Skip to content

Latest commit

 

History

History
144 lines (123 loc) · 19.7 KB

README_201907.md

File metadata and controls

144 lines (123 loc) · 19.7 KB

201907 信息源与信息类型占比

201907-信息源占比-secwiki

201907-信息源占比-xuanwu

201907-信息类型占比-xuanwu

201907-最喜欢语言占比

微信公众号 推荐

nickname_english weixin_no title url
Docker dockerone 容器日志采集利器:Filebeat深度剖析与实践 https://mp.weixin.qq.com/s/H9ExikY7bd2-YVEqGZmsOA
中国信息安全 chinainfosec 专题 AI加持,威胁免疫——工业互联网安全体系建设
半佛仙人 banfoSB 硬货-如何用风控拯救下架的小红书 https://mp.weixin.qq.com/s/LchpngIIBqDwejWbFV3E8A
安全回忆录 Sec-Huiyilu Commix命令注入靶场空格过滤的绕过测试 https://mp.weixin.qq.com/s/81gI5nFHSVYR5w648Z2oJQ
安全客 anquanbobao Black hat USA 2019 议题预览 https://mp.weixin.qq.com/s/TCKOmHt2MbeMI6MO5zq4HQ
安比实验室 secbitlabs 初识「零知识」与「证明」 https://mp.weixin.qq.com/s/XQL_taBhPkCHGZOBc24MyQ
新兴产业研究中心 CrowdStrike52页深度 快速进化的下一代终端安全平台
炼石网络CipherGateway CipherGateway 一篇读懂22种密码应用模式 https://mp.weixin.qq.com/s/07B4noqGHaQ8dHWqC_qSWQ
看雪学院 ikanxue 2019 SDC 议题回顾 工业集散控制系统的脆弱性分析
雷神众测 thorsrc webshell中的分离免杀实践-java篇 https://mp.weixin.qq.com/s/RCXrCHJl4w4CTeLk_HPzQA
百度安全实验室 BaiduX_lab 聪明人的笨功夫 -- MesaTEE安全形式化验证实践 https://mp.weixin.qq.com/s/X5PyWgQFZ11wLx8gpFtXOg
网络空间安全军民融合创新中心 jmrh1226 病毒武器智能化技术现状与运用趋势 https://mp.weixin.qq.com/s/ojfjlJEdGSIjrR2ptYhPSw
SDL安全实践 GitHub安全最佳实践 https://mp.weixin.qq.com/s/DRHmwihDwsoZHS8rrlwlHg
公安三所网络安全法律研究中心 《新时代的中国国防》白皮书发布,多处涉及网络安全 https://mp.weixin.qq.com/s/d85LGOF-GubW6I7bGZ2Ovw
时间之外沉浮事 tasnrh ThreatGEN:Red vs. Blue--在游戏中学习网络安全技能 https://mp.weixin.qq.com/s/OoCTXMYALjDQvCEOXvG2ZQ
机器学习研究会 深度学习中的Normalization模型 https://mp.weixin.qq.com/s/D1Qvh-kqcmtp6pkH-CwPmg
GartnerInc GartnerChina 自动化在现代安全中的运用 https://mp.weixin.qq.com/s/HMvGOiUIwjMKBNE2j5qIBQ
国科军通科技 gkjtkj 揭秘:中国自主可控行业全景图 https://mp.weixin.qq.com/s/7_osWtZV3UZ5KuaoIzt7rA
国科漏斗社区 Goktech_Security 线下赛AWD训练平台搭建手册 https://mp.weixin.qq.com/s/VPaAYUu_W3MTOmfmgVxUjA
阿里安全响应中心 alisrc 浅析Redis中SSRF的利用 https://mp.weixin.qq.com/s/as4WP7RkGaXVI6enlMDktg
ADLab v_adlab 启明星辰ADLab:智能音箱网络安全与隐私研究报告 https://mp.weixin.qq.com/s/suXWmn_PM6zmm3loYO1Zgw
APT攻击 cncg_team 展望未来的APT发展之路 https://mp.weixin.qq.com/s/1w6-HwD2u9GRP6IMm5xScg
PolarisLab PolarisLab Hacking WildFly https://mp.weixin.qq.com/s/KQ_17nJBPRcOTn-rPBRKTQ
SecPulse安全脉搏 SecPulse 网络安全学习方法论之体系的重要性 https://mp.weixin.qq.com/s/yXA4BRbMfJNPQ68_-Nme6g
SecWiki SecWiki 福利—中国互联网安全领袖峰会门票! https://mp.weixin.qq.com/s/ZFsrfCjtwrBiRaak1mbhsg
勾陈安全实验室 PolarisLab Knife:一个将有用的小功能加入Burp Suite右键菜单的插件 https://mp.weixin.qq.com/s/Y03VVF3sD9N0_H6TQlxYuQ
绿盟科技研究通讯 nsfocus_research Graph Mining:审视世界的眼睛 https://mp.weixin.qq.com/s/1jutuzIq3xlkFejUFbLFFA
赵武的自留地 网络安全这点屁事 https://mp.weixin.qq.com/s/kVfyoD_zRnSrQjpL4HfYAQ
nmask nmask-article 当子域名遇上搜索引擎 https://mp.weixin.qq.com/s/yZFdVXPDh2O_qN_S1DsBPw
奇安信威胁情报中心 全球高级持续性威胁(APT)2019年中报告 https://mp.weixin.qq.com/s/As902I82uYq5eYQHhUToaA
安全学术圈 secquan 骗局的艺术:剖析以太坊智能合约中的蜜罐 https://mp.weixin.qq.com/s/zKv3wKEXRT8CgOnVHOXi0Q
安全牛 aqniu-wx 国内四大UEBA解决方案 https://mp.weixin.qq.com/s/ftcks4wPVNmKMpODvOcfBQ
漏洞战争 vulwar 关于漏洞挖掘的一点想法 https://mp.weixin.qq.com/s/79k5bxGr1ykCpN4lSeiTqw
继之宫 威胁剑魔杂谈 https://mp.weixin.qq.com/s/wpBeoTEC7g-wFX-DA61gmA
高效运维 greatops 利用 ELK 搭建 Docker 容器化应用日志中心 https://mp.weixin.qq.com/s/7A4lI1zeE5_BljzbKkInbw

