CodeEngn Logo

Live

CodeEngn Live RSS는 국내외 Security 관련 사이트, 블로그, 뉴스 등의 RSS를 쉽고 빠르게 볼 수 있는 RSS Reader 입니다.

추가 및 변경 신청은 Contact 메뉴에서 요청 해주세요.

- Atom, RSS v1.0, RSS v2.0 지원

- Facebook, Twitter RSS 지원

- 3분마다 자동 Live 웹페이지 Refresh

- 5분마다 등록된 RSS 주소들에 대한 title, link 자동 데이터 수집

- title, article, date 검색 가능

- 국내사이트, 국내SNS 등의 분류별 보기 가능

- URL 상에 사용하지 않는 변수 동적 제거를 통한 URL 최적화

- 로그인된 사용자에게 Scrap 기능 제공

분류 RSS 목록
국내 사이트 [84] 0x90 / A-FIRST Reverse Engineering / Acuros Innovation / ASEC Threat Research Response blog / Binary`s blog / binish1story / Broken Code (window31) / ByJJoon Lab / COMPUTER in HAVU / DarkSoul.Story / Deok9 / Ezbeat의 도서관 / F-INSIGHT / Focus on KaiEn!! / FORENSIC-PROOF / GrayHash / Hack Creative / HACKABILITY / Hackers on the Ship / HackSum / HackSum / HackTalk Security / Hakawati Security Lab / I Dont Know Who I aM / int $0x80 / J0hn Doe / KaisHack GoN / kcats`s mindstory / kernelhack :D / KISA 인터넷침해대응센터::기술문서 / KISA 인터넷침해대응센터::보안공지 / KISA 인터넷침해대응센터::분석월보 / KISA 인터넷침해대응센터::사고노트 / kkoha / kth 개발자 블로그 / M0nst3rZ_TEAM_blog / MaJ3stY / Maxoverpro Lab / Misterleeee / n0fate Forensic Space / Noplanlife by JunePark / Only love / Out of Control / PacketInside / 네트워크 패킷 분석 블로그 / Pagez | Computer Security Study blog / passket.net / pieces of code / Pragmatic Forensics / Prof. Huy Kang Kim`s Lifelog (김휘강의 Lifelog) / pwn3r tistory / RedHidden 새빨간 거짓말 / REVERSERGOODBOY.KR / RExVuz / Ride the Lightning / RIGHT TO KNOW / S3ize th3 Day / Sasin / StolenByte World!! / Sup3Rv1s0R / TeamCR@K / Think Like a Man of Action and Act Like Man of Thought... / wannabe FALCON / window 쪼물딱 거리기 / www.reversecore.com / Yesterday you told me about the blue blue sky / ZIZI ‡‡‡ 선택과 집중~ ‡‡‡ / 내맘이 안그래 / 라온시큐어 보안기술연구팀 / 렇렇 / 미친감자 / 바나나맛 페이로드 / 바다란 세상 가장 낮은 곳의 또 다른 이름 / 바이너리에 따뜻한 영혼을 / 보안프로젝트 / 복지 기업 CEO 니키 / 세상에서 가장 안전한 이름, 안랩 / 시스코 블로그 / 아폴로씨의 잡다한 경험들.. / 안랩인들이 만들어가는 커뮤니케이션 블로그 / 울지않는벌새 / 인터넷과 보안 / 잉카인터넷 대응팀 / 쿨캣의 블로그 놀이 / 헐랭이와 IT보안 (opt9 IT Security) /
국외 사이트 [29] /dev/ttyS0 | Embedded Device Hacking / codezen.fr / Darknet / Download Hacking Tools at Tools Yard / Eric Romang Blog / Exploit Database Blog / Fiddler / Flylogic`s Analytical Blog / Hack a Day / IC reverse engineering / InfoSec Research / IOActive Labs Research / j00ru//vx tech blog / MNIN Security Blog / NYU Poly ISIS Lab / Project Zero / reddit netsec / reddit ReverseEngineering / Reverse Engineering Mac OS X / Reverse Engineering Mac OS X / Security-Shell / SecurityXploded Latest Security Articles / SecurityXploded Latest Security News / SecurityXploded Latest Security Tools / sla.ckers / The Adallom Blog / The Hacker News [ THN ] / VNSECURITY Blog / w00tsec /
국내 twitter [7] beist Twitter / estima7 Twitter / ITL, SANS 코리아 Twitter / Matt Twitter / passket Twitter / 김승주 Twitter / 바다란 Twitter /
국외 twitter [32] aboutsecurity Twitter / armitagehacker Twitter / bartblaze Twitter / BorjaMerino Twitter / carlosacastillo Twitter / Carlos_Perez Twitter / Dinosn Twitter / energizedtech Twitter / geeknik Twitter / gN3mes1s Twitter / Hfuhs Twitter / hiddenillusion Twitter / j00ru Twitter / jedisct1 Twitter / Jhaddix Twitter / juneb_get_help Twitter / mikefrobbins Twitter / osxreverser Twitter / Phreaky Twitter / PhysicalDrive0 Twitter / pof Twitter / ProjectHoneynet Twitter / quequero Twitter / r0bertmart1nez Twitter / r_netsec Twitter / secdocs Twitter / securitytube Twitter / SecurityXploded Twitter / Security_FAQs Twitter / soaj1664ashar Twitter / teamcymru Twitter / xanda Twitter /
Facebook [1] 보안프로젝트 리서치 /
국내 보안뉴스 [2] 데일리시큐 / 보안뉴스 /
국외 보안뉴스 [1] Zero Day | ZDNet /



