CodeEngn Logo

Live

CodeEngn Live RSS는 국내외 Security 관련 사이트, 블로그, 뉴스 등의 RSS를 쉽고 빠르게 볼 수 있는 RSS Reader 입니다.

추가 및 변경 신청은 Contact 메뉴에서 요청 해주세요.

- Atom, RSS v1.0, RSS v2.0 지원

- Facebook, Twitter RSS 지원

- 3분마다 자동 Live 웹페이지 Refresh

- 5분마다 등록된 RSS 주소들에 대한 title, link 자동 데이터 수집

- title, article, date 검색 가능

- 국내사이트, 국내SNS 등의 분류별 보기 가능

- URL 상에 사용하지 않는 변수 동적 제거를 통한 URL 최적화

- 로그인된 사용자에게 Scrap 기능 제공

분류 RSS 목록
국내 사이트 [84] 0x90 / A-FIRST Reverse Engineering / Acuros Innovation / ASEC Threat Research Response blog / Binary`s blog / binish1story / Broken Code (window31) / ByJJoon Lab / COMPUTER in HAVU / DarkSoul.Story / Deok9 / Ezbeat의 도서관 / F-INSIGHT / Focus on KaiEn!! / FORENSIC-PROOF / GrayHash / Hack Creative / HACKABILITY / Hackers on the Ship / HackSum / HackSum / HackTalk Security / Hakawati Security Lab / I Dont Know Who I aM / int $0x80 / J0hn Doe / KaisHack GoN / kcats`s mindstory / kernelhack :D / KISA 인터넷침해대응센터::기술문서 / KISA 인터넷침해대응센터::보안공지 / KISA 인터넷침해대응센터::분석월보 / KISA 인터넷침해대응센터::사고노트 / kkoha / kth 개발자 블로그 / M0nst3rZ_TEAM_blog / MaJ3stY / Maxoverpro Lab / Misterleeee / n0fate Forensic Space / Noplanlife by JunePark / Only love / Out of Control / PacketInside / 네트워크 패킷 분석 블로그 / Pagez | Computer Security Study blog / passket.net / pieces of code / Pragmatic Forensics / Prof. Huy Kang Kim`s Lifelog (김휘강의 Lifelog) / pwn3r tistory / RedHidden 새빨간 거짓말 / REVERSERGOODBOY.KR / RExVuz / Ride the Lightning / RIGHT TO KNOW / S3ize th3 Day / Sasin / StolenByte World!! / Sup3Rv1s0R / TeamCR@K / Think Like a Man of Action and Act Like Man of Thought... / wannabe FALCON / window 쪼물딱 거리기 / www.reversecore.com / Yesterday you told me about the blue blue sky / ZIZI ‡‡‡ 선택과 집중~ ‡‡‡ / 내맘이 안그래 / 라온시큐어 보안기술연구팀 / 렇렇 / 미친감자 / 바나나맛 페이로드 / 바다란 세상 가장 낮은 곳의 또 다른 이름 / 바이너리에 따뜻한 영혼을 / 보안프로젝트 / 복지 기업 CEO 니키 / 세상에서 가장 안전한 이름, 안랩 / 시스코 블로그 / 아폴로씨의 잡다한 경험들.. / 안랩인들이 만들어가는 커뮤니케이션 블로그 / 울지않는벌새 / 인터넷과 보안 / 잉카인터넷 대응팀 / 쿨캣의 블로그 놀이 / 헐랭이와 IT보안 (opt9 IT Security) /
국외 사이트 [29] /dev/ttyS0 | Embedded Device Hacking / codezen.fr / Darknet / Download Hacking Tools at Tools Yard / Eric Romang Blog / Exploit Database Blog / Fiddler / Flylogic`s Analytical Blog / Hack a Day / IC reverse engineering / InfoSec Research / IOActive Labs Research / j00ru//vx tech blog / MNIN Security Blog / NYU Poly ISIS Lab / Project Zero / reddit netsec / reddit ReverseEngineering / Reverse Engineering Mac OS X / Reverse Engineering Mac OS X / Security-Shell / SecurityXploded Latest Security Articles / SecurityXploded Latest Security News / SecurityXploded Latest Security Tools / sla.ckers / The Adallom Blog / The Hacker News [ THN ] / VNSECURITY Blog / w00tsec /
국내 twitter [7] beist Twitter / estima7 Twitter / ITL, SANS 코리아 Twitter / Matt Twitter / passket Twitter / 김승주 Twitter / 바다란 Twitter /
국외 twitter [32] aboutsecurity Twitter / armitagehacker Twitter / bartblaze Twitter / BorjaMerino Twitter / carlosacastillo Twitter / Carlos_Perez Twitter / Dinosn Twitter / energizedtech Twitter / geeknik Twitter / gN3mes1s Twitter / Hfuhs Twitter / hiddenillusion Twitter / j00ru Twitter / jedisct1 Twitter / Jhaddix Twitter / juneb_get_help Twitter / mikefrobbins Twitter / osxreverser Twitter / Phreaky Twitter / PhysicalDrive0 Twitter / pof Twitter / ProjectHoneynet Twitter / quequero Twitter / r0bertmart1nez Twitter / r_netsec Twitter / secdocs Twitter / securitytube Twitter / SecurityXploded Twitter / Security_FAQs Twitter / soaj1664ashar Twitter / teamcymru Twitter / xanda Twitter /
Facebook [1] 보안프로젝트 리서치 /
국내 보안뉴스 [2] 데일리시큐 / 보안뉴스 /
국외 보안뉴스 [1] Zero Day | ZDNet /



