github_id | title | url | p_url | p_profile | p_loc | p_company | p_repositories | p_projects | p_stars | p_followers | p_following | repo_lang | repo_star | repo_forks |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
yhy0 | 监控github上新增的cve编号项目漏洞 | https://github.com/yhy0/github-cve-monitor | None | None | None | None | 0 | 0 | 0 | 0 | 0 | None | 0 | 0 |
wgpsec | TIG 威胁情报收集 | https://github.com/wgpsec/tig | None | None | None | None | 0 | 0 | 0 | 0 | 0 | None | 0 | 0 |
sbousseaden | PCAP-ATTACK: PCAP Samples for Different Post Exploitation Techniques | https://github.com/sbousseaden/PCAP-ATTACK | http://@SBousseaden | Threat Hunting & DFIR | None | None | 66 | 0 | 0 | 0 | 0 | YARA,PowerShell | 0 | 0 |
peter-cui1221 | sqlinjection-detect: C语言编写的基于语义分析的SQL注入检测... | https://github.com/peter-cui1221/sqlinjection-detect | None | None | None | 1 | 0 | 0 | 0 | 0 | C | 0 | 0 | |
marijuanARM | iOS 降级工具 futurerestore 更新 v194 版本 | https://github.com/marijuanARM/futurerestore/releases/tag/194 | https://discord.gg/fAngssA | python developer , discord link below , avatar by @syns | None | None | 25 | 0 | 0 | 0 | 0 | Python | 0 | 0 |
lcvvvv | Kscan:轻量级的资产发现工具 | https://github.com/lcvvvv/kscan | None | None | None | 3 | 1 | 0 | 0 | 0 | Go | 0 | 0 | |
huoji120 | DuckMemoryScan: 内存免杀马检测 | https://github.com/huoji120/DuckMemoryScan | https://key08.com | 网络安全工程师、游戏安全工程师、反病毒工程师、全栈开发程序员、黑客 | 北京 朝阳 | CTO | 84 | 0 | 0 | 0 | 0 | Python,C,C++ | 0 | 0 |
blackorbird | SilverFish APT团队分析报告。 | https://github.com/blackorbird/APT_REPORT/blob/master/SunBurst/SilverFish_Solarwinds.pdf | None | None | None | None | 0 | 0 | 0 | 0 | 0 | None | 0 | 0 |
advanced-threat-research | McAfee ATR Capture the Flag Writeup | https://github.com/advanced-threat-research/ATR_HAX_CTF | None | None | None | None | 0 | 0 | 0 | 0 | 0 | Python,YARA,HTML,Lua | 0 | 0 |
Siguza | libkrw - 为不同越狱工具提供一个 iOS kernel 读写 API 接口 | https://github.com/Siguza/libkrw | https://siguza.net | Switzerland | None | 50 | 0 | 0 | 0 | 0 | C,Assembly,Objective-C | 0 | 0 | |
GuoKerS | 利用字符集编码绕过waf的burp插件 | https://github.com/GuoKerS/Charset_encoding-Burp | None | None | None | None | 0 | 0 | 0 | 0 | 0 | None | 0 | 0 |
EXHades | 一些网络空间搜索引擎相关的资料 | https://github.com/EXHades/CyberSpaceSearchEngine-Research | https://github.com/OmenSec | Never stop Thinking! | World wide,Gensokyo | @OmenSec @Ouroboros-SEC | 35 | 0 | 0 | 0 | 0 | 0 | 0 | |
Ch0pin | medusa - 基于 FRIDA 实现的 Java 动态二进制插桩框架,目标场景是恶意软件 Trace | https://github.com/Ch0pin/medusa | None | None | None | None | 0 | 0 | 0 | 0 | 0 | None | 0 | 0 |
CTF-MissFeng | GoScan: 分布式综合资产管理系统 | https://github.com/CTF-MissFeng/GoScan | None | None | None | None | 0 | 0 | 0 | 0 | 0 | None | 0 | 0 |
title | url |
---|---|
在Android11使用Scudo分配器介绍 | https://zhuanlan.zhihu.com/p/353784014 |
title | url |
---|---|
Google内部开源组件的风险治理框架与工作流程窥探 | https://zhuanlan.zhihu.com/p/356415256 |
title | url |
---|---|
基于 CodeQL 的 C/C++ 源码静态分析实践 | https://xz.aliyun.com/t/9275 |
title | url |
---|---|
一些webshell免杀的技巧 | https://xz.aliyun.com/t/9290 |
蓝队溯源与反制 | https://xz.aliyun.com/t/9316 |
记一次跌宕起伏的白盒审计到RCE | https://xz.aliyun.com/t/9319 |
C/C++源码扫描系列- Fortify 篇 | https://xz.aliyun.com/t/9276 |
自主搭建的三层网络域渗透靶场打靶记录 | https://xz.aliyun.com/t/9281 |
C/C++源码扫描系列- Joern 篇 | https://xz.aliyun.com/t/9277 |
CVE-2019-2215复现过程记录 | https://xz.aliyun.com/t/9273 |
C/C++源码扫描系列- codeql 篇 | https://xz.aliyun.com/t/9275 |
某oa java代码审计2 | https://xz.aliyun.com/t/9226 |
某oa java代码审计1 | https://xz.aliyun.com/t/9225 |
两道CSP题目绕过分析 | https://xz.aliyun.com/t/9219 |
免杀/一句话木马(PHP) | https://xz.aliyun.com/t/9246 |
PHP反序列化 — 字符逃逸 | https://xz.aliyun.com/t/9213 |
python update_daily.py