1、在网络中的passive DNS的威胁捕捉:第一部分
https://www.endgame.com/blog/hunting-cheap-part-1-architecture
2、系列文章:探索Qualcomm的安全执行环境
http://bits-please.blogspot.tw/2016/04/exploring-qualcomms-secure-execution.html
3、通过OTF+SVG与XEE利用CSS注入允许你读取页面内容
https://gist.github.com/cure53/1501bcb6aa6608b2af38fcafd68af219
4、Burpsuite Intruder的payloads收集
https://github.com/1N3/IntruderPayloads
5、Mosh:移动设备端替换SSH的SHELL,介绍文档在https://mosh.mit.edu/mosh-paper.pdf
6、在windows中运行不经修改的linux应用程序
https://github.com/wishstudio/flinux
7、理解和明白wmi恶意软件 (趋势2010年的报告)
8、Defusing a binary bomb with gdb 第四部分,前几部分分别在http://blog.carlosgaldino.com/2015/12/03/defusing-a-binary-bomb-with-gdb-part-3.html,http://blog.carlosgaldino.com/2015/11/19/defusing-a-binary-bomb-with-gdb-part-2.html
http://blog.carlosgaldino.com/2016/04/25/defusing-a-binary-bomb-with-gdb-part-4.html
9、调试内存异常
10、了解恶意欺诈软件分发操作,第二部分,第一部分在https://reaqta.com/2016/04/uncovering-a-ransomware-distribution-operation/
https://reaqta.com/2016/04/uncovering-ransomware-distribution-operation-part-2/
11、Social-Engineer Toolkit (SET) v7.1 “Blue Steel” 发行
https://www.trustedsec.com/blog/social-engineer-toolkit-set-v7-1-blue-steel-released/
12、wireshark使用案例:结果慢相应时间
13、PenQ:一款集合多个安全测试插件的浏览器
http://www.qburst.com/products/PenQ
14、PowerShell Remoting 安全注意事项
https://msdn.microsoft.com/en-us/powershell/scripting/topic/winrmsecurity
15、上次推送的恶意欺诈软件统计列表新增了““Prevention"(防护)列
https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml#
16、FBI使用的TOR去匿名化工具分析
https://assets.documentcloud.org/documents/2124281/fbi-tor-busting-227-1.pdf
17、黑客如何滥用SS7漏洞的
https://blogs.mcafee.com/consumer/ss7-flaw-how-hackers-abuse-it/
18、H5SC Mini-Challenge 5 XSS挑战的writeup
https://github.com/cure53/XSSChallengeWiki/wiki/H5SC-Mini-Challenge-5
19、在scala中些x86_64动态汇编