https://www.fireeye.com/blog/threat-research/2016/06/angler_exploit_kite.html
ANGLER EXPLOIT KIT 可以逃逸emet
https://blog.nelhage.com/2011/03/exploiting-pickle/
Python's "Pickle"的利用
http://haxx.ml/post/145508617751/hacking-mattermost-2-year-of-nodejs-on-the
Hacking三菱欧蓝德PHEV混合动力车 (通过WIFI攻击禁止掉车辆报警系统)
http://haxx.ml/post/145508617751/hacking-mattermost-2-year-of-nodejs-on-the
node.js桌面应用开发的安全
Locky恶意欺诈勒索软件隐藏在多层javascript混淆中
https://www.invincea.com/2016/06/hash-factory-new-cerber-ransomware-morphs-every-15-seconds/
新的恶意欺诈软件Cerber没15秒变换一次
http://cyber-defense.sans.org/blog/2016/06/06/powershell-7-zip-compress-archive-encryption
powershell 的 7ZIP模块对比压缩归档加密
https://www.insinuator.net/2016/06/samlrequest-burpsuite-extention/
burpsuite的SAMLReQuest 扩展
分析(CVE-2016-4119) Adobe Acrobat和Reader的UAF漏洞
http://www.cutawaysecurity.com/blog/2016/06/06/creating-a-docker-ieee-802-dot-15-dot-4-toolkit/
新建 Docker IEEE 802.15.4 Toolkit
http://www.bmicrosystems.com/blog/windows-api-hooking-with-x86-assembly/
使用X86汇编进行WINDOWS API Hooking
http://onready.me/old_horse_attacks.html
老技巧:在LINK中潜入反弹SHELL脚本
windows ioctls参考