CodeEngn Logo

Live

CodeEngn Live RSS는 국내외 Security 관련 사이트, 블로그, 뉴스 등의 RSS를 쉽고 빠르게 볼 수 있는 RSS Reader 입니다.

추가 및 변경 신청은 Contact 메뉴에서 요청 해주세요.

- Atom, RSS v1.0, RSS v2.0 지원

- Facebook, Twitter RSS 지원

- 3분마다 자동 Live 웹페이지 Refresh

- 5분마다 등록된 RSS 주소들에 대한 title, link 자동 데이터 수집

- title, article, date 검색 가능

- 국내사이트, 국내SNS 등의 분류별 보기 가능

- URL 상에 사용하지 않는 변수 동적 제거를 통한 URL 최적화

- 로그인된 사용자에게 Scrap 기능 제공

분류 RSS 목록
국내 사이트 [84] 0x90 / A-FIRST Reverse Engineering / Acuros Innovation / ASEC Threat Research Response blog / Binary`s blog / binish1story / Broken Code (window31) / ByJJoon Lab / COMPUTER in HAVU / DarkSoul.Story / Deok9 / Ezbeat의 도서관 / F-INSIGHT / Focus on KaiEn!! / FORENSIC-PROOF / GrayHash / Hack Creative / HACKABILITY / Hackers on the Ship / HackSum / HackSum / HackTalk Security / Hakawati Security Lab / I Dont Know Who I aM / int $0x80 / J0hn Doe / KaisHack GoN / kcats`s mindstory / kernelhack :D / KISA 인터넷침해대응센터::기술문서 / KISA 인터넷침해대응센터::보안공지 / KISA 인터넷침해대응센터::분석월보 / KISA 인터넷침해대응센터::사고노트 / kkoha / kth 개발자 블로그 / M0nst3rZ_TEAM_blog / MaJ3stY / Maxoverpro Lab / Misterleeee / n0fate Forensic Space / Noplanlife by JunePark / Only love / Out of Control / PacketInside / 네트워크 패킷 분석 블로그 / Pagez | Computer Security Study blog / passket.net / pieces of code / Pragmatic Forensics / Prof. Huy Kang Kim`s Lifelog (김휘강의 Lifelog) / pwn3r tistory / RedHidden 새빨간 거짓말 / REVERSERGOODBOY.KR / RExVuz / Ride the Lightning / RIGHT TO KNOW / S3ize th3 Day / Sasin / StolenByte World!! / Sup3Rv1s0R / TeamCR@K / Think Like a Man of Action and Act Like Man of Thought... / wannabe FALCON / window 쪼물딱 거리기 / www.reversecore.com / Yesterday you told me about the blue blue sky / ZIZI ‡‡‡ 선택과 집중~ ‡‡‡ / 내맘이 안그래 / 라온시큐어 보안기술연구팀 / 렇렇 / 미친감자 / 바나나맛 페이로드 / 바다란 세상 가장 낮은 곳의 또 다른 이름 / 바이너리에 따뜻한 영혼을 / 보안프로젝트 / 복지 기업 CEO 니키 / 세상에서 가장 안전한 이름, 안랩 / 시스코 블로그 / 아폴로씨의 잡다한 경험들.. / 안랩인들이 만들어가는 커뮤니케이션 블로그 / 울지않는벌새 / 인터넷과 보안 / 잉카인터넷 대응팀 / 쿨캣의 블로그 놀이 / 헐랭이와 IT보안 (opt9 IT Security) /
국외 사이트 [29] /dev/ttyS0 | Embedded Device Hacking / codezen.fr / Darknet / Download Hacking Tools at Tools Yard / Eric Romang Blog / Exploit Database Blog / Fiddler / Flylogic`s Analytical Blog / Hack a Day / IC reverse engineering / InfoSec Research / IOActive Labs Research / j00ru//vx tech blog / MNIN Security Blog / NYU Poly ISIS Lab / Project Zero / reddit netsec / reddit ReverseEngineering / Reverse Engineering Mac OS X / Reverse Engineering Mac OS X / Security-Shell / SecurityXploded Latest Security Articles / SecurityXploded Latest Security News / SecurityXploded Latest Security Tools / sla.ckers / The Adallom Blog / The Hacker News [ THN ] / VNSECURITY Blog / w00tsec /
국내 twitter [7] beist Twitter / estima7 Twitter / ITL, SANS 코리아 Twitter / Matt Twitter / passket Twitter / 김승주 Twitter / 바다란 Twitter /
국외 twitter [32] aboutsecurity Twitter / armitagehacker Twitter / bartblaze Twitter / BorjaMerino Twitter / carlosacastillo Twitter / Carlos_Perez Twitter / Dinosn Twitter / energizedtech Twitter / geeknik Twitter / gN3mes1s Twitter / Hfuhs Twitter / hiddenillusion Twitter / j00ru Twitter / jedisct1 Twitter / Jhaddix Twitter / juneb_get_help Twitter / mikefrobbins Twitter / osxreverser Twitter / Phreaky Twitter / PhysicalDrive0 Twitter / pof Twitter / ProjectHoneynet Twitter / quequero Twitter / r0bertmart1nez Twitter / r_netsec Twitter / secdocs Twitter / securitytube Twitter / SecurityXploded Twitter / Security_FAQs Twitter / soaj1664ashar Twitter / teamcymru Twitter / xanda Twitter /
Facebook [1] 보안프로젝트 리서치 /
국내 보안뉴스 [2] 데일리시큐 / 보안뉴스 /
국외 보안뉴스 [1] Zero Day | ZDNet /



