CodeEngn Logo

Live

CodeEngn Live RSS는 국내외 Security 관련 사이트, 블로그, 뉴스 등의 RSS를 쉽고 빠르게 볼 수 있는 RSS Reader 입니다.

추가 및 변경 신청은 Contact 메뉴에서 요청 해주세요.

- Atom, RSS v1.0, RSS v2.0 지원

- Facebook, Twitter RSS 지원

- 3분마다 자동 Live 웹페이지 Refresh

- 5분마다 등록된 RSS 주소들에 대한 title, link 자동 데이터 수집

- title, article, date 검색 가능

- 국내사이트, 국내SNS 등의 분류별 보기 가능

- URL 상에 사용하지 않는 변수 동적 제거를 통한 URL 최적화

- 로그인된 사용자에게 Scrap 기능 제공

분류 RSS 목록
국내 사이트 [84] 0x90 / A-FIRST Reverse Engineering / Acuros Innovation / ASEC Threat Research Response blog / Binary`s blog / binish1story / Broken Code (window31) / ByJJoon Lab / COMPUTER in HAVU / DarkSoul.Story / Deok9 / Ezbeat의 도서관 / F-INSIGHT / Focus on KaiEn!! / FORENSIC-PROOF / GrayHash / Hack Creative / HACKABILITY / Hackers on the Ship / HackSum / HackSum / HackTalk Security / Hakawati Security Lab / I Dont Know Who I aM / int $0x80 / J0hn Doe / KaisHack GoN / kcats`s mindstory / kernelhack :D / KISA 인터넷침해대응센터::기술문서 / KISA 인터넷침해대응센터::보안공지 / KISA 인터넷침해대응센터::분석월보 / KISA 인터넷침해대응센터::사고노트 / kkoha / kth 개발자 블로그 / M0nst3rZ_TEAM_blog / MaJ3stY / Maxoverpro Lab / Misterleeee / n0fate Forensic Space / Noplanlife by JunePark / Only love / Out of Control / PacketInside / 네트워크 패킷 분석 블로그 / Pagez | Computer Security Study blog / passket.net / pieces of code / Pragmatic Forensics / Prof. Huy Kang Kim`s Lifelog (김휘강의 Lifelog) / pwn3r tistory / RedHidden 새빨간 거짓말 / REVERSERGOODBOY.KR / RExVuz / Ride the Lightning / RIGHT TO KNOW / S3ize th3 Day / Sasin / StolenByte World!! / Sup3Rv1s0R / TeamCR@K / Think Like a Man of Action and Act Like Man of Thought... / wannabe FALCON / window 쪼물딱 거리기 / www.reversecore.com / Yesterday you told me about the blue blue sky / ZIZI ‡‡‡ 선택과 집중~ ‡‡‡ / 내맘이 안그래 / 라온시큐어 보안기술연구팀 / 렇렇 / 미친감자 / 바나나맛 페이로드 / 바다란 세상 가장 낮은 곳의 또 다른 이름 / 바이너리에 따뜻한 영혼을 / 보안프로젝트 / 복지 기업 CEO 니키 / 세상에서 가장 안전한 이름, 안랩 / 시스코 블로그 / 아폴로씨의 잡다한 경험들.. / 안랩인들이 만들어가는 커뮤니케이션 블로그 / 울지않는벌새 / 인터넷과 보안 / 잉카인터넷 대응팀 / 쿨캣의 블로그 놀이 / 헐랭이와 IT보안 (opt9 IT Security) /
국외 사이트 [29] /dev/ttyS0 | Embedded Device Hacking / codezen.fr / Darknet / Download Hacking Tools at Tools Yard / Eric Romang Blog / Exploit Database Blog / Fiddler / Flylogic`s Analytical Blog / Hack a Day / IC reverse engineering / InfoSec Research / IOActive Labs Research / j00ru//vx tech blog / MNIN Security Blog / NYU Poly ISIS Lab / Project Zero / reddit netsec / reddit ReverseEngineering / Reverse Engineering Mac OS X / Reverse Engineering Mac OS X / Security-Shell / SecurityXploded Latest Security Articles / SecurityXploded Latest Security News / SecurityXploded Latest Security Tools / sla.ckers / The Adallom Blog / The Hacker News [ THN ] / VNSECURITY Blog / w00tsec /
국내 twitter [7] beist Twitter / estima7 Twitter / ITL, SANS 코리아 Twitter / Matt Twitter / passket Twitter / 김승주 Twitter / 바다란 Twitter /
국외 twitter [32] aboutsecurity Twitter / armitagehacker Twitter / bartblaze Twitter / BorjaMerino Twitter / carlosacastillo Twitter / Carlos_Perez Twitter / Dinosn Twitter / energizedtech Twitter / geeknik Twitter / gN3mes1s Twitter / Hfuhs Twitter / hiddenillusion Twitter / j00ru Twitter / jedisct1 Twitter / Jhaddix Twitter / juneb_get_help Twitter / mikefrobbins Twitter / osxreverser Twitter / Phreaky Twitter / PhysicalDrive0 Twitter / pof Twitter / ProjectHoneynet Twitter / quequero Twitter / r0bertmart1nez Twitter / r_netsec Twitter / secdocs Twitter / securitytube Twitter / SecurityXploded Twitter / Security_FAQs Twitter / soaj1664ashar Twitter / teamcymru Twitter / xanda Twitter /
Facebook [1] 보안프로젝트 리서치 /
국내 보안뉴스 [2] 데일리시큐 / 보안뉴스 /
국외 보안뉴스 [1] Zero Day | ZDNet /



검색된 RSS Articles : 3,919 개 / Lastupdate : 2018-01-24 18:49:25



r0bertmart1nez Twitter


Professional Security Analyst | Security Researcher at Kaspersky Lab - Tweets are my own.