组织github账号 推荐

github_id title url org_url org_profile org_geo org_repositories org_people org_projects repo_lang repo_star repo_forks
microsoft 微软开源 Windows 10 使用的 Windows Subsystem for Linux 2 (WSL2) 版本 Linux 内核的源码 https://github.com/microsoft/WSL2-Linux-Kernel https://opensource.microsoft.com Open source, from Microsoft with love Redmond, WA 0 0 0 TypeScript,Java,C#,JavaScript,C++,Python,HTML,CSS,Rich,Go,Jupyter,PowerShell,HCL 79000 11000
ipasimulator ipasim - Windows 平台的一款 iOS 模拟器 https://github.com/ipasimulator/ipasim None iOS emulator for Windows None 0 0 0 C,LLVM,Objective-C++,C++ 104 16
fgsect 用AFL-Unicorn来fuzz内核,集合了afl的覆盖率和unicorn的局部模拟执行 https://github.com/fgsect/unicorefuzz https://www.isti.tu-berlin.de/security_in_telecommunications/menue/overview/ The Computer Security Group at Berlin University of Technology Berlin, Germany 0 0 0 Python,JavaScript 0 0
fireeye flare_emu-IDA的分析功能被进一步拓展,将Unicorn的仿真框架融入其中,增添了若干功能强大的指令,对多种类型的分析工作有着很大的帮助。 https://github.com/fireeye/flare-emu https://www.fireeye.com/blog.html Milpitas, CA 0 0 0 C,Vue,Python,JavaScript,C++,C#,Go,PowerShell 0 0
googleprojectzero Project Zero 团队在 GitHub 上创建的用于记录文档和工具的 Repo https://github.com/googleprojectzero/p0tools https://googleprojectzero.blogspot.com Projects by Google Project Zero https://googleprojectzero.blogspot.com 0 0 0 C,C#,C++,Python,HTML,Swift 0 0
rabobank-cdc DeTTECT - 基于 ATT&CK 框架,用于帮助防御团队评估日志质量、检测覆盖度的工具 https://github.com/rabobank-cdc/DeTTECT https://www.rabobank.com Open source tools developed by Rabobanks CDC https://www.rabobank.com 0 0 0 Python 0 0