검색된 RSS Articles : 6,326 개 / Lastupdate : 2017-09-24 06:39:23



gN3mes1s Twitter


Malware Analysis ~ Reversing ~ Security ~ Programming ~ Linux ~ Windows ~ Android Italy ~ Naples · quequero.org

RSS Articles : 6,326
URL : twitter.com/gN3mes1s
RSS : CodeEngn Live RSS 엔진

Date Article
2017-09-23 15:00:39 The deck for our talk, Here Be Dragons: The Unexplored Land of Active Directory ACLs is now available here: https://www.slideshare.net/AndyRobbins3/here-be-dragons-the-unexplored-land-of-active-directory-acls …
2017-09-23 14:31:24 Here are the slides for Building Backdoors with WMI @DerbyconThank you to everyone who came to the talk! https://www.slideshare.net/AlexanderLeary/building-better-backdoors-with-wmi-derbycon-2017 …
2017-09-23 07:55:42 Downloaded content: https://ghostbin.com/paste/fhdq6  and persistent script: https://ghostbin.com/paste/b2r9g
2017-09-23 07:54:55 Email leads to zip with LNK powershell that downloads with bitsadmin, decodes with certutils the exe and runs Ramnit, geo-locked to Polandpic.twitter.com/fwxEKUbpCn
2017-09-22 22:52:59 Hotness from @0xbadjuju with a new stageless Empire.exe that doesnt need PoSH at all https://github.com/0xbadjuju/Sharpire … - git it meow!
2017-09-22 22:01:26 PSAmsi: A tool for auditing and defeating AMSI signatures. https://github.com/cobbr/PSAmsi
2017-09-22 21:21:55 Weve disabled V8s escape analysis in Chrome 61 to protect users against a security vulnerability. Details: https://v8project.blogspot.com/2017/09/disabling-escape-analysis.html …https://twitter.com/dwizzzleMSFT/status/911331010473799680 …
2017-09-22 16:19:48 My DerbyCon keynote on Subverting Trust: whitepaper: https://specterops.io/assets/resources/SpecterOps_Subverting_Trust_in_Windows.pdf … PoC Malicious SIP: https://github.com/mattifestation/PoCSubjectInterfacePackage … 2/2
2017-09-22 10:49:53 Hack the Hacker - Fuzzing mimikatz with WinAFL/Heatmaps (0day) https://www.sec-consult.com/en/blog/2017/09/hack-the-hacker-fuzzing-mimikatz-on-windows-with-winafl-heatmaps-0day/index.html … mimikatz WinAFL AFL fuzzing pentesting 0daypic.twitter.com/SXRHSPpZSQ
2017-09-22 09:27:04 Powershell Empire ITW via Excel Macro, http stager on @BNPParibas typosquatted domain (bnppparibasfortis) and offrespartenairespic.twitter.com/7CFE68NxNF
2017-09-22 07:10:48 [Blog Post] dbghost.exe - Ghost And The Darkness http://subt0x10.blogspot.co.uk/2017/09/dbghostexe-ghost-in-darkness.html …Whitelisting Bypass, almost too easy ;-)
2017-09-21 21:56:11 Blogged: Searching for content in Base-64 strings: http://www.leeholmes.com/blog/2017/09/21/searching-for-content-in-base-64-strings/ …pic.twitter.com/0sPVBj9fdc
2017-09-21 20:50:10 Interesting alternative for RedTeam, ThreatActors to dump LSASS. Use MSFT legitimate binary Sqldumper.exe instead of Procdump. DFIRpic.twitter.com/QGDKlYNDEV
2017-09-21 16:35:32 Project Zero blog: The Great DOM Fuzz-off of 2017 by @ifsecure (w/ new open source fuzzer) - https://googleprojectzero.blogspot.com/2017/09/the-great-dom-fuzz-off-of-2017.html …
2017-09-21 05:30:07 https://blog.avast.com/progress-on-ccleaner-investigation …
2017-09-20 22:06:05 CCleaner Command and Control Causes Concern http://dlvr.it/PpM5RP pic.twitter.com/qQ7tKdmPhq
2017-09-20 22:05:43 Its midnight but Im really happy to have participated to the analysis of the 2nd stage of the CCleaner backdoor http://blog.talosintelligence.com/2017/09/ccleaner-c2-concern.html …
2017-09-20 18:12:16 We did it: Intel ME 11.x arbitrary code execution, BHEU https://www.blackhat.com/eu-17/briefings/schedule/ how-to-hack-a-turned-off-computer-or-running-unsigned-code-in-intel-management-engine-8668 …
2017-09-20 18:06:54 sample https://www.hybrid-analysis.com/sample/41e90cdcc2b77f7a0676f5190d3c6d4d373e97b4dfae1ab426c75a021028784c?environmentId=100 … dropped: https://www.virustotal.com/ /file/610e6611b3b2e3bd85173cba76bf069fb7134b86f533141f79811fcc29d62b33/detection …accounts.hta https://ghostbin.com/paste/eeog8  pause.ps1 https://ghostbin.com/paste/2b7ff
2017-09-20 18:03:46 Trojan/Infostealer spreads using CVE-2017-8759, impersonates Explorer, persists in registry and tries to exfil info CVE20178759 cc @ReaQtapic.twitter.com/XiQjmCyEFo

Linode is a privately owned virtual private server provider based in Galloway, New Jerse