CodeEngn Logo

Live

CodeEngn Live RSS는 국내외 Security 관련 사이트, 블로그, 뉴스 등의 RSS를 쉽고 빠르게 볼 수 있는 RSS Reader 입니다.

추가 및 변경 신청은 Contact 메뉴에서 요청 해주세요.

- Atom, RSS v1.0, RSS v2.0 지원

- Facebook, Twitter RSS 지원

- 3분마다 자동 Live 웹페이지 Refresh

- 5분마다 등록된 RSS 주소들에 대한 title, link 자동 데이터 수집

- title, article, date 검색 가능

- 국내사이트, 국내SNS 등의 분류별 보기 가능

- URL 상에 사용하지 않는 변수 동적 제거를 통한 URL 최적화

- 로그인된 사용자에게 Scrap 기능 제공

분류 RSS 목록
국내 사이트 [84] 0x90 / A-FIRST Reverse Engineering / Acuros Innovation / ASEC Threat Research Response blog / Binary`s blog / binish1story / Broken Code (window31) / ByJJoon Lab / COMPUTER in HAVU / DarkSoul.Story / Deok9 / Ezbeat의 도서관 / F-INSIGHT / Focus on KaiEn!! / FORENSIC-PROOF / GrayHash / Hack Creative / HACKABILITY / Hackers on the Ship / HackSum / HackSum / HackTalk Security / Hakawati Security Lab / I Dont Know Who I aM / int $0x80 / J0hn Doe / KaisHack GoN / kcats`s mindstory / kernelhack :D / KISA 인터넷침해대응센터::기술문서 / KISA 인터넷침해대응센터::보안공지 / KISA 인터넷침해대응센터::분석월보 / KISA 인터넷침해대응센터::사고노트 / kkoha / kth 개발자 블로그 / M0nst3rZ_TEAM_blog / MaJ3stY / Maxoverpro Lab / Misterleeee / n0fate Forensic Space / Noplanlife by JunePark / Only love / Out of Control / PacketInside / 네트워크 패킷 분석 블로그 / Pagez | Computer Security Study blog / passket.net / pieces of code / Pragmatic Forensics / Prof. Huy Kang Kim`s Lifelog (김휘강의 Lifelog) / pwn3r tistory / RedHidden 새빨간 거짓말 / REVERSERGOODBOY.KR / RExVuz / Ride the Lightning / RIGHT TO KNOW / S3ize th3 Day / Sasin / StolenByte World!! / Sup3Rv1s0R / TeamCR@K / Think Like a Man of Action and Act Like Man of Thought... / wannabe FALCON / window 쪼물딱 거리기 / www.reversecore.com / Yesterday you told me about the blue blue sky / ZIZI ‡‡‡ 선택과 집중~ ‡‡‡ / 내맘이 안그래 / 라온시큐어 보안기술연구팀 / 렇렇 / 미친감자 / 바나나맛 페이로드 / 바다란 세상 가장 낮은 곳의 또 다른 이름 / 바이너리에 따뜻한 영혼을 / 보안프로젝트 / 복지 기업 CEO 니키 / 세상에서 가장 안전한 이름, 안랩 / 시스코 블로그 / 아폴로씨의 잡다한 경험들.. / 안랩인들이 만들어가는 커뮤니케이션 블로그 / 울지않는벌새 / 인터넷과 보안 / 잉카인터넷 대응팀 / 쿨캣의 블로그 놀이 / 헐랭이와 IT보안 (opt9 IT Security) /
국외 사이트 [29] /dev/ttyS0 | Embedded Device Hacking / codezen.fr / Darknet / Download Hacking Tools at Tools Yard / Eric Romang Blog / Exploit Database Blog / Fiddler / Flylogic`s Analytical Blog / Hack a Day / IC reverse engineering / InfoSec Research / IOActive Labs Research / j00ru//vx tech blog / MNIN Security Blog / NYU Poly ISIS Lab / Project Zero / reddit netsec / reddit ReverseEngineering / Reverse Engineering Mac OS X / Reverse Engineering Mac OS X / Security-Shell / SecurityXploded Latest Security Articles / SecurityXploded Latest Security News / SecurityXploded Latest Security Tools / sla.ckers / The Adallom Blog / The Hacker News [ THN ] / VNSECURITY Blog / w00tsec /
국내 twitter [7] beist Twitter / estima7 Twitter / ITL, SANS 코리아 Twitter / Matt Twitter / passket Twitter / 김승주 Twitter / 바다란 Twitter /
국외 twitter [32] aboutsecurity Twitter / armitagehacker Twitter / bartblaze Twitter / BorjaMerino Twitter / carlosacastillo Twitter / Carlos_Perez Twitter / Dinosn Twitter / energizedtech Twitter / geeknik Twitter / gN3mes1s Twitter / Hfuhs Twitter / hiddenillusion Twitter / j00ru Twitter / jedisct1 Twitter / Jhaddix Twitter / juneb_get_help Twitter / mikefrobbins Twitter / osxreverser Twitter / Phreaky Twitter / PhysicalDrive0 Twitter / pof Twitter / ProjectHoneynet Twitter / quequero Twitter / r0bertmart1nez Twitter / r_netsec Twitter / secdocs Twitter / securitytube Twitter / SecurityXploded Twitter / Security_FAQs Twitter / soaj1664ashar Twitter / teamcymru Twitter / xanda Twitter /
Facebook [1] 보안프로젝트 리서치 /
국내 보안뉴스 [2] 데일리시큐 / 보안뉴스 /
국외 보안뉴스 [1] Zero Day | ZDNet /



