CodeEngn Logo

Live

CodeEngn Live RSS는 국내외 Security 관련 사이트, 블로그, 뉴스 등의 RSS를 쉽고 빠르게 볼 수 있는 RSS Reader 입니다.

추가 및 변경 신청은 Contact 메뉴에서 요청 해주세요.

- Atom, RSS v1.0, RSS v2.0 지원

- Facebook, Twitter RSS 지원

- 3분마다 자동 Live 웹페이지 Refresh

- 5분마다 등록된 RSS 주소들에 대한 title, link 자동 데이터 수집

- title, article, date 검색 가능

- 국내사이트, 국내SNS 등의 분류별 보기 가능

- URL 상에 사용하지 않는 변수 동적 제거를 통한 URL 최적화

- 로그인된 사용자에게 Scrap 기능 제공

분류 RSS 목록
국내 사이트 [84] 0x90 / A-FIRST Reverse Engineering / Acuros Innovation / ASEC Threat Research Response blog / Binary`s blog / binish1story / Broken Code (window31) / ByJJoon Lab / COMPUTER in HAVU / DarkSoul.Story / Deok9 / Ezbeat의 도서관 / F-INSIGHT / Focus on KaiEn!! / FORENSIC-PROOF / GrayHash / Hack Creative / HACKABILITY / Hackers on the Ship / HackSum / HackSum / HackTalk Security / Hakawati Security Lab / I Dont Know Who I aM / int $0x80 / J0hn Doe / KaisHack GoN / kcats`s mindstory / kernelhack :D / KISA 인터넷침해대응센터::기술문서 / KISA 인터넷침해대응센터::보안공지 / KISA 인터넷침해대응센터::분석월보 / KISA 인터넷침해대응센터::사고노트 / kkoha / kth 개발자 블로그 / M0nst3rZ_TEAM_blog / MaJ3stY / Maxoverpro Lab / Misterleeee / n0fate Forensic Space / Noplanlife by JunePark / Only love / Out of Control / PacketInside / 네트워크 패킷 분석 블로그 / Pagez | Computer Security Study blog / passket.net / pieces of code / Pragmatic Forensics / Prof. Huy Kang Kim`s Lifelog (김휘강의 Lifelog) / pwn3r tistory / RedHidden 새빨간 거짓말 / REVERSERGOODBOY.KR / RExVuz / Ride the Lightning / RIGHT TO KNOW / S3ize th3 Day / Sasin / StolenByte World!! / Sup3Rv1s0R / TeamCR@K / Think Like a Man of Action and Act Like Man of Thought... / wannabe FALCON / window 쪼물딱 거리기 / www.reversecore.com / Yesterday you told me about the blue blue sky / ZIZI ‡‡‡ 선택과 집중~ ‡‡‡ / 내맘이 안그래 / 라온시큐어 보안기술연구팀 / 렇렇 / 미친감자 / 바나나맛 페이로드 / 바다란 세상 가장 낮은 곳의 또 다른 이름 / 바이너리에 따뜻한 영혼을 / 보안프로젝트 / 복지 기업 CEO 니키 / 세상에서 가장 안전한 이름, 안랩 / 시스코 블로그 / 아폴로씨의 잡다한 경험들.. / 안랩인들이 만들어가는 커뮤니케이션 블로그 / 울지않는벌새 / 인터넷과 보안 / 잉카인터넷 대응팀 / 쿨캣의 블로그 놀이 / 헐랭이와 IT보안 (opt9 IT Security) /
국외 사이트 [29] /dev/ttyS0 | Embedded Device Hacking / codezen.fr / Darknet / Download Hacking Tools at Tools Yard / Eric Romang Blog / Exploit Database Blog / Fiddler / Flylogic`s Analytical Blog / Hack a Day / IC reverse engineering / InfoSec Research / IOActive Labs Research / j00ru//vx tech blog / MNIN Security Blog / NYU Poly ISIS Lab / Project Zero / reddit netsec / reddit ReverseEngineering / Reverse Engineering Mac OS X / Reverse Engineering Mac OS X / Security-Shell / SecurityXploded Latest Security Articles / SecurityXploded Latest Security News / SecurityXploded Latest Security Tools / sla.ckers / The Adallom Blog / The Hacker News [ THN ] / VNSECURITY Blog / w00tsec /
국내 twitter [7] beist Twitter / estima7 Twitter / ITL, SANS 코리아 Twitter / Matt Twitter / passket Twitter / 김승주 Twitter / 바다란 Twitter /
국외 twitter [32] aboutsecurity Twitter / armitagehacker Twitter / bartblaze Twitter / BorjaMerino Twitter / carlosacastillo Twitter / Carlos_Perez Twitter / Dinosn Twitter / energizedtech Twitter / geeknik Twitter / gN3mes1s Twitter / Hfuhs Twitter / hiddenillusion Twitter / j00ru Twitter / jedisct1 Twitter / Jhaddix Twitter / juneb_get_help Twitter / mikefrobbins Twitter / osxreverser Twitter / Phreaky Twitter / PhysicalDrive0 Twitter / pof Twitter / ProjectHoneynet Twitter / quequero Twitter / r0bertmart1nez Twitter / r_netsec Twitter / secdocs Twitter / securitytube Twitter / SecurityXploded Twitter / Security_FAQs Twitter / soaj1664ashar Twitter / teamcymru Twitter / xanda Twitter /
Facebook [1] 보안프로젝트 리서치 /
국내 보안뉴스 [2] 데일리시큐 / 보안뉴스 /
국외 보안뉴스 [1] Zero Day | ZDNet /



