CodeEngn Logo

Live

CodeEngn Live RSS는 국내외 Security 관련 사이트, 블로그, 뉴스 등의 RSS를 쉽고 빠르게 볼 수 있는 RSS Reader 입니다.

추가 및 변경 신청은 Contact 메뉴에서 요청 해주세요.

- Atom, RSS v1.0, RSS v2.0 지원

- Facebook, Twitter RSS 지원

- 3분마다 자동 Live 웹페이지 Refresh

- 5분마다 등록된 RSS 주소들에 대한 title, link 자동 데이터 수집

- title, article, date 검색 가능

- 국내사이트, 국내SNS 등의 분류별 보기 가능

- URL 상에 사용하지 않는 변수 동적 제거를 통한 URL 최적화

- 로그인된 사용자에게 Scrap 기능 제공

분류 RSS 목록
국내 사이트 [84] 0x90 / A-FIRST Reverse Engineering / Acuros Innovation / ASEC Threat Research Response blog / Binary`s blog / binish1story / Broken Code (window31) / ByJJoon Lab / COMPUTER in HAVU / DarkSoul.Story / Deok9 / Ezbeat의 도서관 / F-INSIGHT / Focus on KaiEn!! / FORENSIC-PROOF / GrayHash / Hack Creative / HACKABILITY / Hackers on the Ship / HackSum / HackSum / HackTalk Security / Hakawati Security Lab / I Dont Know Who I aM / int $0x80 / J0hn Doe / KaisHack GoN / kcats`s mindstory / kernelhack :D / KISA 인터넷침해대응센터::기술문서 / KISA 인터넷침해대응센터::보안공지 / KISA 인터넷침해대응센터::분석월보 / KISA 인터넷침해대응센터::사고노트 / kkoha / kth 개발자 블로그 / M0nst3rZ_TEAM_blog / MaJ3stY / Maxoverpro Lab / Misterleeee / n0fate Forensic Space / Noplanlife by JunePark / Only love / Out of Control / PacketInside / 네트워크 패킷 분석 블로그 / Pagez | Computer Security Study blog / passket.net / pieces of code / Pragmatic Forensics / Prof. Huy Kang Kim`s Lifelog (김휘강의 Lifelog) / pwn3r tistory / RedHidden 새빨간 거짓말 / REVERSERGOODBOY.KR / RExVuz / Ride the Lightning / RIGHT TO KNOW / S3ize th3 Day / Sasin / StolenByte World!! / Sup3Rv1s0R / TeamCR@K / Think Like a Man of Action and Act Like Man of Thought... / wannabe FALCON / window 쪼물딱 거리기 / www.reversecore.com / Yesterday you told me about the blue blue sky / ZIZI ‡‡‡ 선택과 집중~ ‡‡‡ / 내맘이 안그래 / 라온시큐어 보안기술연구팀 / 렇렇 / 미친감자 / 바나나맛 페이로드 / 바다란 세상 가장 낮은 곳의 또 다른 이름 / 바이너리에 따뜻한 영혼을 / 보안프로젝트 / 복지 기업 CEO 니키 / 세상에서 가장 안전한 이름, 안랩 / 시스코 블로그 / 아폴로씨의 잡다한 경험들.. / 안랩인들이 만들어가는 커뮤니케이션 블로그 / 울지않는벌새 / 인터넷과 보안 / 잉카인터넷 대응팀 / 쿨캣의 블로그 놀이 / 헐랭이와 IT보안 (opt9 IT Security) /
국외 사이트 [29] /dev/ttyS0 | Embedded Device Hacking / codezen.fr / Darknet / Download Hacking Tools at Tools Yard / Eric Romang Blog / Exploit Database Blog / Fiddler / Flylogic`s Analytical Blog / Hack a Day / IC reverse engineering / InfoSec Research / IOActive Labs Research / j00ru//vx tech blog / MNIN Security Blog / NYU Poly ISIS Lab / Project Zero / reddit netsec / reddit ReverseEngineering / Reverse Engineering Mac OS X / Reverse Engineering Mac OS X / Security-Shell / SecurityXploded Latest Security Articles / SecurityXploded Latest Security News / SecurityXploded Latest Security Tools / sla.ckers / The Adallom Blog / The Hacker News [ THN ] / VNSECURITY Blog / w00tsec /
국내 twitter [7] beist Twitter / estima7 Twitter / ITL, SANS 코리아 Twitter / Matt Twitter / passket Twitter / 김승주 Twitter / 바다란 Twitter /
국외 twitter [32] aboutsecurity Twitter / armitagehacker Twitter / bartblaze Twitter / BorjaMerino Twitter / carlosacastillo Twitter / Carlos_Perez Twitter / Dinosn Twitter / energizedtech Twitter / geeknik Twitter / gN3mes1s Twitter / Hfuhs Twitter / hiddenillusion Twitter / j00ru Twitter / jedisct1 Twitter / Jhaddix Twitter / juneb_get_help Twitter / mikefrobbins Twitter / osxreverser Twitter / Phreaky Twitter / PhysicalDrive0 Twitter / pof Twitter / ProjectHoneynet Twitter / quequero Twitter / r0bertmart1nez Twitter / r_netsec Twitter / secdocs Twitter / securitytube Twitter / SecurityXploded Twitter / Security_FAQs Twitter / soaj1664ashar Twitter / teamcymru Twitter / xanda Twitter /
Facebook [1] 보안프로젝트 리서치 /
국내 보안뉴스 [2] 데일리시큐 / 보안뉴스 /
국외 보안뉴스 [1] Zero Day | ZDNet /