私人github账号 推荐

github_id title url p_url p_profile p_loc p_company p_repositories p_projects p_stars p_followers p_following repo_lang repo_star repo_forks
thelinuxchoice Phishing Tool for 18 social media https://github.com/thelinuxchoice/shellphish http://twitter.com/linux_choice Twitter: @linux_choice None None 103 0 38 2200 5 Python,Shell,HTML 890 403
xdite 互联网资安风控实战 https://github.com/xdite/internet-security http://blog.xdite.net CEO of OTCBTC Taipei, Taiwan OTCBTC 177 0 214 1600 13 Makefile,Ruby 315 82
trimstray Linux 安全加固配置手册 https://github.com/trimstray/linux-hardening-checklist https://trimstray.github.io/ BIO_read(wbio, buf, 4096) Poland None 15 0 892 1400 265 Shell 21500 2100
boy-hack w13scan: 被动扫描器 https://github.com/boy-hack/w13scan?from=timeline https://www.hacking8.com/ Hacking tools just for fun ~ china None 29 0 118 809 15 Python,CSS 797 287
ismailtasdelen Red Team Hardware Toolkit https://github.com/ismailtasdelen/redteam-hardware-toolkit http://ismailtasdelen.com Hi, My name is Ismail Tasdelen. As a security researcher. Im working Penetration Tester at Ernst & Young. Remember to follow and support. Have a great day. 😇 Istanbul Ernst & Young 97 0 783 733 467 Python,Shell,HTML 591 164
vanhauser-thc AFL 的社区维护版 afl++ 发布 2.53c 版本 https://github.com/vanhauser-thc/AFLplusplus/releases/tag/2.53c https://www.mh-sec.de/ Security researcher since 1994 https://www.thc.org/ https://twitter.com/hackerschoice Berlin The Hackers Choice mh-sec me myself 22 0 33 630 19
infosecn1nja awesome-mitre-attack - 与 Mitre ATT&CK 攻击防御框架有关的工具和资料收集 https://github.com/infosecn1nja/awesome-mitre-attack None Red Teamer and Security Researcher Jakarta, Indonesia None 31 0 575 508 56 Python,Shell,PowerShell 4600 1500
zodiacon zodiacon 开源了一个工具,用于查看内核对象类型的句柄和对象 https://github.com/zodiacon/KernelObjectView http://scorpiosoftware.net Israel None 56 0 106 503 9 C#,C,C++ 714 208
pasta-auto 丰田公司开发了一套汽车ECU系统的测试工具,包含软件和硬件,repo里面有这套工具的相关介绍,目前应该是在售的状态。 https://github.com/pasta-auto/PASTA1.0 None None None 1 0 0 262 0 C 49 11
RUB-SysSec NEMO:一款猜测password的工具,通过使用马尔可夫模型可以更高效地选择变异策略 https://github.com/RUB-SysSec/NEMO// https://syssec.rub.de Bochum, Germany Ruhr-University Bochum 21 0 11 228 0 Python,C,C++ 370 102
Bypass007 Safety-Project-Collection: 收集一些比较优秀的开源安全项目 https://github.com/Bypass007/Safety-Project-Collection None 欢迎关注公众号Bypass--,专注于信息安全。 Xiamen, China None 4 0 4 221 0 Java 1100 274
bcoles bcoles 收集的 Linux 内核 Exploits https://github.com/bcoles/kernel-exploits https://itsecuritysolutions.org rm -rf /* rm -rf /* rm -rf /* 29 0 62 217 19 Python,C,Shell,Ruby 17100 8400
13o-bbr-bbq 机器学习与安全相关的一些资料汇总 https://github.com/13o-bbr-bbq/machine_learning_security None Im an engineer, Machine Learning hacker and CISSP. Speaker at Black Hat Arsenal, DEFCON Demo Labs/AI Village, Pycon, CODE BLUE etc., Tokyo, Japan. None 9 0 25 185 1 Python 875 319
maddiestone 谷歌安全团队成员在Recon 2019会议上分享的Android病毒逆向分析,病毒通过各种反射和混淆隐藏自身真实payload,但通过仔细逆向,仍然能够将其分析清楚,毕竟Java编译之后的代码语义的留存还是挺多的 https://github.com/maddiestone/ConPresentations/blob/master/REcon2019.PathToThePayload.pdf http://twitter.com/maddiestone None None 3 0 2 160 1 Python 436 91
milabs awesome-linux-rootkits - Linux 平台 Rootkits 相关的资料收集 https://github.com/milabs/awesome-linux-rootkits None Linux kernel addict, security researcher, reverse engineer Russia, Moscow None 27 0 440 119 71 C 282 48
luguanxing Cheating-Plugin-Program: 从零开始研究外挂设计原理 https://github.com/luguanxing/Cheating-Plugin-Program http://luguanxing.online:8080 None None 17 0 7 102 2 C,JavaScript,HTML,C++ 412 106
