CodeEngn Logo

Live

CodeEngn Live RSS는 국내외 Security 관련 사이트, 블로그, 뉴스 등의 RSS를 쉽고 빠르게 볼 수 있는 RSS Reader 입니다.

추가 및 변경 신청은 Contact 메뉴에서 요청 해주세요.

- Atom, RSS v1.0, RSS v2.0 지원

- Facebook, Twitter RSS 지원

- 3분마다 자동 Live 웹페이지 Refresh

- 5분마다 등록된 RSS 주소들에 대한 title, link 자동 데이터 수집

- title, article, date 검색 가능

- 국내사이트, 국내SNS 등의 분류별 보기 가능

- URL 상에 사용하지 않는 변수 동적 제거를 통한 URL 최적화

- 로그인된 사용자에게 Scrap 기능 제공

분류 RSS 목록
국내 사이트 [84] 0x90 / A-FIRST Reverse Engineering / Acuros Innovation / ASEC Threat Research Response blog / Binary`s blog / binish1story / Broken Code (window31) / ByJJoon Lab / COMPUTER in HAVU / DarkSoul.Story / Deok9 / Ezbeat의 도서관 / F-INSIGHT / Focus on KaiEn!! / FORENSIC-PROOF / GrayHash / Hack Creative / HACKABILITY / Hackers on the Ship / HackSum / HackSum / HackTalk Security / Hakawati Security Lab / I Dont Know Who I aM / int $0x80 / J0hn Doe / KaisHack GoN / kcats`s mindstory / kernelhack :D / KISA 인터넷침해대응센터::기술문서 / KISA 인터넷침해대응센터::보안공지 / KISA 인터넷침해대응센터::분석월보 / KISA 인터넷침해대응센터::사고노트 / kkoha / kth 개발자 블로그 / M0nst3rZ_TEAM_blog / MaJ3stY / Maxoverpro Lab / Misterleeee / n0fate Forensic Space / Noplanlife by JunePark / Only love / Out of Control / PacketInside / 네트워크 패킷 분석 블로그 / Pagez | Computer Security Study blog / passket.net / pieces of code / Pragmatic Forensics / Prof. Huy Kang Kim`s Lifelog (김휘강의 Lifelog) / pwn3r tistory / RedHidden 새빨간 거짓말 / REVERSERGOODBOY.KR / RExVuz / Ride the Lightning / RIGHT TO KNOW / S3ize th3 Day / Sasin / StolenByte World!! / Sup3Rv1s0R / TeamCR@K / Think Like a Man of Action and Act Like Man of Thought... / wannabe FALCON / window 쪼물딱 거리기 / www.reversecore.com / Yesterday you told me about the blue blue sky / ZIZI ‡‡‡ 선택과 집중~ ‡‡‡ / 내맘이 안그래 / 라온시큐어 보안기술연구팀 / 렇렇 / 미친감자 / 바나나맛 페이로드 / 바다란 세상 가장 낮은 곳의 또 다른 이름 / 바이너리에 따뜻한 영혼을 / 보안프로젝트 / 복지 기업 CEO 니키 / 세상에서 가장 안전한 이름, 안랩 / 시스코 블로그 / 아폴로씨의 잡다한 경험들.. / 안랩인들이 만들어가는 커뮤니케이션 블로그 / 울지않는벌새 / 인터넷과 보안 / 잉카인터넷 대응팀 / 쿨캣의 블로그 놀이 / 헐랭이와 IT보안 (opt9 IT Security) /
국외 사이트 [29] /dev/ttyS0 | Embedded Device Hacking / codezen.fr / Darknet / Download Hacking Tools at Tools Yard / Eric Romang Blog / Exploit Database Blog / Fiddler / Flylogic`s Analytical Blog / Hack a Day / IC reverse engineering / InfoSec Research / IOActive Labs Research / j00ru//vx tech blog / MNIN Security Blog / NYU Poly ISIS Lab / Project Zero / reddit netsec / reddit ReverseEngineering / Reverse Engineering Mac OS X / Reverse Engineering Mac OS X / Security-Shell / SecurityXploded Latest Security Articles / SecurityXploded Latest Security News / SecurityXploded Latest Security Tools / sla.ckers / The Adallom Blog / The Hacker News [ THN ] / VNSECURITY Blog / w00tsec /
국내 twitter [7] beist Twitter / estima7 Twitter / ITL, SANS 코리아 Twitter / Matt Twitter / passket Twitter / 김승주 Twitter / 바다란 Twitter /
국외 twitter [32] aboutsecurity Twitter / armitagehacker Twitter / bartblaze Twitter / BorjaMerino Twitter / carlosacastillo Twitter / Carlos_Perez Twitter / Dinosn Twitter / energizedtech Twitter / geeknik Twitter / gN3mes1s Twitter / Hfuhs Twitter / hiddenillusion Twitter / j00ru Twitter / jedisct1 Twitter / Jhaddix Twitter / juneb_get_help Twitter / mikefrobbins Twitter / osxreverser Twitter / Phreaky Twitter / PhysicalDrive0 Twitter / pof Twitter / ProjectHoneynet Twitter / quequero Twitter / r0bertmart1nez Twitter / r_netsec Twitter / secdocs Twitter / securitytube Twitter / SecurityXploded Twitter / Security_FAQs Twitter / soaj1664ashar Twitter / teamcymru Twitter / xanda Twitter /
Facebook [1] 보안프로젝트 리서치 /
국내 보안뉴스 [2] 데일리시큐 / 보안뉴스 /
국외 보안뉴스 [1] Zero Day | ZDNet /



