Aggregator
CodeQL静态代码扫描之实现关联接口、入参、和危险方法并自动化构造payload及抽象类探究
CodeQL静态代码扫描之实现关联接口、入参、和危险方法并自动化构造payload及抽象类探究
Linux tracing - kprobe, uprobe and tracepoint
CobaltStrike Argue 原理 - 翻译文
突然好奇 argue 原理,于是有了此文
华硕路由器远程代码执行漏洞通告
华硕路由器远程代码执行漏洞通告
Special Delivery: Criminals Posing as Amazon Are Out to Steal User’s Data
One of the joys of online shopping is instant gratification – your purchases arrive on your doorstep in just a few...
The post Special Delivery: Criminals Posing as Amazon Are Out to Steal User’s Data appeared first on McAfee Blog.
成神赞歌的前奏
成神赞歌的前奏
成神赞歌的前奏
成神赞歌的前奏
成神赞歌的前奏
HAProxy 区分流量特征
Illusion of Control: Capability Maturity Models and Red Teaming
Throughout my career I have been fascinated with quality assurance and testing, especially security testing and red teaming. One discussion that comes up frequently is how to measure the maturity of such programs and processes.
My answer is straight forward as there are already existing frameworks that can be leveraged, adjusted and borrowed from to fit the needs of offensive security programs.
You are likely familiar or have at least heard of the Capability Maturity Model Integration from Carnegie Mellon University. In particular CMMI defines five levels to measure software engineering processes as follows: