CodeEngn Logo

Live

CodeEngn Live RSS는 국내외 Security 관련 사이트, 블로그, 뉴스 등의 RSS를 쉽고 빠르게 볼 수 있는 RSS Reader 입니다.

추가 및 변경 신청은 Contact 메뉴에서 요청 해주세요.

- Atom, RSS v1.0, RSS v2.0 지원

- Facebook, Twitter RSS 지원

- 3분마다 자동 Live 웹페이지 Refresh

- 5분마다 등록된 RSS 주소들에 대한 title, link 자동 데이터 수집

- title, article, date 검색 가능

- 국내사이트, 국내SNS 등의 분류별 보기 가능

- URL 상에 사용하지 않는 변수 동적 제거를 통한 URL 최적화

- 로그인된 사용자에게 Scrap 기능 제공

분류 RSS 목록
국내 사이트 [84] 0x90 / A-FIRST Reverse Engineering / Acuros Innovation / ASEC Threat Research Response blog / Binary`s blog / binish1story / Broken Code (window31) / ByJJoon Lab / COMPUTER in HAVU / DarkSoul.Story / Deok9 / Ezbeat의 도서관 / F-INSIGHT / Focus on KaiEn!! / FORENSIC-PROOF / GrayHash / Hack Creative / HACKABILITY / Hackers on the Ship / HackSum / HackSum / HackTalk Security / Hakawati Security Lab / I Dont Know Who I aM / int $0x80 / J0hn Doe / KaisHack GoN / kcats`s mindstory / kernelhack :D / KISA 인터넷침해대응센터::기술문서 / KISA 인터넷침해대응센터::보안공지 / KISA 인터넷침해대응센터::분석월보 / KISA 인터넷침해대응센터::사고노트 / kkoha / kth 개발자 블로그 / M0nst3rZ_TEAM_blog / MaJ3stY / Maxoverpro Lab / Misterleeee / n0fate Forensic Space / Noplanlife by JunePark / Only love / Out of Control / PacketInside / 네트워크 패킷 분석 블로그 / Pagez | Computer Security Study blog / passket.net / pieces of code / Pragmatic Forensics / Prof. Huy Kang Kim`s Lifelog (김휘강의 Lifelog) / pwn3r tistory / RedHidden 새빨간 거짓말 / REVERSERGOODBOY.KR / RExVuz / Ride the Lightning / RIGHT TO KNOW / S3ize th3 Day / Sasin / StolenByte World!! / Sup3Rv1s0R / TeamCR@K / Think Like a Man of Action and Act Like Man of Thought... / wannabe FALCON / window 쪼물딱 거리기 / www.reversecore.com / Yesterday you told me about the blue blue sky / ZIZI ‡‡‡ 선택과 집중~ ‡‡‡ / 내맘이 안그래 / 라온시큐어 보안기술연구팀 / 렇렇 / 미친감자 / 바나나맛 페이로드 / 바다란 세상 가장 낮은 곳의 또 다른 이름 / 바이너리에 따뜻한 영혼을 / 보안프로젝트 / 복지 기업 CEO 니키 / 세상에서 가장 안전한 이름, 안랩 / 시스코 블로그 / 아폴로씨의 잡다한 경험들.. / 안랩인들이 만들어가는 커뮤니케이션 블로그 / 울지않는벌새 / 인터넷과 보안 / 잉카인터넷 대응팀 / 쿨캣의 블로그 놀이 / 헐랭이와 IT보안 (opt9 IT Security) /
국외 사이트 [29] /dev/ttyS0 | Embedded Device Hacking / codezen.fr / Darknet / Download Hacking Tools at Tools Yard / Eric Romang Blog / Exploit Database Blog / Fiddler / Flylogic`s Analytical Blog / Hack a Day / IC reverse engineering / InfoSec Research / IOActive Labs Research / j00ru//vx tech blog / MNIN Security Blog / NYU Poly ISIS Lab / Project Zero / reddit netsec / reddit ReverseEngineering / Reverse Engineering Mac OS X / Reverse Engineering Mac OS X / Security-Shell / SecurityXploded Latest Security Articles / SecurityXploded Latest Security News / SecurityXploded Latest Security Tools / sla.ckers / The Adallom Blog / The Hacker News [ THN ] / VNSECURITY Blog / w00tsec /
국내 twitter [7] beist Twitter / estima7 Twitter / ITL, SANS 코리아 Twitter / Matt Twitter / passket Twitter / 김승주 Twitter / 바다란 Twitter /
국외 twitter [32] aboutsecurity Twitter / armitagehacker Twitter / bartblaze Twitter / BorjaMerino Twitter / carlosacastillo Twitter / Carlos_Perez Twitter / Dinosn Twitter / energizedtech Twitter / geeknik Twitter / gN3mes1s Twitter / Hfuhs Twitter / hiddenillusion Twitter / j00ru Twitter / jedisct1 Twitter / Jhaddix Twitter / juneb_get_help Twitter / mikefrobbins Twitter / osxreverser Twitter / Phreaky Twitter / PhysicalDrive0 Twitter / pof Twitter / ProjectHoneynet Twitter / quequero Twitter / r0bertmart1nez Twitter / r_netsec Twitter / secdocs Twitter / securitytube Twitter / SecurityXploded Twitter / Security_FAQs Twitter / soaj1664ashar Twitter / teamcymru Twitter / xanda Twitter /
Facebook [1] 보안프로젝트 리서치 /
국내 보안뉴스 [2] 데일리시큐 / 보안뉴스 /
국외 보안뉴스 [1] Zero Day | ZDNet /



