Full Code of WilsonHuha/cbr-doc for AI

master 5a43da7fd432 cached
532 files
46.4 MB
12.2M tokens
1 requests
Copy disabled (too large) Download .txt
Showing preview only (50,122K chars total). Download the full file to get everything.
Repository: WilsonHuha/cbr-doc
Branch: master
Commit: 5a43da7fd432
Files: 532
Total size: 46.4 MB

Directory structure:
gitextract_aeqbslcx/

├── .directory
├── README.md
├── posts/
│   ├── .directory
│   ├── cc/
│   │   ├── 0Day_post_sort_by_cc_cnt.md
│   │   ├── 0Day_post_sort_by_time.md
│   │   ├── 1Day_post_sort_by_cc_cnt.md
│   │   ├── 1Day_post_sort_by_time.md
│   │   ├── 4G_post_sort_by_cc_cnt.md
│   │   ├── 4G_post_sort_by_time.md
│   │   ├── 5G_post_sort_by_cc_cnt.md
│   │   ├── 5G_post_sort_by_time.md
│   │   ├── AFLfuzzer_post_sort_by_cc_cnt.md
│   │   ├── AFLfuzzer_post_sort_by_time.md
│   │   ├── AMSI_post_sort_by_cc_cnt.md
│   │   ├── AMSI_post_sort_by_time.md
│   │   ├── APT_OceanLotus_post_sort_by_cc_cnt.md
│   │   ├── APT_OceanLotus_post_sort_by_time.md
│   │   ├── ASPack_post_sort_by_cc_cnt.md
│   │   ├── ASPack_post_sort_by_time.md
│   │   ├── AST_post_sort_by_cc_cnt.md
│   │   ├── AST_post_sort_by_time.md
│   │   ├── Aes_post_sort_by_cc_cnt.md
│   │   ├── Aes_post_sort_by_time.md
│   │   ├── Ai_post_sort_by_cc_cnt.md
│   │   ├── Ai_post_sort_by_time.md
│   │   ├── Aircrack_post_sort_by_cc_cnt.md
│   │   ├── Aircrack_post_sort_by_time.md
│   │   ├── Algorithm_post_sort_by_cc_cnt.md
│   │   ├── Algorithm_post_sort_by_time.md
│   │   ├── Androguard_post_sort_by_cc_cnt.md
│   │   ├── Androguard_post_sort_by_time.md
│   │   ├── Android_post_sort_by_cc_cnt.md
│   │   ├── Android_post_sort_by_time.md
│   │   ├── Anti-AV_post_sort_by_cc_cnt.md
│   │   ├── Anti-AV_post_sort_by_time.md
│   │   ├── Anti-Analysis_post_sort_by_cc_cnt.md
│   │   ├── Anti-Analysis_post_sort_by_time.md
│   │   ├── Anti-Debug_post_sort_by_cc_cnt.md
│   │   ├── Anti-Debug_post_sort_by_time.md
│   │   ├── Anti-Disassemble_post_sort_by_cc_cnt.md
│   │   ├── Anti-Disassemble_post_sort_by_time.md
│   │   ├── Anti-Forensic_post_sort_by_cc_cnt.md
│   │   ├── Anti-Forensic_post_sort_by_time.md
│   │   ├── Anti-VM_post_sort_by_cc_cnt.md
│   │   ├── Anti-VM_post_sort_by_time.md
│   │   ├── Apktool_post_sort_by_cc_cnt.md
│   │   ├── Apktool_post_sort_by_time.md
│   │   ├── Aslr_post_sort_by_cc_cnt.md
│   │   ├── Aslr_post_sort_by_time.md
│   │   ├── Auto-Start_post_sort_by_cc_cnt.md
│   │   ├── Auto-Start_post_sort_by_time.md
│   │   ├── Aws_post_sort_by_cc_cnt.md
│   │   ├── Aws_post_sort_by_time.md
│   │   ├── Backdoor_post_sort_by_cc_cnt.md
│   │   ├── Backdoor_post_sort_by_time.md
│   │   ├── BillGates_post_sort_by_cc_cnt.md
│   │   ├── BillGates_post_sort_by_time.md
│   │   ├── BinDiff_post_sort_by_cc_cnt.md
│   │   ├── BinDiff_post_sort_by_time.md
│   │   ├── BinWalk_post_sort_by_cc_cnt.md
│   │   ├── BinWalk_post_sort_by_time.md
│   │   ├── BinaryNinja_post_sort_by_cc_cnt.md
│   │   ├── BinaryNinja_post_sort_by_time.md
│   │   ├── Bios_post_sort_by_cc_cnt.md
│   │   ├── Bios_post_sort_by_time.md
│   │   ├── Bitcoin_post_sort_by_cc_cnt.md
│   │   ├── Bitcoin_post_sort_by_time.md
│   │   ├── Blacklisting_post_sort_by_cc_cnt.md
│   │   ├── Blacklisting_post_sort_by_time.md
│   │   ├── Blockchain_post_sort_by_cc_cnt.md
│   │   ├── Blockchain_post_sort_by_time.md
│   │   ├── BloodHound_post_sort_by_cc_cnt.md
│   │   ├── BloodHound_post_sort_by_time.md
│   │   ├── BlueTeam_post_sort_by_cc_cnt.md
│   │   ├── BlueTeam_post_sort_by_time.md
│   │   ├── Bootkit_post_sort_by_cc_cnt.md
│   │   ├── Bootkit_post_sort_by_time.md