검색된 RSS Articles : 2,447 개 / Lastupdate : 2017-09-26 05:45:00



PhysicalDrive0 Twitter


Just another lawn mower guy Down The Wrong Rabbit Hole

RSS Articles : 2,447
URL : twitter.com/PhysicalDrive0
RSS : CodeEngn Live RSS 엔진

Date Article
2017-09-25 14:16:16 Additional information regarding the recent CCleaner APT security incident https://blog.avast.com/additional-information-regarding-the-recent-ccleaner-apt-security-incident …
2017-09-22 20:45:45 VxStream Sandbox Automated File Analysis (Verdict: malicious; Label: Trojan.Generic; TS: 79/100; AV: 67프로): https://www.hybrid-analysis.com/sample/14860b17c64e422194719f3359a134710478d112f6928cbd1ee071bf35fbae03?environmentId=100 …https://twitter.com/ESET/status/910892598956404736 …
2017-09-20 22:06:13 APT supply chain attack to compromise 700k+ machines targetting 20 specific tech companies ccleaner APT17 http://blog.talosintelligence.com/2017/09/ccleaner-c2-concern.html … …
2017-09-20 20:32:06 + http://irancybernews.org/en/ICNA/6/393/
2017-09-20 14:26:29 BLOG | Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and Energy Sectors http://bddy.me/2xes0c1 pic.twitter.com/R1wn4wHadH
2017-09-19 20:48:28 Sample SHA256 24bc305961cf033f78bc1a162c41a7c1a53836a6ccbb197a5669b5f8a9f5251d https://www.hybrid-analysis.com/sample/24bc305961cf033f78bc1a162c41a7c1a53836a6ccbb197a5669b5f8a9f5251d?environmentId=100 …https://twitter.com/TrendLabs/status/902856112931819525 …
2017-09-19 10:08:45 I added a write up of this exploit along with some details of the patch and Yara detection rules here https://github.com/nccgroup/CVE-2017-8759/ …https://twitter.com/buffaloverflow/status/907718338264084486 …
2017-09-18 14:10:41 September MS Patch Tuesday roundup: 7 kernel infoleaks via Bochspwn and 2 stray TTF bugs in win32k. Reports open at https://bugs.chromium.org/p/project-zero/issues/list?can=1/q=fixed프로3A2017-sep-12+finder프로3Amjurczyk …
2017-09-17 20:08:11 Interesting Windows Messaging based evasion in DLL used in Targeted Attack on Belarus MOD - https://goo.gl/1JGtdp  cc: @PhysicalDrive0pic.twitter.com/yYLBoIOmei
2017-09-17 16:33:12 Sample MD5 d996bdc411c936ac5581386506e79ff4 https://malwr.com/analysis/YWU4MGY2NDRmZDhlNDBlYTljNTA1NTI3MGEyYThlMDU/ …https://twitter.com/sans_isc/status/902537761374253056 …
2017-09-14 21:18:11 CVE-2017-0213: Windows COM Elevation of Privilege Vulnerability https://github.com/WindowsExploits/Exploits/tree/master/CVE-2017-0213/Binaries …
2017-09-14 18:09:40 Welcome to IDA Pro 7.0 https://www.hex-rays.com/products/ida/7.0/index.shtml …
2017-09-14 17:43:25 Microsoft Edge: ACG bypass using DuplicateHandle https://bugs.chromium.org/p/project-zero/issues/detail?id=1299 …
2017-09-14 01:39:02 malware tracker blog: Signature Dev using QuickSand.io for RTF CVE-2017-8759 http://blog.malwaretracker.com/2017/09/signature-dev-using-quicksandio-for-rtf.html?spref=tw …
2017-09-12 21:29:59 Sample VxStream Sandbox Automated File Analysis (Verdict: malicious; Label: Trojan.Mdropper; TS: 100/100; AV: 1프로): https://www.hybrid-analysis.com/sample/0b4ef455e385b750d9f90749f1467eaf00e46e8d6c2885c260e1b78211a51684?environmentId=100 …https://twitter.com/PhysicalDrive0/status/907706464772517889 …
2017-09-12 21:06:31 Payload First submission 2017-08-25 04:30:33 UTC https://www.virustotal.com/it/file/b035ca2d174e5e4fd2d66fd3c8ce4ae5c1e75cf3290af872d1adb2658852afb8/analysis/1505250174/ …pic.twitter.com/Ool6SWhSuY
2017-09-12 20:44:20 CVE-2017-8759 VT 1/58 0day FINSPYpic.twitter.com/xwTUPjbwYY
2017-09-12 19:01:28 CVE-2017-8759 0day distributes Finspy - detected / blocked in WDATP - blog by Elia Florio (ty @fireeye for assist) http://ow.ly/6Yuj30f6ne5
2017-09-11 19:50:49 My 2nd part to the kernel pool series: Windows kernel pool spraying fun - Part 2 - More objects: https://theevilbit.blogspot.com/2017/09/windows-kernel-pool-spraying-fun-part-2.html …
2017-09-11 18:26:23 Windows PsSetLoadImageNotifyRoutine Callbacks: the Good, the Bad and the Unclear (Part 2) https://breakingmalware.com/documentation/windows-pssetloadimagenotifyroutine-callbacks-good-bad-unclear-part-2/ …

Linode is a privately owned virtual private server provider based in Galloway, New Jerse