1.UPC Router WPA2 密码恢复工具
2.在树莓派和RetroPie上运行街机游戏系统(第一部分和第二部分)
http://carnal0wnage.attackresearch.com/2016/01/arcade-gaming-system-on-raspberry-pi-2.html
http://carnal0wnage.attackresearch.com/2016/01/arcade-gaming-system-on-raspberry-pi-2_2.html
3.ios objc 方法调用记录插件: itracer v1.3
https://github.com/waruqi/itrace
4.hellcode2vba.py 0.4发行
http://blog.didierstevens.com/2016/01/02/update-shellcode2vba-py-version-0-4/
5.分析MIME文件的一些tips
https://isc.sans.edu/diary/A+Tip+For+The+Analysis+Of+MIME+Files/20561
6.DLL HIJACKING攻击指南
http://null-byte.wonderhowto.com/how-to/dll-hijacking-tutorial-0167466/
7.32C3 CTF: Docker writeup
https://kitctf.de/writeups/32c3ctf/docker/
8.第一款JAVASCRIPT恶意欺诈软件
http://blog.emsisoft.com/2016/01/01/meet-ransom32-the-first-javascript-ransomware/
9.查看被删的微信好友的python脚本
https://github.com/0x5e/wechat-deleted-friends
10.建立fREedom和BinNavi逆向环境
https://summitroute.com/blog/2015/12/31/setting_up_freedom_and_binnavi/
11.明白XSA-155漏洞:Compiler-Introduced Double-Fetch Vulnerabilities
http://tkeetch.co.uk/blog/?p=58
12.BlackEnergy木马SSHBearDoor:对乌克兰新闻媒体和电子工业的攻击
13.介绍 WiFi Pineapple TETRA
https://forums.hak5.org/index.php?/topic/37173-introducing-the-wifi-pineapple-tetra/
14.CVE-2014-2851 group_info UAF 利用
https://cyseclabs.com/page?n=02012016
15.手动分析 ‘NSKeyedArchiver’ 格式的Plist文件
16.保护windows网络-applocker
http://dfir-blog.com/2016/01/03/protecting-windows-networks-applocker/
17.使用DOcker 运行一个隐藏的TOR服务
http://randywestergren.com/running-a-hidden-tor-service-with-docker-compose/
18.HTTPS Bicycle Attack
https://guidovranken.wordpress.com/2015/12/30/https-bicycle-attack/
19.Reef:IDAPYthon插件,从一个函数发现Xrefs
https://github.com/darx0r/Reef
20.如何使用beef和javascript进行前期调查
http://null-byte.wonderhowto.com/how-to/use-beef-and-javascript-for-reconnaissance-0167468/
21.HackingTeam:如何使用0day感染你的andorid设备
http://archive.hack.lu/2015/HT_Android_hack_lu2015_v1.0.pdf
22.通过被动检测唯一DNS查询检测Tor Exit