

ts title url
20210226 An Exploration of JSON Interoperability Vulnerabilities https://labs.bishopfox.com/tech-blog/an-exploration-of-json-interoperability-vulnerabilities
20210226 美军网络空间作战理论体系初探 https://mp.weixin.qq.com/s/Im-bacvc_1GGvLPtRspicw

CVE Github 推荐

ts cve_id title url cve_detail
20210226T21:35:54Z CVE-2021-21972 Nmap script to check vulnerability CVE-2021-21972 https://github.com/3dcyber/CVE-2021-21972 The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
20210226T19:42:15Z CVE-2021-21972 Null https://github.com/alt3kx/CVE-2021-21972 The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
20210226T16:51:36Z CVE-2021-25281 Chaining CVE-2021-25281 and CVE-2021-25282 to exploit a SaltStack https://github.com/Immersive-Labs-Sec/CVE-2021-25281 未查询到CVE信息
20210226T16:28:21Z CVE-2021-21017 Null https://github.com/ZeusBox/CVE-2021-21017 Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a heap-based buffer overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
20210226T16:20:04Z CVE-2021-21972 VMware vCenter 未授权RCE(CVE-2021-21972) https://github.com/conjojo/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972
20210226T16:11:42Z CVE-2021-21972 A vulnerability scanner that detects CVE-2021-21972 vulnerabilities. https://github.com/Osyanina/westone-CVE-2021-21972-scanner The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
20210226T15:43:00Z CVE-2021-21972 CVE-2021-21972 Exploit https://github.com/NS-Sp4ce/CVE-2021-21972 The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
20210226T11:37:40Z CVE-2021-21972 CVE-2021-21972 https://github.com/milo2012/CVE-2021-21972 The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
20210226T09:46:20Z CVE-2021-21972 Null https://github.com/yaunsky/CVE-2021-21972 The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
20210226T06:13:02Z CVE-2021-21972 VMware vCenter Server远程代码执行漏洞 (CVE-2021-21972)批量检测脚本 https://github.com/B1anda0/CVE-2021-21972 The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).

klee on Github 推荐

ts title url stars forks
20210226T23:23:46Z C library to support Map2Check Tool https://github.com/hbgit/map2check-library 0 0
20210226T14:26:42Z KLEE Symbolic Execution Engine https://github.com/klee/klee 1635 483
20210226T12:35:38Z Spring 2021 Geography 817 work folder https://github.com/klee12/klee12.github.io 0 0

s2e on Github 推荐

ts title url stars forks

exploit on Github 推荐

ts title url stars forks
20210226T23:01:40Z Extensible framework for analyzing publicly available information about vulnerabilities https://github.com/leonov-av/vulristics 23 1
20210226T22:28:22Z All Files, Scripts, and exploits can be found here https://github.com/LMS57/TempleOfPwn 1 0
20210226T22:07:24Z CTF framework and exploit development library https://github.com/Gallopsled/pwntools 7569 1359
20210226T22:06:25Z This is a repo for the coding done for CTFs / exploits. The writeups are here: https://github.com/dillonwu-97/csec_writeups https://github.com/dillonwu-97/csec-code 0 0
20210226T21:42:39Z COMING SOON https://github.com/rcegod/Discord-Rce-Exploit 0 0
20210226T21:37:29Z See every channel that exists even if you don%t have permission https://github.com/owersite/channel-exploit 0 0
20210226T21:36:57Z Discord Voice DDoS Exploit https://github.com/owersite/discord-voice-ddos 1 0
20210226T21:36:45Z Archive of Discord Tools & Exploits made / edited / fixed by me https://github.com/owersite/discord-exploits 1 0
20210226T21:36:41Z Discord Invisible Tag Exploit https://github.com/owersite/invisible-tag 3 0
20210226T21:36:33Z Another Discord Exploit! https://github.com/owersite/edit-exploit 1 0

backdoor on Github 推荐

ts title url stars forks
20210226T22:24:53Z Fud Persistent Windows Backdoor developed purely in python https://github.com/swagkarna/Chuvi-Botnet 12 5
20210226T20:45:34Z 🔌 A minecraft plugin which allow you to execute OS commands https://github.com/L1ghtM4n/BackdoorPlugin 1 0
20210226T15:18:45Z Kumpulan Shell Backdoor https://github.com/yogiganzz/Shell 0 0
20210226T08:10:37Z A sample app to demonstrate how to create Xamarin UITests using the Page Object architecture, Backdoor Methods and App Links (aka Deep Linking) https://github.com/brminnick/UITestSampleApp 33 25
20210226T01:08:20Z Python Backdoor Generator https://github.com/grenoxx/Back-X 5 1

fuzz on Github 推荐

ts title url stars forks
20210226T23:17:46Z Needed help https://github.com/sarce77/fuzzy-dollop 0 0
20210226T22:52:01Z Null https://github.com/docfate111/awful-JS-fuzzer 0 0
20210226T22:43:05Z Final project for BMI 540, looking at how entropy can be used to describe fuzzy c-means clustering. https://github.com/MargaretHall/Fuzzy_cMean_entropy 0 0
20210226T22:33:43Z The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more! https://github.com/AFLplusplus/AFLplusplus 1334 293
20210226T22:33:34Z Automatic Firmware Analysis of Embedded Linux Devices as Preparation for Security Testing / Fuzzing https://github.com/efi4st/efi4st 5 3
20210226T22:03:15Z Scalable fuzzing infrastructure. https://github.com/google/clusterfuzz 4440 421
20210226T21:53:36Z jimiPlugin for fuzzy matching of strings https://github.com/z1pti3/jimiPlugin-fuzzymatch 0 0
20210226T21:51:48Z Null https://github.com/ElizBth/Reactive-Navigation-Under-a-Fuzzy-Rules-Based-Scheme-and-Reinforcement-Learning 0 0
20210226T20:49:59Z 🏆 Collection of bugs uncovered by fuzzing Rust code https://github.com/rust-fuzz/trophy-case 219 34
20210226T20:42:56Z Null https://github.com/Iffern/FuzzyLogic 0 0

日更新程序