│   │   ├── Bootloader_post_sort_by_cc_cnt.md
│   │   ├── Bootloader_post_sort_by_time.md
│   │   ├── Botnet_post_sort_by_cc_cnt.md
│   │   ├── Botnet_post_sort_by_time.md
│   │   ├── Burp_post_sort_by_cc_cnt.md
│   │   ├── Burp_post_sort_by_time.md
│   │   ├── CISSP_post_sort_by_cc_cnt.md
│   │   ├── CISSP_post_sort_by_time.md
│   │   ├── CKnife_post_sort_by_cc_cnt.md
│   │   ├── CKnife_post_sort_by_time.md
│   │   ├── CRLF_post_sort_by_cc_cnt.md
│   │   ├── CRLF_post_sort_by_time.md
│   │   ├── CVE_post_sort_by_cc_cnt.md
│   │   ├── CVE_post_sort_by_time.md
│   │   ├── Capstone_post_sort_by_cc_cnt.md
│   │   ├── Capstone_post_sort_by_time.md
│   │   ├── CheatEngine_post_sort_by_cc_cnt.md
│   │   ├── CheatEngine_post_sort_by_time.md
│   │   ├── CnC_post_sort_by_cc_cnt.md
│   │   ├── CnC_post_sort_by_time.md
│   │   ├── CobaltStrike_post_sort_by_cc_cnt.md
│   │   ├── CobaltStrike_post_sort_by_time.md
│   │   ├── CodeInjection_post_sort_by_cc_cnt.md
│   │   ├── CodeInjection_post_sort_by_time.md
│   │   ├── ContentInjection_post_sort_by_cc_cnt.md
│   │   ├── ContentInjection_post_sort_by_time.md
│   │   ├── ControlFlowFlattening_post_sort_by_cc_cnt.md
│   │   ├── ControlFlowFlattening_post_sort_by_time.md
│   │   ├── Crack_post_sort_by_cc_cnt.md
│   │   ├── Crack_post_sort_by_time.md
│   │   ├── Cryptography_post_sort_by_cc_cnt.md
│   │   ├── Cryptography_post_sort_by_time.md
│   │   ├── Csp_post_sort_by_cc_cnt.md
│   │   ├── Csp_post_sort_by_time.md
│   │   ├── Csrf_post_sort_by_cc_cnt.md
│   │   ├── Csrf_post_sort_by_time.md
│   │   ├── Ctf_post_sort_by_cc_cnt.md
│   │   ├── Ctf_post_sort_by_time.md
│   │   ├── CuckooDroid_post_sort_by_cc_cnt.md
│   │   ├── CuckooDroid_post_sort_by_time.md
│   │   ├── Cuckoo_post_sort_by_cc_cnt.md
│   │   ├── Cuckoo_post_sort_by_time.md
│   │   ├── D-Link_post_sort_by_cc_cnt.md
│   │   ├── D-Link_post_sort_by_time.md
│   │   ├── DDoS_post_sort_by_cc_cnt.md
│   │   ├── DDoS_post_sort_by_time.md
│   │   ├── DES_post_sort_by_cc_cnt.md
│   │   ├── DES_post_sort_by_time.md
│   │   ├── DLLInjection_post_sort_by_cc_cnt.md
│   │   ├── DLLInjection_post_sort_by_time.md
│   │   ├── DNSMap_post_sort_by_cc_cnt.md
│   │   ├── DNSMap_post_sort_by_time.md
│   │   ├── DOTA2_post_sort_by_cc_cnt.md
│   │   ├── DOTA2_post_sort_by_time.md
│   │   ├── Dalvik_post_sort_by_cc_cnt.md
│   │   ├── Dalvik_post_sort_by_time.md
│   │   ├── DarkWeb_post_sort_by_cc_cnt.md
│   │   ├── DarkWeb_post_sort_by_time.md
│   │   ├── DataBreach_post_sort_by_cc_cnt.md
│   │   ├── DataBreach_post_sort_by_time.md
│   │   ├── DataExfiltration_post_sort_by_cc_cnt.md
│   │   ├── DataExfiltration_post_sort_by_time.md
│   │   ├── Dbi_post_sort_by_cc_cnt.md
│   │   ├── Dbi_post_sort_by_time.md
│   │   ├── Dcom_post_sort_by_cc_cnt.md
│   │   ├── Dcom_post_sort_by_time.md
│   │   ├── DeVirtualization_post_sort_by_cc_cnt.md
│   │   ├── DeVirtualization_post_sort_by_time.md
│   │   ├── Decompiler_post_sort_by_cc_cnt.md
│   │   ├── Decompiler_post_sort_by_time.md
│   │   ├── Decrypt_post_sort_by_cc_cnt.md
│   │   ├── Decrypt_post_sort_by_time.md
│   │   ├── Deobfuscation_post_sort_by_cc_cnt.md
│   │   ├── Deobfuscation_post_sort_by_time.md
│   │   ├── DevOps_post_sort_by_cc_cnt.md
│   │   ├── DevOps_post_sort_by_time.md
│   │   ├── Dex2Jar_post_sort_by_cc_cnt.md
│   │   ├── Dex2Jar_post_sort_by_time.md
│   │   ├── DirectX_post_sort_by_cc_cnt.md
│   │   ├── DirectX_post_sort_by_time.md
│   │   ├── Disassembler_post_sort_by_cc_cnt.md
│   │   ├── Disassembler_post_sort_by_time.md
│   │   ├── Docker_post_sort_by_cc_cnt.md
│   │   ├── Docker_post_sort_by_time.md