검색된 RSS Articles : 6,472 개 / Lastupdate : 2018-02-25 10:59:14



gN3mes1s Twitter


Malware Analysis ~ Reversing ~ Security ~ Programming ~ Linux ~ Windows ~ Android Italy ~ Naples · quequero.org

RSS Articles : 6,472
URL : twitter.com/gN3mes1s
RSS : CodeEngn Live RSS 엔진

Date Article
2018-02-15 16:39:07 Blog: EternalGlue part two: A rebuilt NotPetya gets its first execution outside of the lab - https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/february/eternalglue-part-two-a-rebuilt-notpetya-gets-its-first-execution-outside-of-the-lab/ … NotPetya Blueteam CyberSecuritypic.twitter.com/p9001mfZuW
2018-02-14 18:17:35 Elevating your privileges to get Trusted Installer in order to have full control over protected system files! https://decoder.cloud/2018/02/02/getting-system/ …pic.twitter.com/c5P4EEF4ww
2018-02-14 13:23:05 Life as a Purple Teamer:Red Me - Oh cool! A new exploit!Blue Me - Oh 프로 @*! A new exploit! PurpleTeam InfoSec RedvBluepic.twitter.com/E6uWHP6Qfe
2018-02-13 15:19:17 My slides on Reverse Engineering Windows Defenders JavaScript Engine are now online: https://recon.cx/2018/brussels/resources/slides/RECON-BRX-2018-Reverse-Engineering-Windows-Defender-s-JavaScript-Engine.pdf …https://twitter.com/reconbrx/status/963136543031545856 …
2018-02-13 14:47:29 I updated our OlympicDestroyer post. The malware has the capability to generate new binaries with the stolen credentials (by patching the PE). The list in the screenshot comes from previous executions and was not created by the devevelopers themself http://blog.talosintelligence.com/2018/02/olympic-destroyer.html …
2018-02-13 09:23:52 new blog post [Technical]:In debt to retpoline. https://cyber.wtf/2018/02/13/in-debt-to-retpoline/ …
2018-02-13 03:50:23 We finally are going to present our very cool work on using genetic algorithms to evolve perfect decompilation of C code!And to warm up before the talk, heres a bit of blogging on what we did: http://storm-country.com/blog/evo-deco
2018-02-13 00:45:09 Driver writers and architects should make threat modeling an integral part of the design process for any Windows driver. Read how. http://ow.ly/wVOH30iliAc
2018-02-13 00:31:22 work in progress but pretty soon this will randomly pick your simulation ATT/CK steps and write the file to run in the adversarial simulation engine (Metta - https://github.com/uber-common/metta …)pic.twitter.com/Gla9a4Hagn
2018-02-12 19:43:40 REcon BRX 2018 Slides are here !! https://recon.cx/2018/brussels/slides/ …
2018-02-12 11:50:37 Want learn how APTs operate? Theres a hidden section on my website, a rather extensive APT Stages 101. [1/n]Stages covered:1. Reconnaissance2. Initial compromise3. Persistence4. C/C5. Privilege escalation6. Lateral movement7. Asset discovery8. Data exfiltrationpic.twitter.com/4lFqFLOEE6
2018-02-11 19:03:02 Here you can find my analysis and PoC of BSOD from vulnerability on Namco and Capcom driver: https://f9.29wspy.ru/research.html  vulnerability malware poc driver windows
2018-02-10 01:12:17 Vshadow: Abusing the Volume Shadow Service for Evasion, Persistence, and Active Directory Database Extraction redteam blueteam dfir autoruns https://wp.me/p7MIao-42
2018-02-09 21:25:39 In case you missed it: last night, cybersecurity firm Cygilant melted down on social media and started insulting security researchers and professionals. Heres what happened, and our post-mortem. http://www.zdnet.com/article/security-firm-cygilant-apologies-after-social-media-meltdown/ …
2018-02-09 17:54:51 Installer plugins enable an attacker to load their (unsigned) code into a native (signed) macOS application. This is now my favorite payload for initial access on macOS. https://posts.specterops.io/malicious-installer-plugins-6e30991bb529 …
2018-02-09 16:28:08 Slides for my talk at itdefense are here. PowerShell PurpleTeam https://www.slideshare.net/nikhil_mittal/hacked-pray-that-the-attacker-used-powershell …
2018-02-09 14:42:40 For those asking, you can grab the Bandai driver from https://nofile.io/f/zfSGR9VwVDz/7EC93F34EB323823EB199FBF8D06219086D517D0E8F4B9E348D7AFD41EC9FD5D.sys …. Should work with @FuzzySecs PoSH-based Capcom exploit w/minimal changes. Device SymLink is now Htsysm7838. IOCTL addresses are the same.https://github.com/FuzzySecurity/PSKernel-Primitives/blob/master/Sample-Exploits/Capcom/CapCom-GDI-x64Universal.ps1 …
2018-02-09 14:29:45 This week I joined @MDSecLabs, such a unbelievably talented team! Check out my new blog post analysing CVE-2018-4878, and reviewing how exploitation techniques have evolved from HackingTeams CVE-2015-5119. https://www.mdsec.co.uk/2018/02/adobe-flash-exploitation-then-and-now-from-cve-2015-5119-to-cve-2018-4878/ …
2018-02-09 05:25:47 IAmEnlightened EffectiveMarketingStrategy ErasingHistorypic.twitter.com/zihvY25jMq
2018-02-08 21:07:55 Happy to announce @coalfirelabs just released Red Baron: a red team infrastructure automation tool! Ever wanted to create a C2 server and redirector with 8 lines of code? I got you covered. https://github.com/Coalfire-Research/Red-Baron …https://twitter.com/coalfirelabs/status/961706438463840258 …

Linode is a privately owned virtual private server provider based in Galloway, New Jerse