Skip to content

Latest commit

 

History

History
123 lines (100 loc) · 14.3 KB

tech_info_20230113.md

File metadata and controls

123 lines (100 loc) · 14.3 KB

互联网安全 推荐

ts title url

玄武实验室 推荐

ts title url
20230113 binarly的安全研究人员发现了高通和联想一些漏洞(溢出和泄露),并将部分细节进行展示 http://binarly.io/posts/Multiple_Vulnerabilities_in_Qualcomm_and_Lenovo_ARM_based_Devices/index.html
20230113 CVE-2022-3652:通过JSCreateLowering的条件竞争导致RCE https://bugs.chromium.org/p/chromium/issues/detail?id=1369871
20230113 CVE-2022-3656:Google Chrome 和基于 Chromium 的浏览器由于对一些文件上传功能缺乏symlink的检查,从而导致通过滥用symlink可以盗取你本地的一些重要配置文件 https://github.com/momika233/CVE-2022-3656
20230113 劫持cscapi.dll以劫持explorer.exe来进行持久化驻留 https://github.com/D1rkMtr/ExplorerPersist
20230113 CVE-2022-42841:由于在解析xar中出现由类型转换导致的整数溢出而导致pkg的签名验证成功,可绕过SIP,Gatekeeper并在特定条件下提权到root http://sector7.computest.nl/post/2023-01-xar/
20230113 针对TouchEn nxKey键盘加密保护的安全研究,以及通过其中发现了一些不安全的漏洞,导致其可能会被利用成为恶意软件 http://palant.info/2023/01/09/touchen-nxkey-the-keylogging-anti-keylogger-solution/
20230113 Forensia:RedTeam后渗透阶段的痕迹清理工具 https://github.com/PaulNorman01/Forensia
20230113 WalkerGate:通过查找ntdll的内存解析以进行系统调用 https://github.com/DallasFR/WalkerGate
20230113 NoName057(16) – 以北约为目标的亲Ru黑客组织 https://www.sentinelone.com/labs/noname05716-the-pro-russian-hacktivist-group-targeting-nato/
20230113 trailofbits发布关于使用tlspuffin来fuzzing wolfSSL并发现4个DOS漏洞的细节以及一些fuzzing的方法论思路 https://sec.today/pulses/d5fea3ea-4220-431f-8d1e-92ec38969789/
20230113 2022年APT组织分析年鉴 https://sec.today/pulses/8e299b55-4c61-4565-9da3-80c4e21279e3/
20230113 客户端SSRF到Google Cloud Project接管 https://sec.today/pulses/7d8f8cdd-8876-4ed1-95c8-d7bf3717af2e/
20230113 关于Window kernel两个条件竞争漏洞(CVE-2023-21536、CVE-2023-21537)的挖掘、利用思路。 https://sec.today/pulses/f59d5873-516c-49df-b0a4-1549e1657099/
20230113 trailofbits发布关于使用tlspuffin来fuzzing wolfSSL并发现4个DOS漏洞的细节以及一些fuzzing的方法论思路 http://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/
20230113 2022年APT组织分析年鉴 https://github.com/blackorbird/APT_REPORT/blob/master/summary/2023/2022%20Yearbook%20of%20APT%20group%20Analysis.pdf
20230113 客户端SSRF到Google Cloud Project接管 http://blog.geekycat.in/client-side-ssrf-to-google-cloud-project-takeover/
20230113 关于Window kernel两个条件竞争漏洞(CVE-2023-21536、CVE-2023-21537)的挖掘、利用思路。 http://dannyodler.hashnode.dev/racing-bugs-in-windows-kernel
20230113 通过隐藏导入表的方式规避杀软 https://xz.aliyun.com/t/12035