│   │   ├── Downloader_post_sort_by_cc_cnt.md
│   │   ├── Downloader_post_sort_by_time.md
│   │   ├── Drone_post_sort_by_cc_cnt.md
│   │   ├── Drone_post_sort_by_time.md
│   │   ├── Dropper_post_sort_by_cc_cnt.md
│   │   ├── Dropper_post_sort_by_time.md
│   │   ├── DynamoRIO_post_sort_by_cc_cnt.md
│   │   ├── DynamoRIO_post_sort_by_time.md
│   │   ├── EDR_post_sort_by_cc_cnt.md
│   │   ├── EDR_post_sort_by_time.md
│   │   ├── Emotet_post_sort_by_cc_cnt.md
│   │   ├── Emotet_post_sort_by_time.md
│   │   ├── Empire_post_sort_by_cc_cnt.md
│   │   ├── Empire_post_sort_by_time.md
│   │   ├── Encrypt_post_sort_by_cc_cnt.md
│   │   ├── Encrypt_post_sort_by_time.md
│   │   ├── EnigmaProtect_post_sort_by_cc_cnt.md
│   │   ├── EnigmaProtect_post_sort_by_time.md
│   │   ├── Escape_post_sort_by_cc_cnt.md
│   │   ├── Escape_post_sort_by_time.md
│   │   ├── Fileless_post_sort_by_cc_cnt.md
│   │   ├── Fileless_post_sort_by_time.md
│   │   ├── FinFisher_post_sort_by_cc_cnt.md
│   │   ├── FinFisher_post_sort_by_time.md
│   │   ├── Fingerprinting_post_sort_by_cc_cnt.md
│   │   ├── Fingerprinting_post_sort_by_time.md
│   │   ├── Finspy_post_sort_by_cc_cnt.md
│   │   ├── Finspy_post_sort_by_time.md
│   │   ├── FireWall_post_sort_by_cc_cnt.md
│   │   ├── FireWall_post_sort_by_time.md
│   │   ├── Firmware_post_sort_by_cc_cnt.md
│   │   ├── Firmware_post_sort_by_time.md
│   │   ├── Forensic_post_sort_by_cc_cnt.md
│   │   ├── Forensic_post_sort_by_time.md
│   │   ├── Frida_post_sort_by_cc_cnt.md
│   │   ├── Frida_post_sort_by_time.md
│   │   ├── Fuzzing_post_sort_by_cc_cnt.md
│   │   ├── Fuzzing_post_sort_by_time.md
│   │   ├── Gdb_post_sort_by_cc_cnt.md
│   │   ├── Gdb_post_sort_by_time.md
│   │   ├── Getshell_post_sort_by_cc_cnt.md
│   │   ├── Getshell_post_sort_by_time.md
│   │   ├── Gfw_post_sort_by_cc_cnt.md
│   │   ├── Gfw_post_sort_by_time.md
│   │   ├── Ghidra_post_sort_by_cc_cnt.md
│   │   ├── Ghidra_post_sort_by_time.md
│   │   ├── HashCat_post_sort_by_cc_cnt.md
│   │   ├── HashCat_post_sort_by_time.md
│   │   ├── Heartbleed_post_sort_by_cc_cnt.md
│   │   ├── Heartbleed_post_sort_by_time.md
│   │   ├── Hids_post_sort_by_cc_cnt.md
│   │   ├── Hids_post_sort_by_time.md
│   │   ├── Hijack_post_sort_by_cc_cnt.md
│   │   ├── Hijack_post_sort_by_time.md
│   │   ├── Homographs_post_sort_by_cc_cnt.md
│   │   ├── Homographs_post_sort_by_time.md
│   │   ├── HoneyPot_post_sort_by_cc_cnt.md
│   │   ├── HoneyPot_post_sort_by_time.md
│   │   ├── Hooking_post_sort_by_cc_cnt.md
│   │   ├── Hooking_post_sort_by_time.md
│   │   ├── Hopper_post_sort_by_cc_cnt.md
│   │   ├── Hopper_post_sort_by_time.md
│   │   ├── Huawei_post_sort_by_cc_cnt.md
│   │   ├── Huawei_post_sort_by_time.md
│   │   ├── IDAPython_post_sort_by_cc_cnt.md
│   │   ├── IDAPython_post_sort_by_time.md
│   │   ├── IDN_post_sort_by_cc_cnt.md
│   │   ├── IDN_post_sort_by_time.md
│   │   ├── Ida_post_sort_by_cc_cnt.md
│   │   ├── Ida_post_sort_by_time.md
│   │   ├── Ids_post_sort_by_cc_cnt.md
│   │   ├── Ids_post_sort_by_time.md
│   │   ├── ImmunityDebugger_post_sort_by_cc_cnt.md
│   │   ├── ImmunityDebugger_post_sort_by_time.md
│   │   ├── IncidentResponse_post_sort_by_cc_cnt.md
│   │   ├── IncidentResponse_post_sort_by_time.md
│   │   ├── IntelPT_post_sort_by_cc_cnt.md
│   │   ├── IntelPT_post_sort_by_time.md
│   │   ├── IntelPin_post_sort_by_cc_cnt.md
│   │   ├── IntelPin_post_sort_by_time.md
│   │   ├── IntermediateLanguage_post_sort_by_cc_cnt.md
│   │   ├── IntermediateLanguage_post_sort_by_time.md
│   │   ├── IoC_post_sort_by_cc_cnt.md
│   │   ├── IoC_post_sort_by_time.md
