EDR 绕过技术演进史:从 API Unhooking 到 AI 规避的十年攻防
原文链接作者https://www.covertswarm.com/post/timeline-of-edr-bypass-techniquesIbai Castells终端检测与响应(EDR)解决方
阅读全文原文链接作者https://www.covertswarm.com/post/timeline-of-edr-bypass-techniquesIbai Castells终端检测与响应(EDR)解决方
阅读全文原文链接作者https://sethenoka.com/posts/understanding-windows-artefacts-as-evidence-not-indicators/Seth En
阅读全文原文链接作者https://socfortress.medium.com/title-volatility-3-will-change-how-you-hunt-malware-and-heres-t
阅读全文原文链接作者https://blog.reversesociety.co/blog/2025/predator-ios-malware-surveillance-framework-part-1Rev
阅读全文原文链接作者https://cicada-8.medium.com/impacket-developer-guide-part-3-make-your-own-lateral-movement-a2f
阅读全文原文链接作者https://cicada-8.medium.com/impacket-developer-guide-part-2-finding-rpc-on-the-system-and-some
阅读全文原文链接作者https://cicada-8.medium.com/impacket-developer-guide-part-1-rpc-4df4fe6d79d7CICADA8大家好,我叫 Mich
阅读全文原文链接作者https://thelocalh0st.com/posts/rdp/sujay adkesar"RDP 是一把双刃剑——它提供了无缝的远程访问能力,但一旦落入攻击者手中,就成了入侵的通道
阅读全文原文链接作者https://dfir.ru/2026/01/26/windows-event-logs-were-cleared-but-resurrected-in-another-file/MAX
阅读全文原文链接作者https://www.cobaltstrike.com/blog/playing-in-the-tradecraft-garden-of-beaconWilliam Burgess我们此
阅读全文原文链接作者https://latedeployment.github.io/posts/certificate-transparency-info-leaks/latedeployment这是 Ce
阅读全文原文链接作者https://www.netero1010-securitylab.com/red-team/abuse-sccm-remote-control-as-native-vncNetero1
阅读全文原文链接作者https://kleiton0x00.github.io/posts/The-more-predictable-you-are-the-less-you-are-able-to-get-
阅读全文原文链接作者https://medium.com/@s12deff/rpc-proxy-injection-1a4b08f59823S12 - 0x12Dark欢迎阅读本文。本文将介绍一种新型进程注入
阅读全文原文链接作者https://projectzero.google/2026/26/windows-administrator-protection.htmlJames ForshawWindows 1
阅读全文原文链接作者https://c0w5lip.github.io/posts/2026-01-25-patch-diffing-introduction/c0w5lip介绍本文旨在快速入门"补丁对比"(
阅读全文原文链接作者https://www.gecko.security/blog/caldotcom-broken-access-controlsJeevan Jutla执行摘要Cal.com 是一个开源的
阅读全文这篇博文记录了我在 Lenovo 机器上的一个小发现:C:\Windows目录下存在一个可写文件。最初我以为只有少数几款 Lenovo 机型受影响,但后来发现这个问题似乎波及所有型号。由于它可以被利用
阅读全文原文链接作者https://srcincite.io/blog/2026/01/28/samstung-part-1-remote-code-execution-in-magicinfo-server
阅读全文原文链接作者https://srcincite.io/blog/2026/01/28/samstung-part-2-remote-code-execution-in-magicinfo-server
阅读全文有时候,进入一个进程最好的方式,就是不请自来、大闹一场!原文链接作者https://fluxsec.red/dll-injection-edr-evasion-1fluxsec简介项目代码: http
阅读全文原文链接作者https://medium.com/@nickvourd/the-walking-dead-of-active-directory-1edd33fd7050Nikos Vourdas (
阅读全文原文链接作者https://zere.es/posts/cache-deception-cspt-account-takeover/Jorge Cerezo Dacosta最近在审计某个私有 Bug
阅读全文原文链接作者https://medium.com/@S.1.l.k.y/abusing-windows-audio-for-local-privilege-escalation-1d59440116c
阅读全文原文链接作者https://specterops.io/blog/2026/01/30/weaponizing-whitelists-an-azure-blob-storage-mythic-c2-p
阅读全文Kubernetes RBAC 中的一个授权绕过允许仅拥有 nodes/proxy GET权限的主体在集群内任意 Pod 中执行命令。原文链接作者<https://grahamhelton.com/b
阅读全文原文链接作者https://keowu.re/posts/Ryūjin---Writing-a-Bin2Bin-Obfuscator-from-Scratch-for-Windows-PE-x64-a
阅读全文原文链接作者https://www.depthsecurity.com/blog/using-ntlm-reflection-to-own-active-directory/LOGAN DIOMEDI
阅读全文原文链接作者https://www.synacktiv.com/en/publications/on-the-clock-escaping-vmware-workstation-at-pwn2own-
阅读全文