검색된 RSS Articles : 3,115 개 / Lastupdate : 2017-04-24 12:27:15



pof Twitter


Telematics engineer, Linux sysadmin, developer, security enthusiast, open source advocate with a strong passion for Android devices and chiptune music lover. Barcelona · pof.eslack.org

RSS Articles : 3,115
URL : twitter.com/pof
RSS : CodeEngn Live RSS 엔진

Date Article
2017-04-21 23:34:56 Vulnerability Exploitation and Mitigation in Android: https://source.android.com/security/reports/zer0-conf-2017-Your-Move.pdf …
2017-04-21 23:01:38 recordings of first osmocon (osmocom conference) at https://media.ccc.de/c/osmocon17
2017-04-21 19:30:33 Researchers at @IOActive have analyzed Linksys routers and discovered a total of 10 vulnerabilities: http://ow.ly/TXYW30b1WSK  Security
2017-04-20 09:45:26 Attacking ARM Trustzone using Rowhammer by @eshardNews (direct link) http://www.eshard.com/wp-content/plugins/email-before-download/download.php?dl=9465aa084ff0f070a3acedb56bcb34f5 …
2017-04-20 09:26:42 Download eshards slides on Attack ARM TrustZone using Rowhammer” presented at IRISA iN Rennes recently https://tinyurl.com/lmclyyh
2017-04-20 03:31:43 Android Kernel Exploitation Playground HT @Fuzion24 https://github.com/Fuzion24/AndroidKernelExploitationPlayground …
2017-04-19 17:13:46 @yung_vats / @_argps Infiltrate 2017 slides on Android libc heap exploitation, abstract https://census-labs.com/news/2017/04/18/infiltrate-2017/ … PDF https://census-labs.com/media/shadow-infiltrate-2017.pdf …
2017-04-19 14:40:38 How attackers were discovered inside a mobile operator during a routine audit https://conference.hitb.org/hitbsecconf2017ams/materials/D2T4프로20-프로20Emmanuel프로20Gadaix프로20-프로20A프로20Surprise프로20Encounter프로20With프로20a프로20Telco프로20APT.pdf … (PDF)Guess who had Solaris 0day? pic.twitter.com/crcxJGlqiW
2017-04-18 22:22:31 ReDex: An Android Bytecode Optimizer, optimizes .dex bytecode http://fbredex.com by @fbOpenSource
2017-04-18 13:30:58 Slide deck from @yung_vats and mine @InfiltrateCon 2017 talk The Shadow over Android: https://census-labs.com/news/2017/04/18/infiltrate-2017/ …
2017-04-17 14:50:06 And here you go, in case someone wanna help with OpenSnitch development, Ive just opened the repo https://github.com/evilsocket/opensnitch … (bad q. code)
2017-04-16 23:13:01 How not to do certificate-pinning: trust any certificate for any domain signed by the pinned certificate. Ouch. http://bristolcrypto.blogspot.gr/2017/04/is-your-banking-app-secure.html …
2017-04-14 23:07:08 Calling JNI Functions with Java Object Args from Cmd Line https://calebfenton.github.io/2017/04/14/calling_jni_functions_with_java_object_arguments_from_the_command_line/ …Great follow-up on https://calebfenton.github.io/2017/04/05/creating_java_vm_from_android_native_code/ …@caleb_fenton
2017-04-14 15:05:15 Via a 3556x3556 icon this app crashes package installer and systemui on many android devices lol http://www.apkmonk.com/download-app/com.minecolony/2_com.minecolony_2016-11-19.apk/ …
2017-04-12 08:43:00 Abusing one and a half Chrome features for RCE on Android! You can now check our CanSecWest slides. https://www.slideshare.net/CanSecWest/csw2017-geshevmiller-logic-bug-hunting-in-chrome-on-android … Pwn2Ownpic.twitter.com/PWQDw0j5Cf
2017-04-11 17:03:52 Project Zero blog: Over The Air: Exploiting Broadcoms Wi-Fi Stack (Part 2) by @laginimaineb - https://googleprojectzero.blogspot.com/2017/04/over-air-exploiting-broadcoms-wi-fi_11.html …
2017-04-11 16:52:55 Finally: all* videos and slides of AndroidSecuritySymposium are online :-) https://www.youtube.com/playlist?list=PL61IkVbNYniXoAXEFtftfElcSDNZoCLpe … and https://usmile.at/symposium/program …
2017-04-10 02:07:27 Finally! AppMon now supports non-rooted android devices. :) http://dpnishant.github.io/appmon  CC: @fridadotre, @Mobile_Sec, @oleavr
2017-04-06 01:56:15 Creating a Java VM from Android Native Code http://buff.ly/2nd1Th6
2017-04-05 22:10:15 Ive done a little write-up about the PS4 4.0x exploit. Those more knowledgeable feel free to correct my mistakes :) https://github.com/Cryptogenic/Exploit-Writeups/blob/master/PS4/4.0x프로20WebKit프로20Exploit프로20Writeup.md …

Linode is a privately owned virtual private server provider based in Galloway, New Jerse