│   │   ├── IoT_post_sort_by_cc_cnt.md
│   │   ├── IoT_post_sort_by_time.md
│   │   ├── Jailbreak_post_sort_by_cc_cnt.md
│   │   ├── Jailbreak_post_sort_by_time.md
│   │   ├── JavaDecompiler_post_sort_by_cc_cnt.md
│   │   ├── JavaDecompiler_post_sort_by_time.md
│   │   ├── Kali_post_sort_by_cc_cnt.md
│   │   ├── Kali_post_sort_by_time.md
│   │   ├── Kaslr_post_sort_by_cc_cnt.md
│   │   ├── Kaslr_post_sort_by_time.md
│   │   ├── Keylogging_post_sort_by_cc_cnt.md
│   │   ├── Keylogging_post_sort_by_time.md
│   │   ├── Kvm_post_sort_by_cc_cnt.md
│   │   ├── Kvm_post_sort_by_time.md
│   │   ├── LSP_post_sort_by_cc_cnt.md
│   │   ├── LSP_post_sort_by_time.md
│   │   ├── Labeless_post_sort_by_cc_cnt.md
│   │   ├── Labeless_post_sort_by_time.md
│   │   ├── Lantern_post_sort_by_cc_cnt.md
│   │   ├── Lantern_post_sort_by_time.md
│   │   ├── LateralMovement_post_sort_by_cc_cnt.md
│   │   ├── LateralMovement_post_sort_by_time.md
│   │   ├── Llvm_post_sort_by_cc_cnt.md
│   │   ├── Llvm_post_sort_by_time.md
│   │   ├── MemoryInjection_post_sort_by_cc_cnt.md
│   │   ├── MemoryInjection_post_sort_by_time.md
│   │   ├── Metasploit_post_sort_by_cc_cnt.md
│   │   ├── Metasploit_post_sort_by_time.md
│   │   ├── MiTB_post_sort_by_cc_cnt.md
│   │   ├── MiTB_post_sort_by_time.md
│   │   ├── Miasm_post_sort_by_cc_cnt.md
│   │   ├── Miasm_post_sort_by_time.md
│   │   ├── Microcode_post_sort_by_cc_cnt.md
│   │   ├── Microcode_post_sort_by_time.md
│   │   ├── Mimikatz_post_sort_by_cc_cnt.md
│   │   ├── Mimikatz_post_sort_by_time.md
│   │   ├── Mirai_post_sort_by_cc_cnt.md
│   │   ├── Mirai_post_sort_by_time.md
│   │   ├── Misp_post_sort_by_cc_cnt.md
│   │   ├── Misp_post_sort_by_time.md
│   │   ├── MitmProxy_post_sort_by_cc_cnt.md
│   │   ├── MitmProxy_post_sort_by_time.md
│   │   ├── Mitm_post_sort_by_cc_cnt.md
│   │   ├── Mitm_post_sort_by_time.md
│   │   ├── MitreATT&CK_post_sort_by_cc_cnt.md
│   │   ├── MitreATT&CK_post_sort_by_time.md
│   │   ├── Mona_post_sort_by_cc_cnt.md
│   │   ├── Mona_post_sort_by_time.md
│   │   ├── NMap_post_sort_by_cc_cnt.md
│   │   ├── NMap_post_sort_by_time.md
│   │   ├── OSCP_post_sort_by_cc_cnt.md
│   │   ├── OSCP_post_sort_by_time.md
│   │   ├── Obfuscation_post_sort_by_cc_cnt.md
│   │   ├── Obfuscation_post_sort_by_time.md
│   │   ├── ObjDump_post_sort_by_cc_cnt.md
│   │   ├── ObjDump_post_sort_by_time.md
│   │   ├── OfficeMacro_post_sort_by_cc_cnt.md
│   │   ├── OfficeMacro_post_sort_by_time.md
│   │   ├── OllyDbg_post_sort_by_cc_cnt.md
│   │   ├── OllyDbg_post_sort_by_time.md
│   │   ├── OnionScan_post_sort_by_cc_cnt.md
│   │   ├── OnionScan_post_sort_by_time.md
│   │   ├── OpaquePredicates_post_sort_by_cc_cnt.md
│   │   ├── OpaquePredicates_post_sort_by_time.md
│   │   ├── Osint_post_sort_by_cc_cnt.md
│   │   ├── Osint_post_sort_by_time.md
│   │   ├── Owasp_post_sort_by_cc_cnt.md
│   │   ├── Owasp_post_sort_by_time.md
│   │   ├── Packer_post_sort_by_cc_cnt.md
│   │   ├── Packer_post_sort_by_time.md
│   │   ├── Payload_post_sort_by_cc_cnt.md
│   │   ├── Payload_post_sort_by_time.md
│   │   ├── PenetrationTesting_post_sort_by_cc_cnt.md
│   │   ├── PenetrationTesting_post_sort_by_time.md
│   │   ├── Persistence_post_sort_by_cc_cnt.md
│   │   ├── Persistence_post_sort_by_time.md
│   │   ├── Phishing_post_sort_by_cc_cnt.md
│   │   ├── Phishing_post_sort_by_time.md
│   │   ├── PoC_post_sort_by_cc_cnt.md
│   │   ├── PoC_post_sort_by_time.md
│   │   ├── Poisoning_post_sort_by_cc_cnt.md
│   │   ├── Poisoning_post_sort_by_time.md
│   │   ├── Post-Exploitation_post_sort_by_cc_cnt.md
│   │   ├── Post-Exploitation_post_sort_by_time.md
