CodeEngn Logo

Live

CodeEngn Live RSS는 국내외 Security 관련 사이트, 블로그, 뉴스 등의 RSS를 쉽고 빠르게 볼 수 있는 RSS Reader 입니다.

추가 및 변경 신청은 Contact 메뉴에서 요청 해주세요.

- Atom, RSS v1.0, RSS v2.0 지원

- Facebook, Twitter RSS 지원

- 3분마다 자동 Live 웹페이지 Refresh

- 5분마다 등록된 RSS 주소들에 대한 title, link 자동 데이터 수집

- title, article, date 검색 가능

- 국내사이트, 국내SNS 등의 분류별 보기 가능

- URL 상에 사용하지 않는 변수 동적 제거를 통한 URL 최적화

- 로그인된 사용자에게 Scrap 기능 제공

분류 RSS 목록
국내 사이트 [84] 0x90 / A-FIRST Reverse Engineering / Acuros Innovation / ASEC Threat Research Response blog / Binary`s blog / binish1story / Broken Code (window31) / ByJJoon Lab / COMPUTER in HAVU / DarkSoul.Story / Deok9 / Ezbeat의 도서관 / F-INSIGHT / Focus on KaiEn!! / FORENSIC-PROOF / GrayHash / Hack Creative / HACKABILITY / Hackers on the Ship / HackSum / HackSum / HackTalk Security / Hakawati Security Lab / I Dont Know Who I aM / int $0x80 / J0hn Doe / KaisHack GoN / kcats`s mindstory / kernelhack :D / KISA 인터넷침해대응센터::기술문서 / KISA 인터넷침해대응센터::보안공지 / KISA 인터넷침해대응센터::분석월보 / KISA 인터넷침해대응센터::사고노트 / kkoha / kth 개발자 블로그 / M0nst3rZ_TEAM_blog / MaJ3stY / Maxoverpro Lab / Misterleeee / n0fate Forensic Space / Noplanlife by JunePark / Only love / Out of Control / PacketInside / 네트워크 패킷 분석 블로그 / Pagez | Computer Security Study blog / passket.net / pieces of code / Pragmatic Forensics / Prof. Huy Kang Kim`s Lifelog (김휘강의 Lifelog) / pwn3r tistory / RedHidden 새빨간 거짓말 / REVERSERGOODBOY.KR / RExVuz / Ride the Lightning / RIGHT TO KNOW / S3ize th3 Day / Sasin / StolenByte World!! / Sup3Rv1s0R / TeamCR@K / Think Like a Man of Action and Act Like Man of Thought... / wannabe FALCON / window 쪼물딱 거리기 / www.reversecore.com / Yesterday you told me about the blue blue sky / ZIZI ‡‡‡ 선택과 집중~ ‡‡‡ / 내맘이 안그래 / 라온시큐어 보안기술연구팀 / 렇렇 / 미친감자 / 바나나맛 페이로드 / 바다란 세상 가장 낮은 곳의 또 다른 이름 / 바이너리에 따뜻한 영혼을 / 보안프로젝트 / 복지 기업 CEO 니키 / 세상에서 가장 안전한 이름, 안랩 / 시스코 블로그 / 아폴로씨의 잡다한 경험들.. / 안랩인들이 만들어가는 커뮤니케이션 블로그 / 울지않는벌새 / 인터넷과 보안 / 잉카인터넷 대응팀 / 쿨캣의 블로그 놀이 / 헐랭이와 IT보안 (opt9 IT Security) /
국외 사이트 [29] /dev/ttyS0 | Embedded Device Hacking / codezen.fr / Darknet / Download Hacking Tools at Tools Yard / Eric Romang Blog / Exploit Database Blog / Fiddler / Flylogic`s Analytical Blog / Hack a Day / IC reverse engineering / InfoSec Research / IOActive Labs Research / j00ru//vx tech blog / MNIN Security Blog / NYU Poly ISIS Lab / Project Zero / reddit netsec / reddit ReverseEngineering / Reverse Engineering Mac OS X / Reverse Engineering Mac OS X / Security-Shell / SecurityXploded Latest Security Articles / SecurityXploded Latest Security News / SecurityXploded Latest Security Tools / sla.ckers / The Adallom Blog / The Hacker News [ THN ] / VNSECURITY Blog / w00tsec /
국내 twitter [7] beist Twitter / estima7 Twitter / ITL, SANS 코리아 Twitter / Matt Twitter / passket Twitter / 김승주 Twitter / 바다란 Twitter /
국외 twitter [32] aboutsecurity Twitter / armitagehacker Twitter / bartblaze Twitter / BorjaMerino Twitter / carlosacastillo Twitter / Carlos_Perez Twitter / Dinosn Twitter / energizedtech Twitter / geeknik Twitter / gN3mes1s Twitter / Hfuhs Twitter / hiddenillusion Twitter / j00ru Twitter / jedisct1 Twitter / Jhaddix Twitter / juneb_get_help Twitter / mikefrobbins Twitter / osxreverser Twitter / Phreaky Twitter / PhysicalDrive0 Twitter / pof Twitter / ProjectHoneynet Twitter / quequero Twitter / r0bertmart1nez Twitter / r_netsec Twitter / secdocs Twitter / securitytube Twitter / SecurityXploded Twitter / Security_FAQs Twitter / soaj1664ashar Twitter / teamcymru Twitter / xanda Twitter /
Facebook [1] 보안프로젝트 리서치 /
국내 보안뉴스 [2] 데일리시큐 / 보안뉴스 /
국외 보안뉴스 [1] Zero Day | ZDNet /