검색된 RSS Articles : 2,466 개 / Lastupdate : 2017-11-20 01:16:33



PhysicalDrive0 Twitter


Just another lawn mower guy Down The Wrong Rabbit Hole

RSS Articles : 2,466
URL : twitter.com/PhysicalDrive0
RSS : CodeEngn Live RSS 엔진

Date Article
2017-10-12 12:00:38 https://repo.quicksand.io/cb3429e608144909ef25df2605c24ec253b10b6e99cbb6657afa6b92e9f32fb5.html …pic.twitter.com/4tiGMBGYKP
2017-10-12 11:54:45 https://www.hybrid-analysis.com/sample/cb3429e608144909ef25df2605c24ec253b10b6e99cbb6657afa6b92e9f32fb5?environmentId=100 …https://twitter.com/c0d3inj3cT/status/918354661786001408 …
2017-10-11 20:44:17 Sample SHA256 ff02ccda5edbde243f5e10c01582af286e7e40d1cbbca6c2678664493ba093e5 https://www.hybrid-analysis.com/sample/ff02ccda5edbde243f5e10c01582af286e7e40d1cbbca6c2678664493ba093e5?environmentId=100 … FIN7https://twitter.com/icebrgdotio/status/916712287402102785 …
2017-10-10 17:20:19 Qihoo 360 Core Security detected an in-the-wild attack that leveraged CVE-2017-11826, an office 0day vulnerability.. https://goo.gl/VDmhF5 pic.twitter.com/jRAvvMcJJI
2017-10-08 15:07:37 Sample MD5 ce84640c3228925cc4815116dde968cb FormBook https://www.hybrid-analysis.com/sample/6e4ec3712cf641a31f4e9e4af7d9d7a84fd7da4cc2875c6aceb9a283ed0330d7?environmentId=100 …https://twitter.com/FireEye/status/915955938082910209 …
2017-10-08 00:08:37 For those still programming in x86 / x64 assembly, the excellent (and now defunct) JWASM has a successor: UASM http://www.terraspace.co.uk/uasm.html
2017-10-06 11:21:42 BLOG: Kernel Exploitation Case Study - Wild Pool Overflow on Win10 x64 RS2 (CVE-2016-3309 Reloaded): https://siberas.de/blog/2017/10/05/exploitation_case_study_wild_pool_overflow_CVE-2016-3309_reloaded.html … siberaspic.twitter.com/PQ41RCbGKs
2017-10-05 21:10:18 CCleaner attack Stage 2 Payload - Sample SHA256 dc9b5e8aa6ec86db8af0a7aa897ca61db3e5f3d2e0942e319074db1aaccfdc83 https://www.hybrid-analysis.com/sample/dc9b5e8aa6ec86db8af0a7aa897ca61db3e5f3d2e0942e319074db1aaccfdc83?environmentId=100 …
2017-10-05 16:22:41 Project Zero blog: Using Binary Diffing to Discover Windows Kernel Memory Disclosure Bugs by @j00ru - https://googleprojectzero.blogspot.com/2017/10/using-binary-diffing-to-discover.html …
2017-10-05 16:19:22 Refreshing research on Bypassing Intel Boot Guard https://embedi.com/blog/bypassing-intel-boot-guard … dont you miss it!