r35tart R3start 总结的一些日常渗透测试项目的案例 https://github.com/r35tart/Penetration_Testing_Case http://R3start.net 人若无名,便可潜心练剑。 None None 51 0 130 95 5 Python 307 113
theLSA dz-ml-rce.py:discuz ml RCE漏洞检测工具 https://github.com/theLSA/discuz-ml-rce http://www.lsablog.com I like network security,penestration and programming(python,c/c++,php,java,ect),welcome to communicate with me! China None 27 0 15 60 14 Python 71 35
xinali Adobe Font Development Kit for OpenType 套件相关的漏洞分析 https://github.com/xinali/AfdkoFuzz/ None Malware Analysis, Coder & Antiy Lab Harbin,China Jilin University 14 0 121 52 56 Python,HTML,Dockerfile,C++,Vue 85 37
marcinguy Android 7月补丁修复的Media Framework漏洞CVE-2019-2107的PoC https://github.com/marcinguy/CVE-2019-2107 None Berlin, Germany None 39 0 11 44 28 Python,C 52 13
niemand-sec AntiCheat-Testing-Framework - 游戏反外挂测试框架,作者在 Recon2019 会议有一个关于这个工具的演讲 https://github.com/niemand-sec/AntiCheat-Testing-Framework None Twitter: @niemand_sec None None 23 0 21 32 4 C#,Python,C++ 102 21
hanbinglengyue FART: ART环境下自动化脱壳方案 https://github.com/hanbinglengyue/FART None 大成若缺,大道至简 None None 78 0 3 27 20 Python,Java,C,PHP,Ruby 239 77
Alexandre-Bartel DOSBox 模拟器缓冲区溢出漏洞 CVE-2019-12594 Exploit https://github.com/Alexandre-Bartel/CVE-2019-12594/ https://www.abartel.net None None 15 0 4 26 1 Python,C,Java 7 2
KibodWapon Axis-1.4-RCE-Poc: Axis https://github.com/KibodWapon/Axis-1.4-RCE-Poc https://kibodwapon.github.io/ None None 4 0 5 21 0 Python,HTML 97 59
MagicZer0 fastjson 1.2.46 版本 RCE Exploit https://github.com/MagicZer0/fastjson-rce-exploit None web security researcher, like coding. None None 8 0 6 20 4 HTML,Java,PHP 59 21
Rman0fCN ML_Malware_detect: 阿里云安全恶意程序检测比赛 https://github.com/Rman0fCN/ML_Malware_detect None Stu from HITsz None None 48 0 76 20 67 Python,PHP,JavaScript,Smarty 43 10
paul-axe paul-axe 公开的 WCTF 2019 P Door 赛题的 writeup https://github.com/paul-axe/ctf/tree/master/wctf2019/p-door None None None 5 0 94 19 10 Python,C,PHP,Haskell 7 1
yangruiqiyr 一个用Intel VT-X/EPT实现的类似Sysinternals Process Monitor的工具 https://github.com/yangruiqiyr/Syscall-Monitor None Weak chicken in weak chicken None None 74 0 57 18 34 Python,C,PHP,Java,C++ 1 0
rndinfosecguy Scavenger: Crawler searching for credential leaks on paste sites https://github.com/rndinfosecguy/Scavenger https://twitter.com/rnd_infosec_guy Just an information security guy marching down his path. /dev/null None 2 0 2 16 7 Python,JavaScript 114 27
Vlad-tri 6 月份被发现的野外 Win32k 0Day 提权漏洞(CVE-2019-1132)的 PoC https://github.com/Vlad-tri/CVE-2019-1132/ http://www.botnetarmy.wordpress.com Learning Machine Learning and Malware Anlaysis None None 16 0 1 15 1 Python,C++ 27 19
kirk-sayre-work 恶意 VB 脚本样本的分析 https://github.com/kirk-sayre-work/talks None I do cyber security work for Walmart. None Walmart 7 0 3 10 0 Python,C#,JavaScript 39 6
XiaoXiaoGuaiXiaShi OpenSource-HoneyPot: 对开源蜜罐的学习研究与理解 https://github.com/XiaoXiaoGuaiXiaShi/OpenSource-HoneyPot None 信息安全学习者 None None 3 0 80 7 38 Python,JavaScript 12 1
cmcmsec dpia: GDPR个人数据合规评估 https://github.com/cmcmsec/dpia None None None 3 0 0 4 0 JavaScript,Ruby 21 15
skydive-project Skydive可用以对网络拓扑及协议进行实时分析,以图像的方式清晰展现。 https://github.com/skydive-project/skydive None None None None 0 0 0 0 0 Go,Python,HTML,JavaScript,Puppet 0 0
xiangpasama 京东SRC小课堂系列文章 https://github.com/xiangpasama/JDSRC-Small-Classroom None None None 1 0 0 0 0 34 9

