与本人兴趣强相关的各种安全or计算机资料收集
Android2个子项
(Un)protected_Broadcasts_in_Android_9_and_103个子项
Android_Application_Secure_DesignSecure_Coding_Guidebook2个子项
Architecture4个子项
ARM_Architecture_Reference_Manual_ARMv7-A_and_ARMv7-R_edition2个子项
A_tour_of_the_ARM_architecture_and_its_Linux_support2个子项
Arm_Architecture_Reference_Manual2个子项
Intel_64_and_IA-32_Architectures_Software_Developers_Manual2个子项
CTF4个子项
An_introduction_to_the_Return_Oriented_Programming_and_ROP_chain_generation2个子项
Linux_x86漏洞利用系列教程2个子项
PLAY_WITH_LINUX_HEAP2个子项
掘金CTF_CTF中的内存漏洞利用技巧2个子项
Compiler8个子项
BHUSA2014-capstone2个子项
BHUSA2016-keystone2个子项
Compilers_Principles_Techniques_and_Tools_2nd_Edition2个子项
Decompiler_internals_microcode2个子项
Engineering_a_Compiler_2nd_edition2个子项
Getting_Started_with_LLVM_Core_Libraries2个子项
Modern_Compiler_Design_2nd_Edition2个子项
Reverse_Compilation_Techniques2个子项
Cryptography2个子项
API_design_for_cryptography2个子项
A_Graduate_Course_in_Applied_Cryptography2个子项
Exploitation32个子项
0day安全-软件漏洞分析技术第2版2个子项
ASLR_on_the_Line_Practical_Cache_Attacks_on_the_MMU2个子项
Advances_in_format_string_exploitation2个子项
Automatic_Generation_of_Data-Oriented_Exploits3个子项
Code-Pointer_Integrity3个子项
Control-Flow_Integrity_Principles_Implementations_and_Applications2个子项
Cyber_Grand_Shellphish2个子项
Exploiting_Format_String_Vulnerabilities2个子项
Framing_Signals—A_Return_to_Portable_Shellcode3个子项
G-Free_Defeating_Return-Oriented_Programming_through_Gadget-less_Binaries2个子项
Glibc_Adventures_The_Forgotten_Chunks2个子项
Hackers_vs_Testers_A_Comparison_of_Software_Vulnerability_Discovery_Processes2个子项
Hacking-The_Art_of_Exploitation_2nd_Edition2个子项
Hacking_Blind3个子项
How_the_ELF_Ruined_Christmas4个子项
Jump-Oriented_Programming_A_New_Class_of_Code-Reuse_Attack2个子项
Just-in-time_code_reuse_On_the_effectiveness_of_fine-grained_address_space_layout_randomization2个子项
LAVA_Large-scale_Automated_Vulnerability_Addition2个子项
MALLOC_DES-MALEFICARUM2个子项
Modern_Binary_Exploitation17个子项
New_Exploit_Methods_against_Ptmalloc_of_GLIBC2个子项
Q_Exploit_Hardening_Made_Easy3个子项
Return-Oriented_Programming_Systems_Languages_and_Applications2个子项
StackGuard_Automatic_Adaptive_Detection_and_Prevention_of_Buffer-Overflow_Attacks2个子项
Surgically_Returning_to_Randomized_libc3个子项
The_Art_Science_and_Engineering_of_Fuzzing_A_Survey2个子项
The_advanced_return-into-libc_exploits2个子项
Transparent_ROP_Exploit_Mitigation_using_Indirect_Branch_Tracing2个子项
Typestate-Guided_Fuzzer_for_Discovering_Use-after-Free_Vulnerabilities2个子项
Understanding_the_heap_by_breaking_it3个子项
安全漏洞自动利用综述2个子项
缓冲区溢出漏洞分析技术研究进展2个子项
Fuzz2个子项
AFLNet_A_Greybox_Fuzzer_for_Network_Protocols2个子项
IJON_Exploring_Deep_State_Spaces_via_Fuzzing2个子项
IoT54个子项
2019物联网安全年报2个子项
2020物联网安全年报2个子项
ANATOMY_OF_A_FIRMWARE_ATTACK2个子项
A_Large-Scale_Analysis_of_the_Security_of_Embedded_Firmwares3个子项
A_Survey_of_Security_Vulnerability_Analysis_Discovery_Detection_and_Mitigation_on_IoT_Devices2个子项
Advanced_SOHO_Router_Exploitation3个子项
Beginners_Guide_on_How_to_Start_Exploring_IoT_Security2个子项
Bushwhacking_your_way_around_a_bootloader2个子项
Cameras_Thermostats_and_Home_Automation_Controllers2个子项
CryptoREX_Large-scale_Analysis_of_Cryptographic_Misuse_in_IoT_Devices4个子项
DIY_ARM_Debugger_for_Wi-Fi_Chips2个子项
DTaint_Detecting_the_Taint-Style_Vulnerability_in_Embedded_Device_Firmware2个子项
Dissecting_QNX2个子项
Embedded_Research_Automation2个子项
Exploit_Almost_All_Xiaomi_Routers_Using_Logical_Bugs2个子项
FIE_on_Firmware_Finding_Vulnerabilities_in_Embedded_Systems_Using_Symbolic_Execution3个子项
FIRM-AFL_High-Throughput_Greybox_Fuzzing_of_IoT_Firmware_via_Augmented_Process_Emulation2个子项
FIRMCORN_Vulnerability-Oriented_Fuzzing_of_IoT_Firmware_via_Optimized_Virtual_Execution2个子项
