Common Information
Type | Value |
---|---|
Value |
main.cpp |
Category | |
Type | File |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-06 | 32 | 2024第四届“网鼎杯”白虎组 writeup | CTF导航 | ||
Details | Website | 2024-10-06 | 25 | CVE-2024-7479 & CVE-2024-7481:利用TeamViewer中一个漏洞的概念证明,用户到内核的权限提升 | CTF导航 | ||
Details | Website | 2024-10-02 | 23 | 找到 TeamViewer 0day漏洞- 第三部分:完整利用 | CTF导航 | ||
Details | Website | 2024-09-04 | 147 | Uncovering DarkCracks: How a Stealthy Payload Delivery Framework Exploits GLPI and WordPress | ||
Details | Website | 2024-09-03 | 10 | Dumpulator模拟执行解密tip | CTF导航 | ||
Details | Website | 2024-08-31 | 150 | DarkCracks, 一个利用被黑GLPI, WORDPRESS站点充当中转的高级恶意载荷&升级框架 | ||
Details | Website | 2023-08-06 | 1 | Process Doppelgänging | ||
Details | Website | 2023-05-11 | 21 | Hypervisor Ransomware | Multiple Threat Actor Groups Hop on Leaked Babuk Code to Build ESXi Lockers | ||
Details | Website | 2023-03-27 | 862 | Vulnerability Summary for the Week of March 20, 2023 | CISA | ||
Details | Website | 2023-01-04 | 523 | Vulnerability Summary for the Week of December 26, 2022 | CISA | ||
Details | Website | 2022-03-08 | 236 | Conti Ransomware source code: a well-designed COTS ransomware - Yoroi | ||
Details | 2019-12-12 | 70 | MacProStorage-T3:4Work:Bitdefender-WhitePaper-Glupteba-CREA4144-en_EN:Bitdefender-WhitePaper-Glupteba-CREA4144-en_EN.indd | |||
Details | 2019-02-06 | 169 | APT10 Targeted Norwegian MSP and US Companies in Sustained Campaign | |||
Details | Website | 2018-04-12 | 1 | Encryption 101: decryption tool code walkthrough | Malwarebytes Labs | ||
Details | Website | 2017-12-01 | 20 | Hook the planet! Solving FlareOn4 Challenge6 with libPeConv | ||
Details | Website | 2017-06-28 | 2 | Metaclasses for embedded domain specific languages | ||
Details | Website | 2017-06-21 | 20 | JavaScript for Microcontrollers and IoT: Part 1 | ||
Details | Website | 2017-06-05 | 15 | Starting with Windows Kernel Exploitation – part 2 – getting familiar with HackSys Extreme Vulnerable Driver | ||
Details | Website | 2017-03-04 | 11 | gargoyle, a memory scanning evasion technique | ||
Details | 2016-10-24 | 231 | En Route with | |||
Details | Website | 2014-03-24 | 5 | Skype Preview – Skype link preview plugin - Misc | ||
Details | Website | 2012-10-04 | 5 | Developing PE file packer step-by-step. Step 11. Command line interface. Final version - Misc | ||
Details | Website | 2012-09-25 | 5 | Developing PE file packer step-by-step. Step 7. Relocations - Misc | ||
Details | Website | 2012-09-19 | 1 | Developing PE file packer step-by-step. Step 5. Resources - Misc | ||
Details | Website | 2012-09-17 | 7 | Developing PE file packer step-by-step. Step 3. Unpacking - Misc |