│   │   ├── PowerSploit_post_sort_by_cc_cnt.md
│   │   ├── PowerSploit_post_sort_by_time.md
│   │   ├── Powershell_post_sort_by_cc_cnt.md
│   │   ├── Powershell_post_sort_by_time.md
│   │   ├── ProcDump_post_sort_by_cc_cnt.md
│   │   ├── ProcDump_post_sort_by_time.md
│   │   ├── ProcMon_post_sort_by_cc_cnt.md
│   │   ├── ProcMon_post_sort_by_time.md
│   │   ├── ProcessInjection_post_sort_by_cc_cnt.md
│   │   ├── ProcessInjection_post_sort_by_time.md
│   │   ├── Pwn2Own_post_sort_by_cc_cnt.md
│   │   ├── Pwn2Own_post_sort_by_time.md
│   │   ├── PwnAdventure3_post_sort_by_cc_cnt.md
│   │   ├── PwnAdventure3_post_sort_by_time.md
│   │   ├── Qemu_post_sort_by_cc_cnt.md
│   │   ├── Qemu_post_sort_by_time.md
│   │   ├── Radare2_post_sort_by_cc_cnt.md
│   │   ├── Radare2_post_sort_by_time.md
│   │   ├── Ransomware_post_sort_by_cc_cnt.md
│   │   ├── Ransomware_post_sort_by_time.md
│   │   ├── RaspberryPi_post_sort_by_cc_cnt.md
│   │   ├── RaspberryPi_post_sort_by_time.md
│   │   ├── Rat_post_sort_by_cc_cnt.md
│   │   ├── Rat_post_sort_by_time.md
│   │   ├── Rdp_post_sort_by_cc_cnt.md
│   │   ├── Rdp_post_sort_by_time.md
│   │   ├── Reconnaissance_post_sort_by_cc_cnt.md
│   │   ├── Reconnaissance_post_sort_by_time.md
│   │   ├── RedTeam_post_sort_by_cc_cnt.md
│   │   ├── RedTeam_post_sort_by_time.md
│   │   ├── Rekall_post_sort_by_cc_cnt.md
│   │   ├── Rekall_post_sort_by_time.md
│   │   ├── Retdec_post_sort_by_cc_cnt.md
│   │   ├── Retdec_post_sort_by_time.md
│   │   ├── ReverseEngineering_post_sort_by_cc_cnt.md
│   │   ├── ReverseEngineering_post_sort_by_time.md
│   │   ├── ReverseProxy_post_sort_by_cc_cnt.md
│   │   ├── ReverseProxy_post_sort_by_time.md
│   │   ├── ReverseShell_post_sort_by_cc_cnt.md
│   │   ├── ReverseShell_post_sort_by_time.md
│   │   ├── RootKit_post_sort_by_cc_cnt.md
│   │   ├── RootKit_post_sort_by_time.md
│   │   ├── Router_post_sort_by_cc_cnt.md
│   │   ├── Router_post_sort_by_time.md
│   │   ├── Rsa_post_sort_by_cc_cnt.md
│   │   ├── Rsa_post_sort_by_time.md
│   │   ├── Russia_post_sort_by_cc_cnt.md
│   │   ├── Russia_post_sort_by_time.md
│   │   ├── SQLInjection_post_sort_by_cc_cnt.md
│   │   ├── SQLInjection_post_sort_by_time.md
│   │   ├── Safengine_post_sort_by_cc_cnt.md
│   │   ├── Safengine_post_sort_by_time.md
│   │   ├── SandBox_post_sort_by_cc_cnt.md
│   │   ├── SandBox_post_sort_by_time.md
│   │   ├── ScyllaHide_post_sort_by_cc_cnt.md
│   │   ├── ScyllaHide_post_sort_by_time.md
│   │   ├── Shadowbroker_post_sort_by_cc_cnt.md
│   │   ├── Shadowbroker_post_sort_by_time.md
│   │   ├── Shadowsocks_post_sort_by_cc_cnt.md
│   │   ├── Shadowsocks_post_sort_by_time.md
│   │   ├── Shellcode_post_sort_by_cc_cnt.md
│   │   ├── Shellcode_post_sort_by_time.md
│   │   ├── Shodan_post_sort_by_cc_cnt.md
│   │   ├── Shodan_post_sort_by_time.md
│   │   ├── Smali_post_sort_by_cc_cnt.md
│   │   ├── Smali_post_sort_by_time.md
│   │   ├── SmartContract_post_sort_by_cc_cnt.md
│   │   ├── SmartContract_post_sort_by_time.md
│   │   ├── Smb_post_sort_by_cc_cnt.md
│   │   ├── Smb_post_sort_by_time.md
│   │   ├── Sniffing_post_sort_by_cc_cnt.md
│   │   ├── Sniffing_post_sort_by_time.md
│   │   ├── Snort_post_sort_by_cc_cnt.md
│   │   ├── Snort_post_sort_by_time.md
│   │   ├── SourceCodeAuditing_post_sort_by_cc_cnt.md
│   │   ├── SourceCodeAuditing_post_sort_by_time.md
│   │   ├── SpearPhishing_post_sort_by_cc_cnt.md
│   │   ├── SpearPhishing_post_sort_by_time.md
│   │   ├── Spoof_post_sort_by_cc_cnt.md
│   │   ├── Spoof_post_sort_by_time.md
│   │   ├── SqlMap_post_sort_by_cc_cnt.md
│   │   ├── SqlMap_post_sort_by_time.md
│   │   ├── Ssl_post_sort_by_cc_cnt.md
