CodeEngn Logo

Live

CodeEngn Live RSS는 국내외 Security 관련 사이트, 블로그, 뉴스 등의 RSS를 쉽고 빠르게 볼 수 있는 RSS Reader 입니다.

추가 및 변경 신청은 Contact 메뉴에서 요청 해주세요.

- Atom, RSS v1.0, RSS v2.0 지원

- Facebook, Twitter RSS 지원

- 3분마다 자동 Live 웹페이지 Refresh

- 5분마다 등록된 RSS 주소들에 대한 title, link 자동 데이터 수집

- title, article, date 검색 가능

- 국내사이트, 국내SNS 등의 분류별 보기 가능

- URL 상에 사용하지 않는 변수 동적 제거를 통한 URL 최적화

- 로그인된 사용자에게 Scrap 기능 제공

분류 RSS 목록
국내 사이트 [84] 0x90 / A-FIRST Reverse Engineering / Acuros Innovation / ASEC Threat Research Response blog / Binary`s blog / binish1story / Broken Code (window31) / ByJJoon Lab / COMPUTER in HAVU / DarkSoul.Story / Deok9 / Ezbeat의 도서관 / F-INSIGHT / Focus on KaiEn!! / FORENSIC-PROOF / GrayHash / Hack Creative / HACKABILITY / Hackers on the Ship / HackSum / HackSum / HackTalk Security / Hakawati Security Lab / I Dont Know Who I aM / int $0x80 / J0hn Doe / KaisHack GoN / kcats`s mindstory / kernelhack :D / KISA 인터넷침해대응센터::기술문서 / KISA 인터넷침해대응센터::보안공지 / KISA 인터넷침해대응센터::분석월보 / KISA 인터넷침해대응센터::사고노트 / kkoha / kth 개발자 블로그 / M0nst3rZ_TEAM_blog / MaJ3stY / Maxoverpro Lab / Misterleeee / n0fate Forensic Space / Noplanlife by JunePark / Only love / Out of Control / PacketInside / 네트워크 패킷 분석 블로그 / Pagez | Computer Security Study blog / passket.net / pieces of code / Pragmatic Forensics / Prof. Huy Kang Kim`s Lifelog (김휘강의 Lifelog) / pwn3r tistory / RedHidden 새빨간 거짓말 / REVERSERGOODBOY.KR / RExVuz / Ride the Lightning / RIGHT TO KNOW / S3ize th3 Day / Sasin / StolenByte World!! / Sup3Rv1s0R / TeamCR@K / Think Like a Man of Action and Act Like Man of Thought... / wannabe FALCON / window 쪼물딱 거리기 / www.reversecore.com / Yesterday you told me about the blue blue sky / ZIZI ‡‡‡ 선택과 집중~ ‡‡‡ / 내맘이 안그래 / 라온시큐어 보안기술연구팀 / 렇렇 / 미친감자 / 바나나맛 페이로드 / 바다란 세상 가장 낮은 곳의 또 다른 이름 / 바이너리에 따뜻한 영혼을 / 보안프로젝트 / 복지 기업 CEO 니키 / 세상에서 가장 안전한 이름, 안랩 / 시스코 블로그 / 아폴로씨의 잡다한 경험들.. / 안랩인들이 만들어가는 커뮤니케이션 블로그 / 울지않는벌새 / 인터넷과 보안 / 잉카인터넷 대응팀 / 쿨캣의 블로그 놀이 / 헐랭이와 IT보안 (opt9 IT Security) /
국외 사이트 [29] /dev/ttyS0 | Embedded Device Hacking / codezen.fr / Darknet / Download Hacking Tools at Tools Yard / Eric Romang Blog / Exploit Database Blog / Fiddler / Flylogic`s Analytical Blog / Hack a Day / IC reverse engineering / InfoSec Research / IOActive Labs Research / j00ru//vx tech blog / MNIN Security Blog / NYU Poly ISIS Lab / Project Zero / reddit netsec / reddit ReverseEngineering / Reverse Engineering Mac OS X / Reverse Engineering Mac OS X / Security-Shell / SecurityXploded Latest Security Articles / SecurityXploded Latest Security News / SecurityXploded Latest Security Tools / sla.ckers / The Adallom Blog / The Hacker News [ THN ] / VNSECURITY Blog / w00tsec /
국내 twitter [7] beist Twitter / estima7 Twitter / ITL, SANS 코리아 Twitter / Matt Twitter / passket Twitter / 김승주 Twitter / 바다란 Twitter /
국외 twitter [32] aboutsecurity Twitter / armitagehacker Twitter / bartblaze Twitter / BorjaMerino Twitter / carlosacastillo Twitter / Carlos_Perez Twitter / Dinosn Twitter / energizedtech Twitter / geeknik Twitter / gN3mes1s Twitter / Hfuhs Twitter / hiddenillusion Twitter / j00ru Twitter / jedisct1 Twitter / Jhaddix Twitter / juneb_get_help Twitter / mikefrobbins Twitter / osxreverser Twitter / Phreaky Twitter / PhysicalDrive0 Twitter / pof Twitter / ProjectHoneynet Twitter / quequero Twitter / r0bertmart1nez Twitter / r_netsec Twitter / secdocs Twitter / securitytube Twitter / SecurityXploded Twitter / Security_FAQs Twitter / soaj1664ashar Twitter / teamcymru Twitter / xanda Twitter /
Facebook [1] 보안프로젝트 리서치 /
국내 보안뉴스 [2] 데일리시큐 / 보안뉴스 /
국외 보안뉴스 [1] Zero Day | ZDNet /



