Tencent Security Xuanwu Lab Daily News
• GitHub - chompie1337/Windows_MSKSSRV_LPE_CVE-2023-36802: LPE exploit for CVE-2023-36802:
・ Windows CVE-2023-36802 本地提权 EXP
–
• Relaying NTLM to MSSQL:
・ Relaying NTLM to MSSQL
–
• Using the Windows Server Protocols documentation set to better understand the Active Directory Schema:
・ 通过Windows文档来帮助理解Active Directory
–
• GPU.zip attack in simple terms:
・ 攻击GPU的漏洞,可从可视化系统中窃取机密或者窃取压缩数据
–
• How I made a heap overflow in curl:
・ curl 堆溢出漏洞分析
–
• PVS-Studio: static code analyzer:
・ PVS-Studio,静态代码分析器
–
• HTTP/2 Rapid Reset Vulnerability, CVE-2023-44487 | CISA:
・ HTTP/2 Rapid 重置漏洞,可导致拒绝服务
–
• SOCKS5 heap buffer overflow:
・ curl SOCKS5 heap buffer overflow
–
• D-Link DAP-X1860: Remote Command Injection:
・ D-Link DAP-X1860 WiFi6信号扩展器远程命令注入
–
• Alex Chapman: How to Be a High-Impact Hacker (Ep. 31):
・ 如何成为一个高影响力的黑客
–
• An Algorithm to Detect Hosting Providers and their IP Ranges:
・ 检测云服务提供商及其IP段的方法
–
• MacOS "DirtyNIB" Vulnerability: Let Attackers Execute Malicious Code:
・ MacOS DirtyNIB 漏洞可导致恶意代码执行
–
• GitHub - clearbluejar/ghidriff: Python Command-Line Ghidra Binary Diffing Engine:
・ Ghidra 二进制 diff 工具
–
* 查看或搜索历史推送内容请访问:
* 新浪微博账号:腾讯玄武实验室
推荐站内搜索:最好用的开发软件、免费开源系统、渗透测试工具云盘下载、最新渗透测试资料、最新黑客工具下载……
还没有评论,来说两句吧...