검색된 RSS Articles : 2,374 개 / Lastupdate : 2018-12-19 09:58:14



Date Article
2018-10-25 17:36:38 Another Word on Delegation https://posts.specterops.io/another-word-on-delegation-10bdbe3cd94a … - abusing resource-based constrained delegation to take over computer objects. Thanks to @elad_shamir for the idea and Rubeus addition!
2018-10-25 15:52:36 Building resilient C2 infra using DNS over HTTPS as a backup trigger. An example of how (and why!) to build layers and differentiation into your C2 channels. Including a cool example on hiding your payload in a robots.txt file. Blog post here: https://outflank.nl/blog/2018/10/25/building-resilient-c2-infrastructues-using-dns-over-https/ …pic.twitter.com/Ojyyd8aePe
2018-10-23 19:56:22 Just pushed my PoC implementation of C2 over DoH for Cobalt Strike and slides from ATTACKcon. It was a privilege to have the opportunity to represent @SpiderLabs speak here and share this technique with the community @MITREattack credit to @ryHanson too - https://github.com/SpiderLabs/DoHC2 …
2018-10-22 18:03:42 Awesome, a nice console app to interact with SharpSploit! Should make it a bit easier to execute one-off functions w/ Cobalt Strikes execute-assembly command :) Really like the use of ILMerge. https://twitter.com/jaredhaight/status/1054429211522256896 …
2018-10-05 22:25:59 Thanks for everyone for coming to @tifkin_, @enigma0x3, and my @DerbyCon talk The Unintended Risks of Trusting Active Directory! The slides are up at https://www.slideshare.net/harmj0y/derbycon-the-unintended-risks-of-trusting-active-directory … and the printer bug code is live athttps://github.com/leechristensen/SpoolSample …
2018-10-02 22:23:18 This is a really cool first step towards making SharpSploit easier to use! Love the use of Costura, makes it much easier to use with tools like Cobalt Strikes execute-assembly command. https://twitter.com/anthemtotheego/status/1047246141996322818 …
2018-10-02 02:00:55 Hai twitter! Had some problems with Cobalt Strikes psexec / mimikatz functions today, so was able to cobble together a solution to achieve psexec from one domain to another with Invoke-SMBExec.ps1 and aggresor! Hopefully helpful to you all =) https://gist.github.com/realoriginal/10d8c98845d85b03c552843bf7e1e4db … @SpecterOps
2018-09-28 22:27:16 Nothing fancy but found in my notes- some Cobalt Strike situational awareness commands using native CS builtins https://gist.github.com/HarmJ0y/fe676e3ceba74f22a28bd1b121182db7 …
2018-09-26 19:04:23 LeaveNoTrace.cna - Track/clean up dropped files, because littering is bad. https://github.com/ramen0x3f/AggressorScripts/blob/master/leave_no_trace.cna …Note: if you dont upload through File Explorer, you cant auto-remove files because beacon doesnt track the dest path.pic.twitter.com/a39FVQMnMH