검색된 RSS Articles : 712 개 / Lastupdate : 2017-09-26 05:32:11



quequero Twitter


Reverse Engineering from last century... Italy · quequero.org

RSS Articles : 712
URL : twitter.com/quequero
RSS : CodeEngn Live RSS 엔진

Date Article
2017-09-12 12:38:40 ARM exploitation for IoT - part 2: https://quequero.org/2017/09/arm-exploitation-iot-episode-2 … thanks @invictus1306pic.twitter.com/WkBjZrd5mS
2017-09-05 09:51:10 Office macro drops uacme.exe that injects into taskhost.exe. Taskhost.exe privesc and creates a new Service that loads a ServiceDLL.pic.twitter.com/JxSWfVYkTj
2017-08-25 16:47:59 Abusing Token Privileges For LPE: https://github.com/hatRiot/token-priv/blob/master/abusing_token_eop_1.0.txt …
2017-07-29 07:25:17 Data Exfiltration via Cloud AV Sandbox: https://www.blackhat.com/docs/us-17/thursday/us-17-Kotler-The-Adventures-Of-Av-And-The-Leaky-Sandbox.pdf … BHUSApic.twitter.com/y6ysghbzPR
2017-07-21 08:35:46 ARM exploitation for IoT – Episode 1: https://quequero.org/2017/07/arm-exploitation-iot-episode-1/ …pic.twitter.com/xHTYTWeisn
2017-06-27 17:56:23 NotPetya encrypts all data then dumps credentials from memory and starts spreading to neighbouring hosts with psexec petya ransomwarepic.twitter.com/A3TlykXmDg
2017-06-14 11:50:53 Training a Bayesian neural network over the MNIST dataset with Tensorflow: https://alpha-i.co/blog/MNIST-for-ML-beginners-The-Bayesian-Way.html …pic.twitter.com/woUseMcbws
2017-06-13 16:14:49 Writing base64 and alphanumeric shellcode: https://blog.skullsecurity.org/2017/solving-b-64-b-tuff-writing-base64-and-alphanumeric-shellcode … this article evoked distant memories: http://phrack.org/issues/57/15.html article …pic.twitter.com/5AtFRrykwN
2017-06-01 11:30:35 Cheat Sheet of Machine Learning: https://unsupervisedmethods.com/cheat-sheet-of-machine-learning-and-python-and-math-cheat-sheets-a4afe4e791b6 …pic.twitter.com/dY2PtcZv2b
2017-05-13 17:19:00 I guess the DEFIANTWARRIOR team is partying hard today! wcry doublepulsar http://www.spiegel.de/media/media-35689.pdf …https://twitter.com/MalwareTechBlog/status/863252107817869312 …
2017-05-13 10:40:51 Impressive research on leveraging Intel PT for vulnerability discovery from @richinseattle! https://www.youtube.com/watch?v=r8lzui24Cdw … HITB2017AMS HITBAMSpic.twitter.com/ykbTOp2lGg
2017-04-20 17:03:26 Abusing Nvidia Node.js to Bypass AppLocker/Device Guard Whitelisting: http://blog.sec-consult.com/2017/04/application-whitelisting-application.html …pic.twitter.com/DuFqeFtl16
2017-04-18 17:51:56 Unitrends RCE (CVE-2017-7280) exploitation: https://rhinosecuritylabs.com/research/remote-code-execution-bug-hunting-chapter-2/ …pic.twitter.com/Uzpp3lVYVs
2017-03-30 11:21:02 Malicious Doc delivering Crypt0l0ker with new feature: TokenStealing using a kernel exploit. Blogpost soon. Sneak peek in images BHASIApic.twitter.com/y0R5ZggZXw
2017-02-01 14:08:52 We have no evidence... but its safe to say hackers are using A.I.. Please enjoy this gem http://www.csoonline.com/article/3163022/advanced-persistent-threats/ai-isnt-just-for-the-good-guys-anymore.html … *facepalm*pic.twitter.com/ZWxD7Dn9e9
2017-01-26 14:55:50 @quequero ;) Related article about domain fronting for C2/exfil https://www.securityartwork.es/2017/01/24/camouflage-at-encryption-layer-domain-fronting/ …
2017-01-26 10:13:45 C/C Evasion Using Domain Fronting and CDNs: https://www.optiv.com/blog/escape-and-evasion-egressing-restricted-networks … Ive been waiting for thispic.twitter.com/oLXFrj35cK
2017-01-10 20:18:20 Oldest sample weve found so far is from 2012, initial behaviour is different, the underlying code is consistent among versions EyePyramidpic.twitter.com/MGt8LpruUR
2016-12-12 18:41:18 Nice root RCE on McAfee Virus Scan for Linux, PoC included: https://nation.state.actor/mcafee.html pic.twitter.com/AJIs1VwZSH
2016-12-03 09:46:17 mitmAP: SSLstrip2 for HSTS bypass, image capture, mitm proxy, DNS spoofing: https://github.com/xdavidhu/mitmAP

Linode is a privately owned virtual private server provider based in Galloway, New Jerse