新手上路
2025-12-17 08:42
主楼
各种安全or计算机资料收集
book, manual, paper, blog, slides, report, course, survey,tool, online, video
book, manual, paper, blog, slides, report, course, survey,tool, online, video
- Android
- (Un)protected_Broadcasts_in_Android_9_and_10
- README.md
- as-21-Johnson-Unprotected-Broadcasts-In-Android-9-and-10-wp.pdf
- as-21-Johnson-Unprotected-Broadcasts-In-Android-9-and-10.pdf
- Android_Application_Secure_DesignSecure_Coding_Guidebook
- Architecture
- ARM_Architecture_Reference_Manual_ARMv7-A_and_ARMv7-R_edition
- A_tour_of_the_ARM_architecture_and_its_Linux_support
- Arm_Architecture_Reference_Manual
- Intel_64_and_IA-32_Architectures_Software_Developers_Manual
- CTF
- An_introduction_to_the_Return_Oriented_Programming_and_ROP_chain_generation
- Linux_x86漏洞利用系列教程
- PLAY_WITH_LINUX_HEAP
- 掘金CTF_CTF中的内存漏洞利用技巧
- Compiler
- BHUSA2014-capstone
- BHUSA2016-keystone
- Compilers_Principles_Techniques_and_Tools_2nd_Edition
- Decompiler_internals_microcode
- Engineering_a_Compiler_2nd_edition
- Getting_Started_with_LLVM_Core_Libraries
- Modern_Compiler_Design_2nd_Edition
- Reverse_Compilation_Techniques
- Cryptography
- API_design_for_cryptography
- A_Graduate_Course_in_Applied_Cryptography
- Exploitation
- 0day安全-软件漏洞分析技术第2版
- ASLR_on_the_Line_Practical_Cache_Attacks_on_the_MMU
- Advances_in_format_string_exploitation
- Automatic_Generation_of_Data-Oriented_Exploits
- Code-Pointer_Integrity
- Control-Flow_Integrity_Principles_Implementations_and_Applications
- Cyber_Grand_Shellphish
- Exploiting_Format_String_Vulnerabilities
- Framing_Signals—A_Return_to_Portable_Shellcode
- G-Free_Defeating_Return-Oriented_Programming_through_Gadget-less_Binaries
- Glibc_Adventures_The_Forgotten_Chunks
- Hackers_vs_Testers_A_Comparison_of_Software_Vulnerability_Discovery_Processes
- Hacking-The_Art_of_Exploitation_2nd_Edition
- Hacking_Blind
- How_the_ELF_Ruined_Christmas
- Jump-Oriented_Programming_A_New_Class_of_Code-Reuse_Attack
- Just-in-time_code_reuse_On_the_effectiveness_of_fine-grained_address_space_layout_randomization
- LAVA_Large-scale_Automated_Vulnerability_Addition
- MALLOC_DES-MALEFICARUM
- Modern_Binary_Exploitation
- 01_lecture.pdf
- 02_lecture.pdf
- 03_lecture.pdf
- 04_lecture.pdf
- 04_lecture_extras.pdf
- 05_lecture.pdf
- 06_lecture.pdf
- 07_lecture.pdf
- 08_lecture.pdf
- 09_lecture.pdf
- 10_lecture.pdf
- 11_lecture.pdf
- 12_lecture.pdf
- 13_lecture.pdf
- 14_lecture.pdf
- 15_lecture.pdf
- README.md
- New_Exploit_Methods_against_Ptmalloc_of_GLIBC
- Q_Exploit_Hardening_Made_Easy
- Return-Oriented_Programming_Systems_Languages_and_Applications
- StackGuard_Automatic_Adaptive_Detection_and_Prevention_of_Buffer-Overflow_Attacks
- Surgically_Returning_to_Randomized_libc
- The_Art_Science_and_Engineering_of_Fuzzing_A_Survey
- The_advanced_return-into-libc_exploits
- Transparent_ROP_Exploit_Mitigation_using_Indirect_Branch_Tracing