│   │   ├── Ssl_post_sort_by_time.md
│   │   ├── Steganography_post_sort_by_cc_cnt.md
│   │   ├── Steganography_post_sort_by_time.md
│   │   ├── Stuxnet_post_sort_by_cc_cnt.md
│   │   ├── Stuxnet_post_sort_by_time.md
│   │   ├── Subdomain_post_sort_by_cc_cnt.md
│   │   ├── Subdomain_post_sort_by_time.md
│   │   ├── SymbolicExecution_post_sort_by_cc_cnt.md
│   │   ├── SymbolicExecution_post_sort_by_time.md
│   │   ├── Sysmon_post_sort_by_cc_cnt.md
│   │   ├── Sysmon_post_sort_by_time.md
│   │   ├── TP-Link_post_sort_by_cc_cnt.md
│   │   ├── TP-Link_post_sort_by_time.md
│   │   ├── TeamViewer_post_sort_by_cc_cnt.md
│   │   ├── TeamViewer_post_sort_by_time.md
│   │   ├── TheHive_post_sort_by_cc_cnt.md
│   │   ├── TheHive_post_sort_by_time.md
│   │   ├── Themida_post_sort_by_cc_cnt.md
│   │   ├── Themida_post_sort_by_time.md
│   │   ├── ThreatHunting_post_sort_by_cc_cnt.md
│   │   ├── ThreatHunting_post_sort_by_time.md
│   │   ├── ThreatIntelligence_post_sort_by_cc_cnt.md
│   │   ├── ThreatIntelligence_post_sort_by_time.md
│   │   ├── TitanEngine_post_sort_by_cc_cnt.md
│   │   ├── TitanEngine_post_sort_by_time.md
│   │   ├── TitanHide_post_sort_by_cc_cnt.md
│   │   ├── TitanHide_post_sort_by_time.md
│   │   ├── Tls_post_sort_by_cc_cnt.md
│   │   ├── Tls_post_sort_by_time.md
│   │   ├── Tor_post_sort_by_cc_cnt.md
│   │   ├── Tor_post_sort_by_time.md
│   │   ├── Trickbot_post_sort_by_cc_cnt.md
│   │   ├── Trickbot_post_sort_by_time.md
│   │   ├── Trojan_post_sort_by_cc_cnt.md
│   │   ├── Trojan_post_sort_by_time.md
│   │   ├── Tunnelling_post_sort_by_cc_cnt.md
│   │   ├── Tunnelling_post_sort_by_time.md
│   │   ├── UACBypass_post_sort_by_cc_cnt.md
│   │   ├── UACBypass_post_sort_by_time.md
│   │   ├── Uac_post_sort_by_cc_cnt.md
│   │   ├── Uac_post_sort_by_time.md
│   │   ├── Unicorn_post_sort_by_cc_cnt.md
│   │   ├── Unicorn_post_sort_by_time.md
│   │   ├── Uroburos_post_sort_by_cc_cnt.md
│   │   ├── Uroburos_post_sort_by_time.md
│   │   ├── VEH_post_sort_by_cc_cnt.md
│   │   ├── VEH_post_sort_by_time.md
│   │   ├── VM-Escape_post_sort_by_cc_cnt.md
│   │   ├── VM-Escape_post_sort_by_time.md
│   │   ├── VMProtect_post_sort_by_cc_cnt.md
│   │   ├── VMProtect_post_sort_by_time.md
│   │   ├── VMware_post_sort_by_cc_cnt.md
│   │   ├── VMware_post_sort_by_time.md
│   │   ├── Vbs_post_sort_by_cc_cnt.md
│   │   ├── Vbs_post_sort_by_time.md
│   │   ├── Virtualization_post_sort_by_cc_cnt.md
│   │   ├── Virtualization_post_sort_by_time.md
│   │   ├── Vm_post_sort_by_cc_cnt.md
│   │   ├── Vm_post_sort_by_time.md
│   │   ├── Volatility_post_sort_by_cc_cnt.md
│   │   ├── Volatility_post_sort_by_time.md
│   │   ├── Vpn_post_sort_by_cc_cnt.md
│   │   ├── Vpn_post_sort_by_time.md
│   │   ├── WannaCry_post_sort_by_cc_cnt.md
│   │   ├── WannaCry_post_sort_by_time.md
│   │   ├── WateringHole_post_sort_by_cc_cnt.md
│   │   ├── WateringHole_post_sort_by_time.md
│   │   ├── WeChat_post_sort_by_cc_cnt.md
│   │   ├── WeChat_post_sort_by_time.md
│   │   ├── Whitelisting_post_sort_by_cc_cnt.md
│   │   ├── Whitelisting_post_sort_by_time.md
│   │   ├── WinAFL_post_sort_by_cc_cnt.md
│   │   ├── WinAFL_post_sort_by_time.md
│   │   ├── WinLicense_post_sort_by_cc_cnt.md
│   │   ├── WinLicense_post_sort_by_time.md
│   │   ├── Windbg_post_sort_by_cc_cnt.md
│   │   ├── Windbg_post_sort_by_time.md
│   │   ├── Wireshark_post_sort_by_cc_cnt.md
│   │   ├── Wireshark_post_sort_by_time.md
│   │   ├── Wmi_post_sort_by_cc_cnt.md
│   │   ├── Wmi_post_sort_by_time.md
│   │   ├── X64Dbg_post_sort_by_cc_cnt.md
│   │   ├── X64Dbg_post_sort_by_time.md