安全维基 推荐

ts title url

CVE Github 推荐

ts cve_id title url cve_detail
20230113T23:48:54Z CVE-2023-21599 Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must CVE project by @Sn0wAlice https://github.com/Live-Hack-CVE/CVE-2023-21599
20230113T23:48:50Z CVE-2023-21598 Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open CVE project by @Sn0wAlice https://github.com/Live-Hack-CVE/CVE-2023-21598
20230113T23:48:47Z CVE-2023-21597 Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. CVE project by @Sn0wAlice https://github.com/Live-Hack-CVE/CVE-2023-21597
20230113T23:48:43Z CVE-2023-21596 Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. CVE project by @Sn0wAlice https://github.com/Live-Hack-CVE/CVE-2023-21596
20230113T23:48:39Z CVE-2023-21595 Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. CVE project by @Sn0wAlice https://github.com/Live-Hack-CVE/CVE-2023-21595
20230113T23:48:34Z CVE-2023-21594 Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. CVE project by @Sn0wAlice https://github.com/Live-Hack-CVE/CVE-2023-21594
20230113T23:48:30Z CVE-2022-45299 An issue in the IpFile argument of rust-lang webbrowser-rs v0.8.2 allows attackers to access arbitrary files via supplying a crafted URL. CVE project by @Sn0wAlice https://github.com/Live-Hack-CVE/CVE-2022-45299
20230113T23:48:24Z CVE-2022-42136 Authenticated mail users, under specific circumstances, could add files with unsanitized content in public folders where the IIS user had permission to access. That action, could lead an attacker to store arbitrary code on that files and execute RCE commands. CVE project by @Sn0wAlice https://github.com/Live-Hack-CVE/CVE-2022-42136
20230113T23:48:20Z CVE-2021-36204 Under some circumstances an Insufficiently Protected Credentials vulnerability in Johnson Controls Metasys ADS/ADX/OAS 10 versions prior to 10.1.6 and 11 versions prior to 11.0.3 allows API calls to expose credentials in plain text. CVE project by @Sn0wAlice https://github.com/Live-Hack-CVE/CVE-2021-36204
20230113T23:48:07Z CVE-2022-32294 ** DISPUTED ** Zimbra Collaboration Open Source 8.8.15 does not encrypt the initial-login randomly created password (from the "zmprove ca" command). It is visible in cleartext on port UDP 514 (aka the syslog port). NOTE: a third party reports that this cannot be reproduced. CVE project by @Sn0wAlice https://github.com/Live-Hack-CVE/CVE-2022-32294

klee on Github 推荐

ts title url stars forks
20230113T14:56:21Z contains the code and data to accompany the publication of the pyKleeBarcode software (https://github.com/WandrilleD/pyKleeBarcode) https://github.com/WandrilleD/pyKleeBarcode-publication-supporting-code-and-data 0 0
20230113T11:49:42Z Collection of Kicad 6.0 symbols, footprints and 3D models useful in keyboard creation https://github.com/crides/kleeb 68 6
20230113T06:15:38Z Symbiotic is a tool for finding bugs in computer programs based on instrumentation, program slicing and KLEE https://github.com/staticafi/symbiotic 268 50
20230113T04:15:18Z An open-source Simplified Chinese font derived from Klee One. https://github.com/lxgw/LxgwWenkaiGB 188 1
20230113T00:14:42Z Null https://github.com/klee2024/klee2024.github.io 0 0

s2e on Github 推荐

ts title url stars forks
20230113T18:45:53Z Null https://github.com/turbocanary/turbotest_r6aikmfr_s2e79up1 0 0