검색된 RSS Articles : 3,407 개 / Lastupdate : 2018-02-25 11:01:45



Phreaky Twitter


Interesting : Malware Analyze / Security Research / Reversing / Python .... Korea · http://sinun.tistory.com

RSS Articles : 3,407
URL : twitter.com/unpacker
RSS : CodeEngn Live RSS 엔진

Date Article
2018-02-22 12:39:46 Yay! Almost done to make PPT.pic.twitter.com/qoAGVHVFgO
2018-02-14 12:35:18 Retweeted Jason Lang (@curi0usJack):Some of people I admire most in infosec:- Rarely talk about themselves-... https://fb.me/MG8NDn90
2018-02-14 04:24:08 Some of people I admire most in infosec:- Rarely talk about themselves- Love to share their knowledge- Are competitive- Freely admit when wrong- Happily welcome newcomers- Are perpetual students- Give all the credit away
2018-02-13 16:27:56 Retweeted Eric Geller (@ericgeller):Why you should be skeptical of early attribution claims: Here are cyber... https://fb.me/4oGn5cZql
2018-02-12 20:00:03 Why you should be skeptical of early attribution claims: Here are cyber firms linking the Olympics malware to Russia and China, along with a third firm suggesting a link to North Korea.pic.twitter.com/wZisvPWoaD
2018-02-09 15:00:26 Yet Another Distraction? A New Version of North Korean Ransomware Hermes Has Emerged http://www.intezer.com/another-distraction-new-version-north-korean-ransomware-hermes/ …
2018-02-06 20:54:14 Retweeted Paul Rascagnères (@r00tbsd):I updated our blog post concerning the Flash 0-day used by Group123... https://fb.me/18uhD9QhN
2018-02-06 17:12:21 I updated our blog post concerning the Flash 0-day used by Group123 with a graph showing the exploit workflow ;) http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html …pic.twitter.com/xxLogp5eyn
2018-02-06 03:50:48 Retweeted Bank Security (@Bank_Security):Detailed analysis of Lizard Squad hacking group... https://fb.me/3pcx6U7nh
2018-02-06 02:18:26 Malware Analysis – PlugX https://countuponsecurity.com/2018/02/04/malware-analysis-plugx/amp/ …
2018-02-05 14:58:09 Great works by McAfee about GoldDragon attack wave. http://bit.ly/2nDlPrW  I just wondering how McAfee conclude Olympic themed spearphising has an connection with GoldDragon.pic.twitter.com/iC8INR1xo9
2018-02-05 13:23:48 Detailed analysis of Lizard Squad hacking group https://www.zingbox.com/wp-content/uploads/2018/01/Lizard-Squad-White-Paper-v7.pdf … CyberSecurity Infosec Hackingpic.twitter.com/wPGnn2sptM
2018-02-04 12:49:37 Retweeted Itai Tevet (@itaitevet):Fun fact: @IntezerLabs shows that ROKRAT by Group123 (North Korea), shared... https://fb.me/1lOf3WrAv
2018-02-04 10:45:13 Fun fact: @IntezerLabs shows that ROKRAT by Group123 (North Korea), shared code with Iranian APT ISMAgent. Code is WinHTTPClient from @codeproject. This is the third time I see these two threat actors using same @codeproject code. https://analyze.intezer.com/ /analyses/ecbfc016-eced-4d2b-877b-58ab84d9ac7b …pic.twitter.com/Mqsi0QiyZj
2018-02-03 04:48:56 Retweeted Vitali Kremez (@VK_Intel):Team, check our report w/ @iHeartMalware “Targeted Attacks Against South... https://fb.me/2Jv4mObZe
2018-02-03 02:50:18 Team, check our report w/ @iHeartMalware “Targeted Attacks Against South Korean Entities May Have Been as Early as November 2017”. While a patch for this 0day will be available on Feb 5, 2018, stay safe w/ YARA / SNORT sigs cc @FlashpointIntel DFIR https://www.flashpoint-intel.com/blog/targeted-attacks-south-korean-entities/ …pic.twitter.com/Tjif0HsqCf
2018-02-02 22:40:23 Retweeted CIPProject (@cyberintproject):Heres a CVE-2018-4878 sample on @HybridAnalysis :... https://fb.me/8wOZgpzpq
2018-02-02 18:44:45 Heres a CVE-2018-4878 sample on @HybridAnalysis : https://www.hybrid-analysis.com/sample/3b1395f620e428c5f68c6497a2338da0c4f749feb64e8f12e4c5b1288cc57a1c?environmentId=110 …Hardcoded with following URL: hxxp://www.korea-tax[.]info/main/local.phpAll reported by @TalosSecurity here:http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html … threatintel Flash Exploit 0day
2018-02-02 17:37:57 Retweeted Costin Raiu (@craiu):Nice technique in the Flash zero-day exploit from @r00tbsd and @SecurityBeards... https://fb.me/8cNceotgi
2018-02-02 17:35:40 Nice technique in the Flash zero-day exploit from @r00tbsd and @SecurityBeards blog; code reaches out to remote server and sends an unique ID. Server replies with the 100 bytes decryption key for the next stage.

Linode is a privately owned virtual private server provider based in Galloway, New Jerse