medium_xuanwu 推荐

title url
利用“白”的程序执行“黑”的程序来绕过杀毒检测 http://medium.com/@reegun/update-nuget-squirrel-uncontrolled-endpoints-leads-to-arbitrary-code-execution-b55295144b56
针对Arlo相机设备功能及安全性的一次深入分析 http://medium.com/tenable-techblog/an-analysis-of-arlo-6f1b691236b5
编译、刷入、然后调试三星手机内核的系列的结尾篇。在这个系列中,作者非常详细列出了各类工具的使用方法、需要输入的命令和一些问题的解决方法,可以说很良心了,是调试三星手机内核很好的入门篇 http://medium.com/@alex91ar/debugging-the-samsung-android-kernel-part-3-c27e916c9a7d
Windows 系统雷蛇环绕音频服务 1.1.63.0 版本存在因文件/目录权限设置不当导致的本地提权漏洞 http://medium.com/m/global-identity?redirectUrl=https%3A%2F%2Fposts.specterops.io%2Fcve-2019-13142-razer-surround-1-1-63-0-eop-f18c52b8be0c
视频会议系统Zoom的Mac客户端存在多个安全漏洞,可能导致拒绝服务和信息泄漏 http://medium.com/@jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5
Citrix SD-WAN下三个漏洞及攻击手段介绍 http://medium.com/tenable-techblog/an-exploit-chain-against-citrix-sd-wan-709db08fb4ac
Jira把联系管理员处的表单数据当成freemarker模板解析,导致前台RCE。 http://medium.com/@ruvlol/rce-in-jira-cve-2019-11581-901b845f0f
Comodo杀毒软件存在安全漏洞,可以从其沙箱中直接获得SYSTEM权限 http://medium.com/tenable-techblog/comodo-from-sandbox-to-system-cve-2019-3969-b6a34cc85e67
AI 与机器学习的安全性问题研究 http://link.medium.com/5FVO5CWpAY

medium_secwiki 推荐

title url
Assess your data potential with ATT&CK Datamap https://medium.com/@olafhartong/assess-your-data-potential-with-att-ck-datamap-f44884cfed11
A Top 10 Reading List if You’re Getting Started in Cyber ... https://medium.com/katies-five-cents/a-top-10-reading-list-if-youre-getting-started-in-cyber-threat-intelligence-c11a18fc9798
CTI Reading List https://medium.com/@sroberts/cti-reading-list-a93ccdd7469c
Auxiliary Loss Optimization for Hypothesis Augmentation fo... https://medium.com/@jason_trost/auxiliary-loss-optimization-for-hypothesis-augmentation-for-dga-domain-detection-98c382082514

zhihu_xuanwu 推荐

title url
复旦白泽战队对 NDSS 2019 《REDQUEEN: Fuzzing with Input-to-State Correspondence》 Paper 的解读 https://zhuanlan.zhihu.com/p/72839694
复旦白泽团队对 Paper《Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation》的解读 https://zhuanlan.zhihu.com/p/73982491
复旦白泽战队对《Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations》 Paper 的解读 https://zhuanlan.zhihu.com/p/74947208

zhihu_secwiki 推荐

title url
安全分析中的威胁情报(二):ATT&CK https://zhuanlan.zhihu.com/p/73172883
风控引擎的演进及设计思想 https://zhuanlan.zhihu.com/p/73181470
机器学习科研的十年 https://zhuanlan.zhihu.com/p/74249758

日更新程序

python update_daily.py