│   │   ├── XCode_post_sort_by_cc_cnt.md
│   │   ├── XCode_post_sort_by_time.md
│   │   ├── XIGNCODE3_post_sort_by_cc_cnt.md
│   │   ├── XIGNCODE3_post_sort_by_time.md
│   │   ├── Xposed_post_sort_by_cc_cnt.md
│   │   ├── Xposed_post_sort_by_time.md
│   │   ├── Xxe_post_sort_by_cc_cnt.md
│   │   ├── Xxe_post_sort_by_time.md
│   │   ├── Yara_post_sort_by_cc_cnt.md
│   │   ├── Yara_post_sort_by_time.md
│   │   ├── ZeusVM_post_sort_by_cc_cnt.md
│   │   ├── ZeusVM_post_sort_by_time.md
│   │   ├── baksmali_post_sort_by_cc_cnt.md
│   │   ├── baksmali_post_sort_by_time.md
│   │   ├── de4dot_post_sort_by_cc_cnt.md
│   │   ├── de4dot_post_sort_by_time.md
│   │   ├── dnSpy_post_sort_by_cc_cnt.md
│   │   ├── dnSpy_post_sort_by_time.md
│   │   ├── iOS_post_sort_by_cc_cnt.md
│   │   ├── iOS_post_sort_by_time.md
│   │   ├── nProtect_post_sort_by_cc_cnt.md
│   │   ├── nProtect_post_sort_by_time.md
│   │   ├── ollvm_post_sort_by_cc_cnt.md
│   │   ├── ollvm_post_sort_by_time.md
│   │   ├── reconng_post_sort_by_cc_cnt.md
│   │   ├── reconng_post_sort_by_time.md
│   │   ├── suricata_post_sort_by_cc_cnt.md
│   │   ├── suricata_post_sort_by_time.md
│   │   ├── virtualbox_post_sort_by_cc_cnt.md
│   │   ├── virtualbox_post_sort_by_time.md
│   │   ├── 隐写术_post_sort_by_cc_cnt.md
│   │   ├── 隐写术_post_sort_by_time.md
│   │   ├── 黑产_post_sort_by_cc_cnt.md
│   │   └── 黑产_post_sort_by_time.md
│   └── cc_sum.md
└── tools/
    ├── tool_collection_list.md
    └── tool_list.md

================================================
FILE CONTENTS
================================================

================================================
FILE: .directory
================================================
[Dolphin]
Timestamp=2019,5,16,8,45,51
Version=4
ViewMode=1


================================================
FILE: README.md
================================================
# 网安图书馆

## 简要说明
- 从近2000个网络安全相关的资讯、博客站点中爬取的文章,并对文章内容进行索引等操作
  - 搜索:

## 子项目
- 后端: 
- 前端:

## 示例


================================================
FILE: posts/.directory
================================================
[Dolphin]
Timestamp=2019,5,16,8,46,40
Version=4
ViewMode=1


================================================
FILE: posts/cc/0Day_post_sort_by_cc_cnt.md
================================================
0Day

None

| 时间 | CC数目 | URL | 标题 |
| ---- | ----- | --- | --- |
| 59 | 2014.10.08 | _91ri | [“Xsser mRAT”首个X国高级IOS木马](http://www.91ri.org/11000.html) |
| 41 | 2017.05.02 | zeltser_blog | [Disambiguate “Zero-Day” Before Considering Countermeasures](https://zeltser.com/zero-day-terminology/) |
| 39 | 2014.09.30 | checkpoint | [Lacoon Discovers Xsser mRAT, the First Advanced iOS Trojan](https://blog.checkpoint.com/2014/09/30/lacoon-discovers-xsser-mrat-first-advanced-ios-trojan/) |
| 31 | 2019.01.09 | freebuf | [全球高级持续性威胁(APT)2018年总结报告](https://www.freebuf.com/articles/paper/193553.html) |
| 29 | 2018.12.06 | 360_anquanke_learning | [Flash 0day + Hacking Team远控:利用最新Flash 0day漏洞的攻击活动与关联分析](https://www.anquanke.com/post/id/167334/) |
| 29 | 2018.12.06 | freebuf | [Flash 0day+Hacking Team远控:利用最新Flash 0day漏洞的攻击活动与关联分析](https://www.freebuf.com/articles/system/191382.html) |
| 27 | 2016.06.09 | trustwave_SpiderLabs_Blog | [Zero Day Auction for the Masses](https://www.trustwave.com/Resources/SpiderLabs-Blog/Zero-Day-Auction-for-the-Masses/) |
| 24 | 2019.01.03 | 360_anquanke_learning | [全球高级持续性威胁2018年总结报告](https://www.anquanke.com/post/id/169081/) |
| 24 | 2012.10.28 | _91ri | [Android平台上的XSS攻击](http://www.91ri.org/4557.html) |