검색된 RSS Articles : 1,606 개 / Lastupdate : 2018-04-21 20:45:03



BorjaMerino Twitter


Th3 sh3ll 1s c0m1ng ... shelliscoming.com

RSS Articles : 1,606
URL : twitter.com/BorjaMerino
RSS : CodeEngn Live RSS 엔진

Date Article
2018-04-20 17:31:32 Stealing the Socket for Policy and Profit https://cybersecpolitics.blogspot.com.es/2018/04/stealing-socket-for-policy-and-profit.html …
2018-04-19 16:05:21 Introducing Windows Defender System Guard runtime attestation, the latest platform security technology in Windows 10, which uses the same hardware-rooted security technologies in virtualization-based security (VBS) to mitigate attacks in software. https://aka.ms/wdsgra
2018-04-19 02:50:02 Stealing NTLM hashes with C:windowssystem32 ltest.exe on Windows 10pic.twitter.com/JBd2YtCASj
2018-04-18 18:46:01 The UEFI Driver Writers Guide is now available in gitbook format. More info at https://github.com/tianocore/tianocore.github.io/wiki/UEFI-Driver-Writers-Guide …pic.twitter.com/kVAk3hJFVl
2018-04-18 00:46:49 Just pushed experimental SquiblyTwo (from @subTee and @mattifestation) stager for Koadic https://github.com/zerosum0x0/koadic/commit/fe557335969d2252f9b0abf670b57dce61c10249 …pic.twitter.com/suLozkMtzO
2018-04-17 21:57:39 Using Honey Credentials to Make Pivoting Detectable https://es.logrhythm.com/blog/using-honeywords-to-make-password-cracking-detectable/ …
2018-04-16 11:24:39 UPnProxy : Blackhat Proxies via NAT Injections : https://www.akamai.com/us/en/multimedia/documents/white-paper/upnproxy-blackhat-proxies-via-nat-injections-white-paper.pdf … (pdf)pic.twitter.com/MoLXu6Eunh
2018-04-16 09:45:35 Microcode Extraction tool for Intel, AMD, VIA and FreeScale https://github.com/platomav/MCExtractor …
2018-04-16 07:34:02 Bitdefender whitepaper looks at RadRAT https://labs.bitdefender.com/2018/04/radrat-an-all-in-one-toolkit-for-complex-espionage-ops/ …
2018-04-13 18:18:25 I wrote a Binary Ninja plugin that integrates WinDbg to improve the Windows experience for Binja debugger integrations. Features include GUI debugger control within Binja, branch highlighting, and vtable resolution. Will be presented @BSidesROC tomorrow! https://github.com/kukfa/bindbg pic.twitter.com/46RwmhDXN3
2018-04-13 11:20:25 peinjector: MITM PE file infector https://github.com/JonDoNym/peinjector …
2018-04-11 12:22:34 Sending probe requests from the victim host to check if its close to you :D Metasploitpic.twitter.com/GOVuQoFgDm
2018-04-10 19:28:17 Took all those Red Team Tips and stuck it onto one page: https://vincentyiu.co.uk/red-team-tips/  Ill update this page occasionally redteam adversarysimulation cyber Also, I want to add that theres some duplicate numbering :( Ah well...
2018-04-06 20:58:12 Lateral Movement Using Outlooks CreateObject Method and DotNetToJScript https://posts.specterops.io/lateral-movement-using-outlooks-createobject-method-and-dotnettojscript-a88a81df27eb …
2018-04-05 18:58:35 pestudio detects API not present in the imports table (and that will be loaded explicitely) malwarepic.twitter.com/E8k8OKbtlc
2018-04-05 11:57:07 Nice, good explanation. https://twitter.com/golangweekly/status/979001920152068096 …
2018-04-05 10:54:11 Reversing GO binaries like a pro https://rednaga.io/2016/09/21/reversing_go_binaries_like_a_pro/ …
2018-04-04 16:10:09 Here I share a Nmap NSE script to detect the proxy component of the Hidden Cobra APT attributed to North Korean government: https://github.com/BorjaMerino/Hidden-Cobra-Proxy …pic.twitter.com/F5IdErHJN2
2018-04-04 00:21:31 Quick vid showing how this works. Here we are removing self-protection from NortonSecurity to assist in attaching Frida to the process. This isnt a vuln.. it required a KDB session. But it does allow you to bug hunt similar protected processes.pic.twitter.com/oeGm6cVgYz
2018-04-03 15:56:22 “Shellcodes are for the 99프로” https://sites.google.com/site/bingsunsec/shellcodes-are-for-the-99 …, Bing has released the slides for CANSECWEST talk, be sure to check it out, its cool!

Linode is a privately owned virtual private server provider based in Galloway, New Jerse