http://citpsite.s3-website-us-east-1.amazonaws.com/oldsite-htdocs/pub/coldboot.pdf
冷启动攻击加密密钥
https://conference.hitb.org/hitbsecconf2016ams/materials/D1T1%20-%20Radu%20Caragea%20-%20Peering%20into%20the%20Depths%20of%20TLS%20Traffic%20in%20Real%20Time.pdf
实时解密TLS流量
http://tekwizz123.blogspot.tw/2016/06/solving-crackmes-beginners-guide-using.html
使用Hopper反编译器解决LuCiFeR's Crackme 2
http://malwinator.com/anti-disassembly-used-in-malware-a-primer/
恶意软件使用的反编译技巧
https://n0where.net/how-does-it-work-iptables/
iptables是如何工作的
http://www.toolswatch.org/wp-content/uploads/2015/11/ICSSCADA-Top-10-Most-Dangerous-Software-Weaknesses.pdf
ICS/SCADA Top 10 最危险的软件漏洞
https://github.com/graniet/Inspector
unix提权辅助工具
http://researchcenter.paloaltonetworks.com/2016/06/unit42-using-idapython-to-make-your-life-easier-part-6/
使用idapython让你的逆向工作更轻松
http://www.ehacking.net/2016/06/Block-TOR-users-access-website.html
如何禁止TOR用户访问你的网站
https://github.com/nccgroup/Cyber-Defence/blob/master/Technical%20Notes/Sakula/Sakula%20technical%20note%201.0.pdf
Sakula技术细节笔记 & YARA 规则
http://www.slideshare.net/iamit/social-media-risk-metrics?from_action=save
社交媒体风险度量
https://www.facebook.com/notes/phwd/facebook-bug-bounties-the-unofficial-treasure-map/1020506894706001
Facebook的Bug Bounties – 非官方的藏宝图
https://blogs.mcafee.com/mcafee-labs/testing-race-conditions-web-applications/
测试WEB应用程序的条件竞争漏洞
https://github.com/dxa4481/windowHijacking
Window hijacking DEMO程序
http://blog.ptsecurity.com/2016/06/phd-vi-how-they-stole-our-drone.html
他们如何偷取/劫持我的无人机的
https://blogs.intel.com/evangelists/2016/06/09/intel-release-new-technology-specifications-protect-rop-attacks/
Intel发行新技术用来阻止ROP攻击
http://blog.talosintel.com/2016/06/pdfium.html
google chrome中的PDFIUM 漏洞
http://rileykidd.com/2016/06/09/hack-in-the-box-2016-misc400-writeup-part-1/
Hack in the Box 2016 – MISC400 Writeup (Part 1)
http://www.clearskysec.com/wp-content/uploads/2016/06/Operation-DustySky2_-6.2016_TLP_White.pdf
DustySky2攻击行动报告
https://medium.com/@intideceukelaire/why-you-shouldnt-share-links-on-facebook-f317ba4aa58b#.q0q31z2kw
为什么你不能在Facebook上分享链接
http://www.irongeek.com/i.php?page=videos/nolacon2016/mainlist
NolaCon 2016 会议视频
http://sww-it.ru/2016-06-11/1381
WinDBG Anti-RootKit 扩展
https://blog.malwarebytes.org/threat-analysis/2016/06/petya-and-mischa-ransomware-duet-part-2/
彼佳和米莎 – 勒索二重奏(第二部分)
https://blog.cloudflare.com/optimizing-tls-over-tcp-to-reduce-latency/
通过TCP优化TLS来减少延迟
https://www.peerlyst.com/posts/resource-open-source-fuzzers-list
开源fuzzer列表
http://paraschetal.in/gracker-level07/
Gracker level7 write-up
https://bugs.chromium.org/p/project-zero/issues/detail?id=776#c_ts1465491638
OS X exploitable kernel NULL pointer dereference in IOAudioEngine
https://dl.packetstormsecurity.net/1606-exploits/poisonivy_21x_bof.rb.txt
Poison Ivy 2.1.4 C2远程缓冲区溢出漏洞,漏洞分析在http://samvartaka.github.io/exploitation/2016/06/03/dead-rats-exploiting-malware
https://blogs.technet.microsoft.com/mmpc/2016/06/09/reverse-engineering-dubnium-2/
反向工程DUBNIUM
https://www.trustwave.com/Resources/SpiderLabs-Blog/Linux-Kernel-ROP—Ropping-your-way-to—(Part-1)/
linux内核ROP
http://jcjc-dev.com/2016/06/08/reversing-huawei-4-dumping-flash/
实践反向工程Part 4 – Dumping the Flash
http://www.securityweek.com/serious-flaw-found-popular-d-link-wi-fi-camera
流行的 D-Link Wi-Fi 摄像头 发现严重的漏洞
https://www.documentcloud.org/documents/2858939-Soghoian-Declaration-in-Matish.html
针对TOR浏览器的利用案例