CodeEngn Logo

Live

CodeEngn Live RSS는 국내외 Security 관련 사이트, 블로그, 뉴스 등의 RSS를 쉽고 빠르게 볼 수 있는 RSS Reader 입니다.

추가 및 변경 신청은 Contact 메뉴에서 요청 해주세요.

- Atom, RSS v1.0, RSS v2.0 지원

- Facebook, Twitter RSS 지원

- 3분마다 자동 Live 웹페이지 Refresh

- 5분마다 등록된 RSS 주소들에 대한 title, link 자동 데이터 수집

- title, article, date 검색 가능

- 국내사이트, 국내SNS 등의 분류별 보기 가능

- URL 상에 사용하지 않는 변수 동적 제거를 통한 URL 최적화

- 로그인된 사용자에게 Scrap 기능 제공

분류 RSS 목록
국내 사이트 [84] 0x90 / A-FIRST Reverse Engineering / Acuros Innovation / ASEC Threat Research Response blog / Binary`s blog / binish1story / Broken Code (window31) / ByJJoon Lab / COMPUTER in HAVU / DarkSoul.Story / Deok9 / Ezbeat의 도서관 / F-INSIGHT / Focus on KaiEn!! / FORENSIC-PROOF / GrayHash / Hack Creative / HACKABILITY / Hackers on the Ship / HackSum / HackSum / HackTalk Security / Hakawati Security Lab / I Dont Know Who I aM / int $0x80 / J0hn Doe / KaisHack GoN / kcats`s mindstory / kernelhack :D / KISA 인터넷침해대응센터::기술문서 / KISA 인터넷침해대응센터::보안공지 / KISA 인터넷침해대응센터::분석월보 / KISA 인터넷침해대응센터::사고노트 / kkoha / kth 개발자 블로그 / M0nst3rZ_TEAM_blog / MaJ3stY / Maxoverpro Lab / Misterleeee / n0fate Forensic Space / Noplanlife by JunePark / Only love / Out of Control / PacketInside / 네트워크 패킷 분석 블로그 / Pagez | Computer Security Study blog / passket.net / pieces of code / Pragmatic Forensics / Prof. Huy Kang Kim`s Lifelog (김휘강의 Lifelog) / pwn3r tistory / RedHidden 새빨간 거짓말 / REVERSERGOODBOY.KR / RExVuz / Ride the Lightning / RIGHT TO KNOW / S3ize th3 Day / Sasin / StolenByte World!! / Sup3Rv1s0R / TeamCR@K / Think Like a Man of Action and Act Like Man of Thought... / wannabe FALCON / window 쪼물딱 거리기 / www.reversecore.com / Yesterday you told me about the blue blue sky / ZIZI ‡‡‡ 선택과 집중~ ‡‡‡ / 내맘이 안그래 / 라온시큐어 보안기술연구팀 / 렇렇 / 미친감자 / 바나나맛 페이로드 / 바다란 세상 가장 낮은 곳의 또 다른 이름 / 바이너리에 따뜻한 영혼을 / 보안프로젝트 / 복지 기업 CEO 니키 / 세상에서 가장 안전한 이름, 안랩 / 시스코 블로그 / 아폴로씨의 잡다한 경험들.. / 안랩인들이 만들어가는 커뮤니케이션 블로그 / 울지않는벌새 / 인터넷과 보안 / 잉카인터넷 대응팀 / 쿨캣의 블로그 놀이 / 헐랭이와 IT보안 (opt9 IT Security) /
국외 사이트 [29] /dev/ttyS0 | Embedded Device Hacking / codezen.fr / Darknet / Download Hacking Tools at Tools Yard / Eric Romang Blog / Exploit Database Blog / Fiddler / Flylogic`s Analytical Blog / Hack a Day / IC reverse engineering / InfoSec Research / IOActive Labs Research / j00ru//vx tech blog / MNIN Security Blog / NYU Poly ISIS Lab / Project Zero / reddit netsec / reddit ReverseEngineering / Reverse Engineering Mac OS X / Reverse Engineering Mac OS X / Security-Shell / SecurityXploded Latest Security Articles / SecurityXploded Latest Security News / SecurityXploded Latest Security Tools / sla.ckers / The Adallom Blog / The Hacker News [ THN ] / VNSECURITY Blog / w00tsec /
국내 twitter [7] beist Twitter / estima7 Twitter / ITL, SANS 코리아 Twitter / Matt Twitter / passket Twitter / 김승주 Twitter / 바다란 Twitter /
국외 twitter [32] aboutsecurity Twitter / armitagehacker Twitter / bartblaze Twitter / BorjaMerino Twitter / carlosacastillo Twitter / Carlos_Perez Twitter / Dinosn Twitter / energizedtech Twitter / geeknik Twitter / gN3mes1s Twitter / Hfuhs Twitter / hiddenillusion Twitter / j00ru Twitter / jedisct1 Twitter / Jhaddix Twitter / juneb_get_help Twitter / mikefrobbins Twitter / osxreverser Twitter / Phreaky Twitter / PhysicalDrive0 Twitter / pof Twitter / ProjectHoneynet Twitter / quequero Twitter / r0bertmart1nez Twitter / r_netsec Twitter / secdocs Twitter / securitytube Twitter / SecurityXploded Twitter / Security_FAQs Twitter / soaj1664ashar Twitter / teamcymru Twitter / xanda Twitter /
Facebook [1] 보안프로젝트 리서치 /
국내 보안뉴스 [2] 데일리시큐 / 보안뉴스 /
국외 보안뉴스 [1] Zero Day | ZDNet /