- Typestate-Guided_Fuzzer_for_Discovering_Use-after-Free_Vulnerabilities
- Understanding_the_heap_by_breaking_it
- 安全漏洞自动利用综述
- 缓冲区溢出漏洞分析技术研究进展
- Fuzz
- AFLNet_A_Greybox_Fuzzer_for_Network_Protocols
- IJON_Exploring_Deep_State_Spaces_via_Fuzzing
- IoT
- 2019物联网安全年报
- 2020物联网安全年报
- ANATOMY_OF_A_FIRMWARE_ATTACK
- A_Large-Scale_Analysis_of_the_Security_of_Embedded_Firmwares
- A_Survey_of_Security_Vulnerability_Analysis_Discovery_Detection_and_Mitigation_on_IoT_Devices
- Advanced_SOHO_Router_Exploitation
- Beginners_Guide_on_How_to_Start_Exploring_IoT_Security
- Bushwhacking_your_way_around_a_bootloader
- Cameras_Thermostats_and_Home_Automation_Controllers
- CryptoREX_Large-scale_Analysis_of_Cryptographic_Misuse_in_IoT_Devices
- DIY_ARM_Debugger_for_Wi-Fi_Chips
- DTaint_Detecting_the_Taint-Style_Vulnerability_in_Embedded_Device_Firmware
- Dissecting_QNX
- Embedded_Research_Automation
- Exploit_Almost_All_Xiaomi_Routers_Using_Logical_Bugs
- Exploit+(Almost)+All+Xiaomi+Routers+Using+Logical+Bugs-Aobo+Wang&Jihong+Zheng+from+Chaitin+Tech.pdf
- README.md
- FIE_on_Firmware_Finding_Vulnerabilities_in_Embedded_Systems_Using_Symbolic_Execution
- FIRM-AFL_High-Throughput_Greybox_Fuzzing_of_IoT_Firmware_via_Augmented_Process_Emulation
- FIRMCORN_Vulnerability-Oriented_Fuzzing_of_IoT_Firmware_via_Optimized_Virtual_Execution
- FirmAE_Towards_Large-Scale_Emulation_of_IoT_Firmware_for_Dynamic_Analysis
- Firmalice-Automatic_Detection_of_Authentication_Bypass_Vulnerabilitiesin_Binary_Firmware
- Firmware_Extraction
- Fitbit_Firmware_Hacking
- Hacking_Toshiba_Laptops
- Hacking_the_Xbox
- Insecure_Boot
- IoTFuzzer_Discovering_Memory_Corruptions_in_IoT_Through_App-based_Fuzzing
- IoT_Behavioral_Monitoring_via_Network_Traffic_Analysis
- IoT_Goes_Nuclear_Creating_a_Zigbee_Chain_Reaction
- On_the_State_of_Internet_of_Things_Security_Vulnerabilities_Attacks_and_Recent_Countermeasures
- Program_Analysis_of_Commodity_IoT_Applications_for_Security_and_Privacy_Challenges_and_Opportunities
- Qiling_Framework_Introduction
- Reversing_FreeRTOS_on_embedded_devices
- Reversing_IoT_Xiaomi_ecosystem
- Scalable_Graph-based_Bug_Search_for_Firmware_Images
- Sensitive_Information_Tracking_in_Commodity_IoT
- Sneaking_Past_Edge-Based_Access_Control_Devices
- Sok_Security_evaluation_of_home-based_iot_deployments
- Subverting_your_server_through_its_BMC_the_HPE_iLO4_case
- The_Art_Craft_of_writing_ARM_shellcode
- Toward_Automated_Firmware_Analysis_in_the_IoT_Era
- Toward_the_Analysis_of_Embedded_Firmware_through_Automated_Re-hosting
- Towards_Automated_Dynamic_Analysis_for_Linux-based_Embedded_Firmware
- Turning_remotes_into_listening_devices
- Vulnerabilities_in_first-generation_RFID-enabled_credit_cards
- What_You_Corrupt_Is_Not_What_You_Crash_Challenges_in_Fuzzing_Embedded_Devices
- hardware
- Breaking_Code_Read_Protection_on_the_NXP_LPC-family_Microcontrollers
- Hardware_Hacking_101
