RIP RegPwn:一项 Windows 注册表利用技术的兴与亡
原文链接作者https://www.mdsec.co.uk/2026/03/rip-regpwn/Filip Dragovic作为 MDSec 研发工作的一部分,我们经常在研究过程中发现漏洞,并开发相
阅读全文原文链接作者https://www.mdsec.co.uk/2026/03/rip-regpwn/Filip Dragovic作为 MDSec 研发工作的一部分,我们经常在研究过程中发现漏洞,并开发相
阅读全文原文链接作者https://specterops.io/blog/2025/10/01/writeaccountrestrictions-war-what-is-it-good-for/Garrett
阅读全文原文链接作者https://devansh.bearblog.dev/needle-in-the-haystack/devansh注意:最初我打算用一篇文章涵盖完整方法论及所有技术细节,包括 AI 驱
阅读全文原文链接作者https://rastamouse.me/bof-cocktails/Rasta MouseCrystal Palace 是一个 PIC 框架,可用于编写诸如前置 DLL 加载器之类的工
阅读全文原文链接作者https://offsec.almond.consulting/trust-no-one_are-one-way-trusts-really-one-way.htmllowercase_
阅读全文TL;DR: 虽然并非全新手法,但将自引用 LNK 文件与 winget 配置指令相结合,可以构成一种可行的初始访问载荷,适用于未禁用 Microsoft Store 的环境。原文链接作者https:
阅读全文原文链接作者https://sud0ru.ghost.io/windows-inter-process-communication-a-deep-dive-beyond-the-surface-par
阅读全文原文链接作者https://aimaker.substack.com/p/openclaw-security-hardening-guideWYNDO AND FERNANDO LUCKTEMBERG
阅读全文原文链接作者https://blog.gdatasoftware.com/2026/03/38381-llm-malware-analysisKarsten HahnLLM 刚流行起来的时候,我内心是
阅读全文原文链接作者https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit/Googl
阅读全文原文链接作者https://jonny-johnson.medium.com/wmi-internals-part-2-522f3e97709aJonathan Johnson在上一篇文章 WMI I
阅读全文原文链接作者https://jonny-johnson.medium.com/wmi-internals-part-3-38e5dad016beJonathan Johnson在之前的文章 — WMI
阅读全文原文链接作者https://jonny-johnson.medium.com/wmi-internals-part-1-41bb97e7f5ebJonathan Johnson理解基础知识最近我对 W
阅读全文原文链接作者https://www.mdsec.co.uk/2026/02/total-recall-retracing-your-steps-back-to-nt-authoritysystem/F
阅读全文原文链接作者https://jhalon.github.io/chrome-browser-exploitation-1/Jack HalonWeb 浏览器——我们连接互联网的主要门户。如今浏览器在现
阅读全文原文链接作者https://jhalon.github.io/chrome-browser-exploitation-2/Jack Halon在我的上一篇文章 "Chrome Browser Expl
阅读全文原文链接作者https://jhalon.github.io/chrome-browser-exploitation-3/Jack Halon欢迎阅读 "Chrome Browser Exploita
阅读全文原文链接作者https://www.picussecurity.com/resource/blog/what-are-bring-your-own-vulnerable-driver-byovd-at
阅读全文原文链接作者https://blog.cykor.kr/2026/02/How-I-Found-Open-Source-0-days-with-an-LLM-Multi-Agent-WorkflowH
阅读全文原文链接作者https://bushido-sec.com/index.php/2025/01/03/fuzzing-harness-guide/Bushido SecurityIntro每位安全研究
阅读全文原文链接作者https://www.dsecured.com/en/articles/spring-boot-actuator-using-misconfig-to-your-advantage-pa
阅读全文红队 Initial Access 完整指南:Payload 开发 (DLL Sideloading、Shellcode Loader、Syscall)、HTML Smuggling、钓鱼 (QR C
阅读全文原文链接作者https://www.covertswarm.com/post/timeline-of-edr-bypass-techniquesIbai Castells终端检测与响应(EDR)解决方
阅读全文原文链接作者https://sethenoka.com/posts/understanding-windows-artefacts-as-evidence-not-indicators/Seth En
阅读全文原文链接作者https://socfortress.medium.com/title-volatility-3-will-change-how-you-hunt-malware-and-heres-t
阅读全文原文链接作者https://blog.reversesociety.co/blog/2025/predator-ios-malware-surveillance-framework-part-1Rev
阅读全文原文链接作者https://cicada-8.medium.com/impacket-developer-guide-part-3-make-your-own-lateral-movement-a2f
阅读全文原文链接作者https://cicada-8.medium.com/impacket-developer-guide-part-2-finding-rpc-on-the-system-and-some
阅读全文原文链接作者https://cicada-8.medium.com/impacket-developer-guide-part-1-rpc-4df4fe6d79d7CICADA8大家好,我叫 Mich
阅读全文