검색된 RSS Articles : 6,048 개 / Lastupdate : 2017-07-21 03:42:52



gN3mes1s Twitter


Malware Analysis ~ Reversing ~ Security ~ Programming ~ Linux ~ Windows ~ Android Italy ~ Naples · quequero.org

RSS Articles : 6,048
URL : twitter.com/gN3mes1s
RSS : CodeEngn Live RSS 엔진

Date Article
2017-07-20 07:00:36 NtLoadEnclaveData Win10 RS3 MS feature to load unsigned drivers via DSE bypass. Stability/ quality of code reigns! https://gist.github.com/hfiref0x/1ac328a8e73d053012e02955d38e36a8 …
2017-07-20 06:48:32 aaaaand its up! ATT/CK now includes the first version of Mac and Linux techniques. https://attack.mitre.org/wiki/Main_Page
2017-07-20 00:00:10 In 2017,you can send a phishing link with an UNC iframe pointing to your Responder VPS, crack that hash and connect back via VPN Win10Rockspic.twitter.com/eFwkQ8pg3H
2017-07-19 21:47:28 Extracting master key and decrypting passwords and NTLM credentials on Win10 VSM. By @a_furtak @mikhailgorobets @c7zero @ABazhaniukpic.twitter.com/zuuMirfuqy
2017-07-19 20:16:13 RS3 Exploit Guard mitigations (specifically, EAF ported from EMET) block the DOUBLEPULSAR user-mode shellcode pic.twitter.com/G7lbldFDbK
2017-07-19 20:01:23 New tutorial for ARM Exploit Development beginners: Process Memory and Memory Corruptions (Stack and Heap) - https://azeria-labs.com/process-memory-and-memory-corruption/ …pic.twitter.com/lS6AvkwGQx
2017-07-19 14:51:48 My first blog post at @FSecure could not had a more important message. Break your own product, and break it hard. https://labsblog.f-secure.com/2017/07/19/break-your-own-product-and-break-it-hard/ …
2017-07-18 16:26:56 Learn how to write shellcode in ARM Assembly with my new tutorial Part 1: Writing ARM Shellcode https://azeria-labs.com/writing-arm-shellcode/ …pic.twitter.com/i5QEMSL52A
2017-07-18 13:44:34 So proud of my intern! Here is his blog: Ten Process Injection Techniques by @ashkanhosseini https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process …pic.twitter.com/BRNAinCGtQ
2017-07-18 13:41:06 New post on our methodology behind Threat Modeling and Indicator Design! https://posts.specterops.io/host-based-threat-modeling-indicator-design-a9dbbb53d5ea … cc @MITREattack @SpecterOps
2017-07-18 12:57:32 Windows Scripting Host disabled? no problem, then use its components in other ways like in VBA and Javascript, mshta.exe signed and trustedpic.twitter.com/dtJl9wG4j7
2017-07-18 00:43:35 Pyrebox is a new Qemu-based dynamic instrumentation tool with Python scripts, from Cisco Talos! CapstoneInside https://github.com/Cisco-Talos/pyrebox …pic.twitter.com/3125wSi4hC
2017-07-17 20:00:45 A tale of VMWare Guest to Host Escape Part - I we published bit lately :( Enjoy :) https://securingtomorrow.mcafee.com/mcafee-labs/analyzing-patch-of-a-virtual-machine-escape-on-vmware/ …cc:@McAfee_Labspic.twitter.com/E4TTJGUu9q
2017-07-17 19:14:55 Here you go. Bypassing Microsofts Patch for CVE-2017-0199 http://justhaifei1.blogspot.com/2017/07/bypassing-microsofts-cve-2017-0199-patch.html …. CVE-2017-8570.
2017-07-17 16:49:36 New blog entry: The Synesthesia Shellcode Generator: Code Release and Future Directions http://www.msreverseengineering.com/blog/2017/7/15/the-synesthesia-shellcode-generator-code-release-and-future-directions …
2017-07-17 16:42:25 Multiple Cisco Webex remote code execution vulnerabilities, and working exploit https://bugs.chromium.org/p/project-zero/issues/detail?id=1324 …. Patch ASAP.
2017-07-17 15:34:33 [blog] The PowerView PowerUsage Series 1 - the start to a series of operationally-focused PowerView posts https://posts.specterops.io/the-powerview-powerusage-series-1-c1566d7faef0 …
2017-07-17 14:09:47 Demo of successful proof of concept of SMM trampoline to 64 bit mode by @coreboot: https://github.com/rminnich/linux/commit/99915665c1128afb02c8b6c270591293fbc9c613 …
2017-07-17 13:11:54 My colleague @invictus1306 wrote an article about ARM exploitation for IoT - Episode 1 - https://quequero.org/2017/07/arm-exploitation-iot-episode-1/ …
2017-07-17 11:13:35 Todays burning question: why did someone give a DDR3 DIMM the capability to directly send packets over the network? (yes really)

Linode is a privately owned virtual private server provider based in Galloway, New Jerse