- Hardware_Hacking_101
- README.md
- Hardware_Security_A_Hands-on_Learning_Approach
- Hardware_toolkits_for_IoT_security_analysis
- printing-shellz
- protocol
- Security_of_IoT_Application_Layer_Protocols_Challenges_and_Findings
- mqtt-v3.1.1
- mqtt-v5.0
- 基于模拟仿真的蓝牙协议栈漏洞挖掘
- wireless
- 802.11_Smart_Fuzzing
- A_Practical_Introduction_to_Bluetooth_Low_Energy_security_without_any_special_hardware
- Bluetooth_Core_Specification
- Finding_New_Bluetooth_Low_Energy_Exploits_via_Reverse_Engineering_Multiple_Vendors_Firmwares
- Fuzzing_Wi-Fi_Drivers_to_Locate_Security_Vulnerabilities
- GATTACKING_BLUETOOTH_SMART_DEVICES
- Stateful_Fuzzing_of_Wireless_Device_Drivers_in_an_Emulated_Environment
- Wi-Fi_Implementation_Bugs_an_Era_of_New_Vulnerabilities
- WiFuzz_detecting_and_exploiting_logical_flaws_in_the_Wi-Fi_cryptographic_handshake
- README.md
- us-17-Vanhoeft-WiFuzz-Detecting-And-Exploiting_Logical-Flaws-In-The-Wi-Fi-Cryptographic-Handshake-wp.pdf
- us-17-Vanhoeft-WiFuzz-Detecting-And-Exploiting_Logical-Flaws-In-The-Wi-Fi-Cryptographic-Handshake.pdf
- ZigBee_Networks_An_Overview
- ble-bluetooth-low-energy-exploitation
- 智能家居安全综述
- 智能设备安全分析手册
- 消费级物联网安全基线
- 物联网安全综述
- 物联网操作系统安全研究综述
- LICENSE
- Linux
- Anatomy_of_cross-compilation_toolchains
- Buildroot_Training
- Embedded_Linux_system_development
- GDB基础
- Glibc内存管理_Ptmalloc2源代码分析
- Learning_Linux_Binary_Analysis
- Linux_Kernel_and_Driver_Development_Training
- Ltrace_Internals
- Tips_for_Linux_Kernel_Development
- Malware
- Digital_Vengeance_Exploiting_the_Most_Notorious_C&C_Toolkits
- Dr_Honeypots
- Fileless_Malware_and_Process_Injection_in_Linux
- Malware-Analysis-Training
- Modern_Linux_Malware_Exposed
- Trojans_in_SS7-how_they_bypass_all_security_measures
- Understanding_Linux_Malware
- Understanding_the_Mirai_Botnet
- Others
- Bug_Hunting_in_Synology_NAS
- Cure53_Browser_Security_White_Paper
- Reversing_Vulnerability_Research_of_Ethereum_Smart_Contracts
- The_Beginners_Guide_to_IDAPython
- X41_Browser_Security_White_Paper
- 云计算环境安全综述
- 全球高级持续性威胁(APT)2019年报告
- Program-Analysis
- A_Survey_of_Symbolic_Execution_Techniques
- All_You_Ever_Wanted_to_Know_About_Dynamic_Taint_Analysis_and_Forward_Symbolic_Execution-but_might_have_been_afraid_to_ask
- CUTE_A_Concolic_Unit_Testing_Engine_for_C
- Finding_security_vulnerabilities_with_modern_fuzzing_techniques
- Intro_to_Binary_Analysis_with_Z3_and_Angr
- Principles_of_Program_Analysis
- SAT-SMT_by_example
- SVF_Interprocedural_Static_Value-Flow_Analysis_in_LLVM
- Static_Program_Analysis
- The_NOT-SO-PROFITABLE_Path_Towards_Automated_Heap_Exploitation
- Unleashing_MAYHEM_on_Binary_Code
- WYSINWYX_What_You_See_Is_Not_What_You_eXecute
- README.link.md
- README.md
- README.old.md
- Reverse-Engineering
- An_In-Depth_Analysis_of_Disassembly_on_Full-Scale_x86x64_Binaries
- An_Observational_Investigation_of_Reverse_Engineers_Processes
- Reverse_Engineering_for_Beginners