2018-09-25 22:29:59 Just released a new mimikatz version to support Windows 10 1803 to bypass the Credential Guard authentication chainReminder: your passwords/keys are not in the secure world... only its storage **after** authentication!@reni_ni this version is for you https://github.com/gentilkiwi/mimikatz/releases …pic.twitter.com/O3B03slN6S
2018-09-24 18:07:24 [blog/tool] From Kekeo to Rubeus https://posts.specterops.io/from-kekeo-to-rubeus-86d2ec501c14 … - my journey in reimplementing various aspects of @gentilkiwis kekeo project. Code is live at https://github.com/GhostPack/Rubeus … !
2018-09-20 16:04:28 [blog + tool] Introducing SharpSploit: A C Post-Exploitation Library https://posts.specterops.io/introducing-sharpsploit-a-c-post-exploitation-library-5c7be5f16c51 …
2018-09-18 16:32:01 I updated SharpCloud a bunch and threw in an Aggressor script that adds aliases and saves AWS creds to the Cobalt Strike Credentials model. The script seems like itll be handy. https://github.com/chrismaddalena/SharpCloud …
2018-09-18 15:47:29 Decided to clean this up and move it over from my private repos. Little exfil C tool for compressing, encrypting, and uploading data to Dropbox. Works great using execute-assembly in Cobalt Strike. https://github.com/P1CKLES/SharpBox …
2018-09-14 21:51:11 Trade craft tip: If you have a Cobalt Strike beacon SOCKS proxy, no need to open a port on your team server. Just ssh -tt -v -L 9050:localhost: root@Then, you can proxychains on localhost and tunnel right to your beacon SOCKS proxy.
2018-09-06 19:59:35 Cobalt Strike 3.12 – Blink and youll miss it http://blog.cobaltstrike.com/2018/09/06/cobalt-strike-3-12-blink-and-youll-miss-it/ …
2018-09-06 13:05:39 Do you use Cobalt Strike? @andrechiles @001SPARTaN and I created a self documented Malleable C2 profile with the hope that it will enhance your understanding of what you can do with malleable c2. @armitagehacker http://threatexpress.com/2018/09/a-deep-dive-into-cobalt-strike-malleable-c2/ … via @joevest
2018-08-27 15:12:49 This week, we explore using Microsoft.Workflow.Compiler.exe, Veil, and Cobalt Strike together and the process from generating basic C code to receiving a beacon! - https://www.fortynorthsecurity.com/microsoft-workflow-compiler-exe-veil-and-cobalt-strike/ …
2018-08-26 11:46:27 Really enjoyed talking to @mazzazone on the ShadowTalk about a favourite subject of mine: threat modelling. Critical assets, threat landscape, scenarios, Mitre @MITREattack, @armitagehackers Cobalt Strike threat emulation and more! https://m.soundcloud.com/digitalshadows/episode-38-midterm-meddling-and-threat-modeling …
2018-08-22 19:04:59 Operational Guidance for Offensive User DPAPI Abuse https://posts.specterops.io/operational-guidance-for-offensive-user-dpapi-abuse-1fb7fac8b107 … documenting some of the ways to use Mimikatz to play with DPAPI. Thanks @gentilkiwi for all the awesome features! :)

Linode is a privately owned virtual private server provider based in Galloway, New Jerse