검색된 RSS Articles : 4,837 개 / Lastupdate : 2018-02-25 10:59:09



xanda Twitter


I write code, PoC and advisory. Kuala Lumpur · xanda.org

RSS Articles : 4,837
URL : twitter.com/xanda
RSS : CodeEngn Live RSS 엔진

Date Article
2018-02-12 17:05:26 Were excited to announce that we have been officially accepted as a Google Summer of Code 2018 mentoring organisation! https://summerofcode.withgoogle.com/organizations/5144878602780672/ … GSoC2018
2018-02-12 16:51:38 Every attribution attempt based on using psexec and wmi should be banned and punished hard
2018-02-12 15:00:01 Drive-by cryptomining campaign targets millions of Android users https://blog.malwarebytes.com/threat-analysis/2018/02/drive-by-cryptomining-campaign-attracts-millions-of-android-users/ …pic.twitter.com/btyZQFxvhM
2018-02-11 18:00:54 More than half of all DDoS attacks in Q4 (51.84프로) were aimed at targets in China - almost unchanged since Q3 (51.56프로). Read the full report --> https://kas.pr/byc4  KLReportpic.twitter.com/vCS5oByXPU
2018-02-11 16:02:39 From APK to Golden Ticket: Owning an Android smartphone and gaining Domain Admin rights and more... by @Giutro and Andrea Pierini https://docs.google.com/document/d/1XWzlOOuoTE7DUK60qTk1Wz1VNhbPaHqKEzyxPfyW4GQ/edit  …
2018-02-11 15:03:01 I wrote my blogAnalyzing GrandSoft Exploit Kit http://www.nao-sec.org/2018/02/analyzing-grandsoft-exploit-kit.html …pic.twitter.com/17M5Id4dvW
2018-02-09 19:20:04 Do you remember these guys (crazy IT party meme) ? So, one of them now is software developer in SpaceX and responsible for Falcon 9 и Falcon Heavy https://businessinsider.com.pl/technologie/nowe-technologie/polak-tomasz-czajka-pracowal-przy-falconie-heavy/bcnf0xk …pic.twitter.com/nwqp85FAam
2018-02-09 14:25:07 First blog post from @_xpn_: Flash Exploitation, Now and Then: From CVE-2015-5119 to CVE-2018-4878 https://www.mdsec.co.uk/2018/02/adobe-flash-exploitation-then-and-now-from-cve-2015-5119-to-cve-2018-4878/ …
2018-02-09 10:11:21 Quick question: what is the more-common name for Dexel malware/dropper?
2018-02-08 21:28:20 Commented on GandCrab for @dannyjpalmer related to partnership program for the ransomware, with the creator taking up to 60프로 of the ransom fees paid in DASH to their clients. It is notable how low barriers of entry are for wannabe hackers  @ZDNet http://zd.net/2schLU0
2018-02-08 17:19:40 The List of Top Alexa Websites With Web-Mining Code Embedded on Their Homepage - https://blog.netlab.360.com/the-list-of-top-alexa-websites-with-web-mining-code-embedded-on-their-homepage/ …
2018-02-08 16:17:47 Check out my blogpost - A new RigEK campaign Slots dropping XMRig miner https://research.checkpoint.com/new-rig-exploit-kit-campaign-dropping-xmrig-miner/ …https://www.virustotal.com/ /file/4cdfdf81d0637a07badfaa8eb783320cc810d3a2b437bc978b9f76233920a0e1/detection …@CheckPointSW CC: @nao_sec @VK_Intel @malware_traffic
2018-02-08 15:43:36 Anyone follows Ramnit closely? Can you confirm that Ramnit only get delivered by “seemless”/RIG and not Necurs/malspam in last December?
2018-02-08 11:45:58 BankBot Android Malware Found Open directory - Icon directory shows the target listsample : https://koodous.com/apks/ee192d5c40949aed158f11b459cedd792eec50f6a5e32696936f2727a3895e2b …Thanks @entdark_pic.twitter.com/4uUnNnU9qO
2018-02-08 08:21:51 And the Github repository has been taken down.pic.twitter.com/onC8PTNArU
2018-02-08 01:00:16 also as companies having long-standing close ties with CIA and NSA - such as Threatconnect, TrendMicro, ESET ... Yeah, its official http://www.mid.ru/ru/foreign_policy/news/-/asset_publisher/cKNonkJE02Bw/content/id/3060455 … a new piece of pro-active strike from Russian MoFApic.twitter.com/vJxhjyRzU2
2018-02-08 00:36:30 New paper: A review of the evolution of Andromeda over the years https://www.virusbulletin.com/blog/2018/02/new-paper-review-evolution-andromeda-over-years …
2018-02-07 17:18:27 Pleased to announce the release of ReelPhish: a two-factor phishing tool. FireEye blog post: https://www.fireeye.com/blog/threat-research/2018/02/reelphish-real-time-two-factor-phishing-tool.html … . Code on Github:https://github.com/fireeye/ReelPhish …
2018-02-07 08:30:26 TrickBot ServConf config file updated https://github.com/JR0driguezB/malware_configs/blob/master/TrickBot/servconf_files/20180207_ServConf.txt …
2018-02-06 16:21:12 See if you can spot this crook installing an overlay card skimmer at this Aldi grocery story in PA. More on the overlay skimmers and the Aldi attacks here https://krebsonsecurity.com/2018/02/would-you-have-spotted-this-skimmer/ … …pic.twitter.com/0J2u0B9bYP

Linode is a privately owned virtual private server provider based in Galloway, New Jerse