exploit on Github 推荐

ts title url stars forks
20230113T23:51:19Z A bot which identify and exploit arbitrages on the Osmosis AMM DeFi plateform https://github.com/FocSon/OsmosisArbitrage 0 0
20230113T23:48:54Z Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must CVE project by @Sn0wAlice https://github.com/Live-Hack-CVE/CVE-2023-21599 0 0
20230113T23:48:50Z Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open CVE project by @Sn0wAlice https://github.com/Live-Hack-CVE/CVE-2023-21598 0 0
20230113T23:48:47Z Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. CVE project by @Sn0wAlice https://github.com/Live-Hack-CVE/CVE-2023-21597 0 0
20230113T23:48:43Z Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. CVE project by @Sn0wAlice https://github.com/Live-Hack-CVE/CVE-2023-21596 0 0
20230113T23:48:39Z Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. CVE project by @Sn0wAlice https://github.com/Live-Hack-CVE/CVE-2023-21595 0 0
20230113T23:48:34Z Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. CVE project by @Sn0wAlice https://github.com/Live-Hack-CVE/CVE-2023-21594 0 0
20230113T20:59:32Z One of the BEST up to date iReady hacks. Similar to iReady Overload. https://github.com/notplu/Nullify 19 19
20230113T13:35:42Z GitOps Repository https://github.com/redhat-appstudio-qe/multi-component-application-pbQoQ-enable-exploit 0 0
20230113T13:31:45Z A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation. https://github.com/skahwah/SQLRecon 263 63

backdoor on Github 推荐

ts title url stars forks
20230113T14:03:21Z Kernel rk https://github.com/carloslack/KoviD 105 25
20230113T13:47:03Z Null https://github.com/guowei-cn/universal-defence-of-backdoor-attack 0 0
20230113T10:59:14Z This tool is used for backdoor and shellcode generation for various architecture devices https://github.com/doudoudedi/hackEmbedded 24 2
20230113T07:01:09Z Null https://github.com/sunbing7/backdoors 1 0
20230113T05:43:56Z Null https://github.com/fatih98/backdoor 1 0
20230113T04:09:57Z A curated list of trustworthy deep learning papers. Daily updating... https://github.com/MinghuiChen43/awesome-trustworthy-deep-learning 103 13

symbolic execution on Github 推荐

ts title url stars forks
20230113T19:30:43Z Symbolic execution tool https://github.com/trailofbits/manticore 3270 462
20230113T19:27:32Z The symbolic execution engine powering the K Framework https://github.com/runtimeverification/haskell-backend 182 42
20230113T02:35:48Z FuzzBALL: Vine-based Binary Symbolic Execution https://github.com/bitblaze-fuzzball/fuzzball 208 54
20230113T01:32:12Z ToolChain using Symbolic Execution for Malware Analysis. https://github.com/csvl/SEMA-ToolChain 12 7

big4 on Github 推荐

ts title url stars forks
20230113T21:10:57Z DroneSecurity (NDSS 2023) https://github.com/RUB-SysSec/DroneSecurity 1 0
20230113T08:31:43Z Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS%23). https://github.com/dongtsi/OWAD 4 0

fuzz on Github 推荐

ts title url stars forks
20230113T23:28:28Z OSS-Fuzz - continuous fuzzing for open source software. https://github.com/google/oss-fuzz 8272 1803
20230113T22:35:39Z Scalable fuzzing infrastructure. https://github.com/google/clusterfuzz 4921 509
20230113T20:26:15Z Null https://github.com/gabriel-furquim/fuzzy-succotash 0 0
20230113T20:19:23Z Null https://github.com/Krystian120413/air-quality-fuzzy-driver 0 0
20230113T17:02:23Z Null https://github.com/Emerald-Lake/fuzzy-friends 0 7
20230113T13:15:24Z A full-featured open-source Wi-Fi fuzzer https://github.com/efchatz/WPAxFuzz 10 0
20230113T12:44:31Z A fuzzer for full VM kernel/driver targets https://github.com/IntelLabs/kAFL 406 71
20230113T12:27:04Z Ethereum smart contract fuzzer https://github.com/crytic/echidna 1865 240
20230113T12:24:53Z Differential fuzzer for testing different versions of the Kotlin compiler https://github.com/ciselab/kotlin-compiler-fuzzer 0 0
20230113T10:41:12Z A grammar based feedback Fuzzer https://github.com/nautilus-fuzz/nautilus 336 49

日更新程序