RSS Articles : 3,919
URL : twitter.com/r0bertmart1nez
RSS : CodeEngn Live RSS 엔진

Date Article
2018-01-20 18:45:11 In this keynote, we have @spontiroli discussing using yara to detect .NET malware BSidesNYCpic.twitter.com/fyhXDjPWO2
2018-01-20 17:22:21 next pestudio to add strings groups to detect Malware referencing API and Libraries using late binding DFIRpic.twitter.com/8268telgQg
2018-01-19 17:50:13 ¡Mucho OJO! Skygofree, un sofisticado troyano spyware para Android, capaz de grabar audio, hacer fotos y leer tus mensajes de Whatsapp https://kas.pr/yr9x pic.twitter.com/hUchIgTHZz
2018-01-18 16:11:26 On todays TheSAS2018 podcast, I chat with @k1k_ on his favorite APT, why you should join us in Cancun for @KasperskySAS, Duqu2/ more http://bit.ly/2rfl5NM pic.twitter.com/DuBnxzjsFN
2018-01-17 23:06:17 I just got my .@sansforensics GIAC Certified Forensic Analyst (GCFA)” from the training FOR508 ThreatHunting. Im very happy and grateful!
2018-01-17 20:50:10 Get tools / commands for analyzing malicious software on the REMnux Linux distribution FREE from @lennyzeltser ! http://digital-forensics.sans.org/u/zcU  DFIR MalwareAnalysis FOR610pic.twitter.com/S5BV7qULQu
2018-01-17 16:21:16 Sample possibly related to this story, based on the filename distribution (XtbSeDuA.exe): ff5e1f27193ce51eec318714ef038bef - uses fget-career[.]com as C2 https://twitter.com/TheRegister/status/950993475612430336 …
2018-01-16 15:27:31 ¡Evento en vivo! ¡RT por favor, para mostrar a los asistentes que tan rápido se puede difundir información en redes sociales! DIPDP2018 @pcoronaf@rubenaquino @gpresman @r0bertmart1nez @knaverit @MaraRoj98545236 @Gabriel_Venegas @Diez_Abogadospic.twitter.com/090BKiR8a4
2018-01-16 13:18:21 MISP 2.4.86 released (aka sharing groups improvement, large information sharing communities support and more) https://www.misp-project.org/2018/01/16/MISP.2.4.86.released.html … ThreatIntel ThreatHunting MISPpic.twitter.com/Bowvx3C8zT
2018-01-16 11:56:04 The evolution of Skygofree APT malware for Android. Full details: https://securelist.com/skygofree-following-in-the-footsteps-of-hackingteam/83603/ …pic.twitter.com/5N8smR1OK6
2018-01-16 11:31:08 The road to ReverseEngineering Malware, by @ramospablo https://medium.com/@pramos/the-road-to-reverse-engineering-malware-7c0bc1bda9d2 …pic.twitter.com/h17drbnIoC
2018-01-14 16:59:43 pestudio 8.72 now available at https://winitor.com  with following changes https://www.winitor.com/tools/pestudio/changes.log … to ease Malware Initial Assessmentpic.twitter.com/Vgd1f1Ye2c
2018-01-14 13:39:52 How u can install this fix if your system already unbootable https://support.microsoft.com/en-us/help/4073576/unbootable-state-for-amd-devices-windows-8-1-windows-server-2012-r2 …
2018-01-14 12:30:01 WINspect -Powershell-based Windows Security Auditing Toolbox https://github.com/A-mIn3/WINspect
2018-01-13 20:45:07 Got SIFT? Learn the ropes with another FREE cheatsheet! http://digital-forensics.sans.org/u/zeh  DFIR This cheat sheet will give you the basic commands to get cracking open your case using the latest cutting edge forensic tools. NetworkForensicspic.twitter.com/KIUx99SQcA
2018-01-13 13:39:26 Announcing DVAR - Damn Vulnerable ARM Router - a beginners exercise for the ARM IoT ExploitLab.Download: http://blog.exploitlab.net/2018/01/dvar-damn-vulnerable-arm-router.html …Pairs perfectly with @Fox0x01 ARM Tutorials https://azeria-labs.com/ Wish you all a happy 2018, lot of PC=0x41414140 and many ARM shells!pic.twitter.com/RFv79Y6n1h
2018-01-12 22:47:07 Almost done with the preparation for @BSidesNYC , looking forward to the event next week!pic.twitter.com/3veiq3A7vH
2018-01-07 17:03:43 reminder: pestudio detects more than 3K signatures of 32 and 64 bit executable files to accelerate Malware Initial Assessmentpic.twitter.com/Pw4bIhaaTz
2018-01-07 14:40:08 Exactly. Heres all you need to get started with Arm assembly: Assembly Basics: https://azeria-labs.com/writing-arm-assembly-part-1/ …Readymade Lab VM: https://azeria-labs.com/arm-lab-vm/ Cute Vulnerable Binaries: https://azeria-labs.com/part-3-stack-overflow-challenges/ …GDB Cheat Seet: https://azeria-labs.com/debugging-with-gdb-introduction/ …https://twitter.com/statelysquirrel/status/950011919477428224 …
2018-01-05 19:01:01 @NoushinShbb from @Kasperskys GReAT weighs in on the gender divide in cybersecurity https://kas.pr/w7sa  via @SCMagazine

Linode is a privately owned virtual private server provider based in Galloway, New Jerse