FirmAE_Towards_Large-Scale_Emulation_of_IoT_Firmware_for_Dynamic_Analysis2个子项
Firmalice-Automatic_Detection_of_Authentication_Bypass_Vulnerabilitiesin_Binary_Firmware2个子项
Firmware_Extraction2个子项
Fitbit_Firmware_Hacking2个子项
Hacking_Toshiba_Laptops2个子项
Hacking_the_Xbox2个子项
Insecure_Boot2个子项
IoTFuzzer_Discovering_Memory_Corruptions_in_IoT_Through_App-based_Fuzzing3个子项
IoT_Behavioral_Monitoring_via_Network_Traffic_Analysis2个子项
IoT_Goes_Nuclear_Creating_a_Zigbee_Chain_Reaction3个子项
On_the_State_of_Internet_of_Things_Security_Vulnerabilities_Attacks_and_Recent_Countermeasures2个子项
Program_Analysis_of_Commodity_IoT_Applications_for_Security_and_Privacy_Challenges_and_Opportunities2个子项
Qiling_Framework_Introduction2个子项
Reversing_FreeRTOS_on_embedded_devices2个子项
Reversing_IoT_Xiaomi_ecosystem2个子项
Scalable_Graph-based_Bug_Search_for_Firmware_Images2个子项
Sensitive_Information_Tracking_in_Commodity_IoT3个子项
Sneaking_Past_Edge-Based_Access_Control_Devices2个子项
Sok_Security_evaluation_of_home-based_iot_deployments2个子项
Subverting_your_server_through_its_BMC_the_HPE_iLO4_case2个子项
The_Art_Craft_of_writing_ARM_shellcode2个子项
Toward_Automated_Firmware_Analysis_in_the_IoT_Era2个子项
Toward_the_Analysis_of_Embedded_Firmware_through_Automated_Re-hosting2个子项
Towards_Automated_Dynamic_Analysis_for_Linux-based_Embedded_Firmware2个子项
Turning_remotes_into_listening_devices2个子项
Vulnerabilities_in_first-generation_RFID-enabled_credit_cards2个子项
What_You_Corrupt_Is_Not_What_You_Crash_Challenges_in_Fuzzing_Embedded_Devices3个子项
hardware4个子项
Breaking_Code_Read_Protection_on_the_NXP_LPC-family_Microcontrollers2个子项
Hardware_Hacking_1012个子项
Hardware_Hacking_1014个子项
course_pack5个子项
NAND3个子项
Logic4个子项
tplink2个子项
Hardware_Security_A_Hands-on_Learning_Approach2个子项
Hardware_toolkits_for_IoT_security_analysis3个子项
printing-shellz2个子项
protocol4个子项
Security_of_IoT_Application_Layer_Protocols_Challenges_and_Findings2个子项
mqtt-v3.1.12个子项
mqtt-v5.02个子项
基于模拟仿真的蓝牙协议栈漏洞挖掘2个子项
wireless11个子项
802.11_Smart_Fuzzing2个子项
A_Practical_Introduction_to_Bluetooth_Low_Energy_security_without_any_special_hardware2个子项
Bluetooth_Core_Specification2个子项
Finding_New_Bluetooth_Low_Energy_Exploits_via_Reverse_Engineering_Multiple_Vendors_Firmwares3个子项
Fuzzing_Wi-Fi_Drivers_to_Locate_Security_Vulnerabilities2个子项
GATTACKING_BLUETOOTH_SMART_DEVICES3个子项
Stateful_Fuzzing_of_Wireless_Device_Drivers_in_an_Emulated_Environment3个子项
Wi-Fi_Implementation_Bugs_an_Era_of_New_Vulnerabilities2个子项
WiFuzz_detecting_and_exploiting_logical_flaws_in_the_Wi-Fi_cryptographic_handshake3个子项
ZigBee_Networks_An_Overview2个子项
ble-bluetooth-low-energy-exploitation2个子项
智能家居安全综述2个子项
智能设备安全分析手册2个子项
消费级物联网安全基线2个子项
物联网安全综述2个子项
物联网操作系统安全研究综述2个子项
Linux9个子项
Anatomy_of_cross-compilation_toolchains2个子项
Buildroot_Training2个子项
Embedded_Linux_system_development2个子项
GDB基础2个子项
Glibc内存管理_Ptmalloc2源代码分析2个子项
Learning_Linux_Binary_Analysis2个子项
Linux_Kernel_and_Driver_Development_Training2个子项
Ltrace_Internals2个子项
Tips_for_Linux_Kernel_Development2个子项
Malware8个子项
Digital_Vengeance_Exploiting_the_Most_Notorious_C&C_Toolkits2个子项
Dr_Honeypots2个子项
Fileless_Malware_and_Process_Injection_in_Linux2个子项
Malware-Analysis-Training2个子项
Modern_Linux_Malware_Exposed2个子项
Trojans_in_SS7-how_they_bypass_all_security_measures2个子项
Understanding_Linux_Malware2个子项
Understanding_the_Mirai_Botnet2个子项
Others7个子项
Bug_Hunting_in_Synology_NAS2个子项
Cure53_Browser_Security_White_Paper2个子项
Reversing_Vulnerability_Research_of_Ethereum_Smart_Contracts2个子项
The_Beginners_Guide_to_IDAPython2个子项
X41_Browser_Security_White_Paper2个子项
云计算环境安全综述2个子项
全球高级持续性威胁(APT)2019年报告2个子项
Program-Analysis12个子项
Reverse-Engineering7个子项
Vehicle29个子项
Virtualization6个子项
点赞
回复