- Reversing_Secrets_of_Reverse_Engineering
- Three_Heads_Are_Better_Than_One_Mastering_NSAs_Ghidra_Reverse_Engineering_Tool
- Unpacking_for_Dummies
- anti-reverse-engineering-linux
- Vehicle
- 0-days&Mitigations_Roadways_to_Exploit_and_Secure_Connected_BMW_Cars
- README.md
- us-19-Cai-0-Days-And-Mitigations-Roadways-To-Exploit-And-Secure-Connected-BMW-Cars-wp.pdf
- us-19-Cai-0-Days-And-Mitigations-Roadways-To-Exploit-And-Secure-Connected-BMW-Cars.pdf
- 2018智能网联汽车信息安全年度报告
- 2019智能网联汽车信息安全年度报告
- 2020智能网联汽车安全渗透白皮书
- 2020车联网网络安全白皮书
- Automated_Cross-Platform_Reverse_Engineering_of_CAN_Bus_Commands_From_Mobile_Apps
- Car_Hacking_series
- README.md
- Remote Car Hacking.pdf
- can message injection.pdf
- car_hacking.pdf
- car_hacking_poories.pdf
- remote attack surfaces.pdf
- securing_self_driving_cars.pdf
- Car_Infotainment_Hacking_Methodology_and_Attack_Surface_Scenarios
- Common_Attacks_Against_Car_Infotainment_Systems
- Contactless_Attacks_against_Sensors_of_Self-driving_Vehicle
- Fooling_Sensors_and_Tracking_Drivers
- README.md
- eu-15-Petit-Self-Driving-And-Connected-Cars-Fooling-Sensors-And-Tracking-Drivers-wp1.pdf
- eu-15-Petit-Self-Driving-And-Connected-Cars-Fooling-Sensors-And-Tracking-Drivers-wp2.pdf
- eu-15-Petit-Self-Driving-And-Connected-Cars-Fooling-Sensors-And-Tracking-Drivers.pdf
- Free-Fall_Hacking_Tesla_from_Wireless_to_CAN_Bus
- README.md
- us17-Free-Fall-Hacking-Tesla-From-Wireless-To-CAN-Bus-wp.pdf
- us17-Free-Fall-Hacking-Tesla-From-Wireless-To-CAN-Bus.pdf
- Hold_the_Door_Fingerprinting_Your_Car_Key_to_Prevent_Keyless_Entry_Car_Theft
- Losing_the_Car_Keys_Wireless_PHY-Layer_Insecurity_in_EV_Charging
- Over-The-Air_How_We_Remotely_Compromised_The_Gateway_Bcm_And_Autopilot_ECUs_Of_Tesla_Cars
- README.md
- us18-Over-The-Air-How-We-Remotely-Compromised-The-Gateway-Bcm-And-Autopilot-Ecus-Of-Tesla-Cars-wp.pdf
- us18-Over-The-Air-How-We-Remotely-Compromised-The-Gateway-Bcm-And-Autopilot-Ecus-Of-Tesla-Cars.pdf
- Passive_Keyless_Entry_and_Start_Systems_in_Modern_Supercars
- Passive_Keyless_Entry_and_Start_Systems_in_Modern_Supercars-wp.pdf
- Passive_Keyless_Entry_and_Start_Systems_in_Modern_Supercars.pdf
- README.md
- Pentesting_Vehicles_with_CANToolz
- TBONE–A_zero-click_exploit_for_Tesla_MCUs
- Tesla远程API逆向分析与利用
- The_Car_Hackers_Handbook_A_Guide_for_the_Penetration_Tester
- Towards_Automatically_Reverse_Engineering_Vehicle_Diagnostic_Protocols
- X-in-the-Middle_Attacking_Fast_Charging_Piles_and_Electric_Vehicles
- 奔驰汽车信息安全研究综述报告
- 宝马多款车型的安全研究综述
- 智能汽车安全攻防大揭秘
- 梅赛德斯-奔驰安全研究报告
- 特斯拉安全漏洞的发现过程
- 车联网安全综述
- 车联网数据安全体系建设指南
- Virtualization
- BHUSA2015-unicorn
- Hypervisor-Level_Debugger_Benefits_Challenges
- VirtualBox_User_Manual
- intel_virtualisation_how_vt-x_kvm_and_qemu_work_together
- thinking_outside_the_virtualbox
- unboxing_your_virtualboxes
所有权归 github.com/firmianay/security-paper 拥有。本站仅提供github文件链接,不对仓库内容负责