2017-10-05 13:16:04 SYSCON Backdoor Uses FTP as a C/C Channel http://blog.trendmicro.com/trendlabs-security-intelligence/syscon-backdoor-uses-ftp-as-a-cc-channel/ …
2017-10-03 20:17:50 CMSTAR B - C Sample https://www.hybrid-analysis.com/sample/f0f2215457200bb3003eecb277bf7e3888d16edcf132d88203b27966407c7dc3?environmentId=100 …https://www.hybrid-analysis.com/sample/b8ef93227b59e6c8d3a1494b4860d15be819fae17b57fd56bfff9a51b7972ff0?environmentId=100 …https://twitter.com/PhysicalDrive0/status/913858967310340097 …
2017-10-02 16:05:48 Slides for @ekoparty talk Abusing GDI for Ring0 Exploit Primitives: Evolution by @NicoEconomou are up! https://labs.bluefrostsecurity.de/publications/2017/10/02/abusing-gdi-for-ring0-exploit-primitives-evolution/ … eko13
2017-10-02 15:00:43 NEW BLOG POST: More Ties Uncovered Between CCleaner Hack / Chinese Hackers. http://www.intezer.com/evidence-aurora-operation-still-active-part-2-more-ties-uncovered-between-ccleaner-hack-chinese-hackers/ …pic.twitter.com/QtYh7CkdwH
2017-09-29 20:12:11 Threat Actors Target Government of Belarus Using CMSTAR Trojan https://researchcenter.paloaltonetworks.com/2017/09/unit42-threat-actors-target-government-belarus-using-cmstar-trojan/?utm_source=Adobe프로20Campaign프로20-프로20ACS/utm_medium=email/utm_campaign=Event프로20Invite프로20Email프로20Template프로20Unit프로2042프로2020170929/deliveryName=DM888 …
2017-09-28 18:26:59 Uploaded my BountyCraft slides, the State of Kernel-Mode RCE Defense: https://github.com/Microsoft/MSRC-Security-Research/blob/master/presentations/2017_07_BountyCraft/BountyCraft2017_JosephBialek_State_Of_Kernel_RCE_Mitigations.pdf …
2017-09-28 14:31:11 Our CyberArk Labs team found strange behavior in the file scanning process of Windows Defender An Illusion Gap: http://bit.ly/2fBmYiV
2017-09-28 14:23:56 Blog Post - Borrowing Microsoft Code Signing Certs - thanks to @mattifestation @midnite_runr and @gentilkiwi https://blog.conscioushacker.io/index.php/2017/09/27/borrowing-microsoft-code-signing-certificates/ …
2017-09-28 11:37:33 FIN7 IOCs https://www.icebrg.io/uploads/images/fin7-1.html …
2017-09-25 14:16:16 Additional information regarding the recent CCleaner APT security incident https://blog.avast.com/additional-information-regarding-the-recent-ccleaner-apt-security-incident …

Linode is a privately owned virtual private server provider based in Galloway, New Jerse