分类和整理自己看过的所有文章,方便知识体系的建立和查漏补缺
PS.内容存档后面我放在了印象笔记的剪藏
1.2021.2.13-域渗透之滥用SPN mappings 内容图片存档
2.攻击者如何使用Kerberos Silver Ticket来利用系统 内容图片存档
5.红队之浅谈基于Windows telemetry的权限维持
10.Tailoring Cobalt Strike on Target
13. Bypass cobaltstrike beacon config scan
14.红队之浅谈基于Windows telemetry的权限维持
17.RIFT: Analysing a Lazarus Shellcode Execution Method
18.Alaris | A Protective Loader
26.非约束委派和约束委派攻击
27.Kerberos Bronze Bit Attack 绕过约束委派限制
30.Finding Metasploit & Cobalt Strike URLs
32.投稿 | 2021最新免杀入门混淆加密方法揭秘(附视频)
34.Shellcode 隐写到像素 RGB 免杀上线到 CobaltStrike
35.Detecting Cobalt Strike Default Modules via Named Pipe Analysis
36.in-memory-shellcode-decoding-to-evade-avs/
38.搭建大型域环境(父域控制器、子域控制器、辅域控制器、域内主机)
39.SleepyCrypt: Encrypting a running PE image while it sleeps
40.CobaltStrike Stager Utilizing Floating Point Math
Apache Shiro 两种姿势绕过认证分析(CVE-2020-17523 内容存档
Spring Security 实战干货:OAuth2登录获取Token的核心逻辑
VMware vCenter RCE (CVE-2021-21972) 漏洞复现与 Exp 编写
Java 中 RMI、JNDI、LDAP、JRMP、JMX、JMS那些事儿(上)
CVE-2021-3129:Laravel远程代码执行复现分析
Laravel Debug RCE| ftp 被动模式攻击fastcgi复现
Weird Ways to Run Unmanaged Code in .NET
writing-network-templates-with-nuclei
干货 | 如何快速完成DLL劫持,实现权限维持,重启上线 内容图片存档
X86 Shellcode Obfuscation - Part 1
Cobalt Strike Powershell 过360+Defender等杀软上线
early-bird-apc-queue-code-injection
bypassing-user-mode-hooks-and-direct-invocation-of-system-calls-for-red-teams
XX星辰 天X汉马USG防火墙 逻辑缺陷漏洞 CNVD-2021-12793
漏洞复现 | (通用0day)金和C6协同OA管理平台后台存在水平越权漏洞
Evading All Web-Application Firewalls XSS Filters
Using HTML Attribute Separators for Bypassing WAF XSS Filters
RCE in Google Cloud Deployment Manager
Facebook account takeover due to a bypass of allowed callback URLs in the OAuth flow
Facebook account takeover due to a wide platform bug in ajaxpipe responses
高版本JDK下的Jolokia Realm JNDI RCE小记
利用火器DNS数据集进行hosts碰撞, 发现某厂商严重漏洞
当你用 Dash 在阅读文档的时候,文档也正在看着你……(已修复)
Automating xss identification with Dalfox & Paramspider
Hacking a company and accessing the back-end files leading to RCE and a 4-digit bounty
OAuth 2.0 Hacking Simplified — Part 1 — Understanding Basics
How to Test Blind SQLi With Burp Suite — Practical Example
Source code disclosure via exposed .git folder
Fun sql injection — mod_security bypass
比虚拟机更轻量,比 Docker 和 WSL 更简单的 Linux 环境
Using tmux for automating interactive reverse shells
阿里面试官的”说一下从url输入到返回请求的过程“问的难度就是不一样!
Apache Dubbo: All roads lead to RCE
Windows 2012 Server Network Security
2021年全国大学生网络安全邀请赛暨第七届“东华杯“上海市大学生网络安全大赛Writeup