| 23 | 2015.07.11 | grandstreamdreams | [Taking Flash Player out to the Bins](http://grandstreamdreams.blogspot.com/2015/07/taking-flash-player-out-to-bins.html) |
| 22 | 2012.10.01 | krebsonsecurity | [In a Zero-Day World, It’s Active Attacks that Matter](https://krebsonsecurity.com/2012/10/in-a-zero-day-world-its-active-attacks-that-matter/) |
| 22 | 2015.05.07 | zonealarm | [What the Heck are Zero-Day Attacks? (And 3 Ways to Avoid Them)](https://www.zonealarm.com/blog/2015/05/how-to-avoid-zero-day-attacks/) |
| 20 | 2019.01.03 | venus_seebug | [全球高级持续性威胁(APT)2018年总结报告](https://paper.seebug.org/783/) |
| 19 | 2015.07.14 | nsfocus_blog | [Hacking Team Flash 0Day 分析分享](http://blog.nsfocus.net/hacking-team-flash-0day/) |
| 19 | 2011.12.03 | n0tr00t | [Android 应用安全之 Android 平台上的 XSS 攻击](https://n0tr00t.com/2011/12/03/heige-android-02.html) |
| 18 | 2015.07.16 | _91ri | [分析分享: Hacking Team Flash 0Day](http://www.91ri.org/13481.html) |
| 18 | 2018.08.25 | freebuf | [利用CVE-2018-8373 0day漏洞的攻击与Darkhotel团伙相关的分析](http://www.freebuf.com/articles/system/181482.html) |
| 18 | 2015.08.12 | freebuf | [揭秘:0day漏洞的供应商到底是谁?](http://www.freebuf.com/news/74757.html) |
| 18 | 2014.10.15 | freebuf | [国产“骄傲”:最先进的国产IOS木马Xsser现身分析](http://www.freebuf.com/news/topnews/46822.html) |
| 18 | 2018.08.17 | 360_anquanke_learning | [利用CVE-2018-8373 0day漏洞的攻击与Darkhotel团伙相关的分析](https://www.anquanke.com/post/id/156793/) |
| 16 | 2015.07.10 | nsfocus_blog | [Hacking Team数据泄露防护方案](http://blog.nsfocus.net/hacking-team-event-protection/) |
| 16 | 2011.05.03 | krebsonsecurity | [Advanced Persistent Tweets: Zero-Day in 140 Characters](https://krebsonsecurity.com/2011/05/advanced-persistent-tweets-zero-day-in-140-characters/) |
| 15 | 2018.01.09 | _360_blogs | [Analysis of CVE-2018-8174 VBScript 0day and APT actor related to Office targeted attack](http://blogs.360.cn/post/cve-2018-8174-en.html) |
| 15 | 2017.04.14 | freebuf | [近期正热的Word 0day漏洞已经被用于恶意软件散播和国家攻击](http://www.freebuf.com/news/131918.html) |
| 15 | 2006.06.20 | sans_edu_diaryarchive | [Comments on 0day](https://isc.sans.edu/forums/diary/Comments+on+0day/1432/) |
| 14 | 2017.04.21 | trendmicro | [TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 17, 2017](http://blog.trendmicro.com/tippingpoint-threat-intelligence-zero-day-coverage-week-april-17-2017/) |
| 14 | 2015.02.11 | welivesecurity | [Security terms explained: What does Zero Day mean?](https://www.welivesecurity.com/2015/02/11/security-terms-explained-zero-day-mean/) |
| 14 | 2018.06.08 | 360_anquanke_learning | [Hacking Team卷土重来?Flash 0day漏洞APT攻击分析与关联](https://www.anquanke.com/post/id/147372/) |
| 14 | 2006.08.05 | pediy_new_digest | [[原创]揭檫0day神秘的面?](https://bbs.pediy.com/thread-30133.htm) |
| 14 | 2018.06.13 | freebuf | [Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联](http://www.freebuf.com/vuls/174246.html) |
| 14 | 2018.05.09 | _360_blogs | [Analysis of CVE-2018-8174 VBScript 0day and APT actor related to Office targeted attack](http://blogs.360.cn/blog/cve-2018-8174-en/) |
| 14 | 2018.05.25 | 360_totalsecurity | [Analysis of CVE-2018-8174 VBScript 0day and APT actor related to Office targeted attack](https://blog.360totalsecurity.com/en/analysis-cve-2018-8174-vbscript-0day-apt-actor-related-office-targeted-attack/) |
| 13 | 2018.02.08 | tencent_s_report | [腾讯TRP-AI反病毒引擎白皮书](https://s.tencent.com/research/report/418.html) |
| 13 | 2018.02.08 | qq_slab | [腾讯TRP-AI反病毒引擎白皮书](https://slab.qq.com/news/authority/1744.html) |
| 13 | 2019.01.22 | _0patch | [One... Two... Three Micropatches For Three Windows 0days](https://blog.0patch.com/2019/01/one-two-three-micropatches-for-three.html) |
| 12 | 2011.07.22 | beistlab | [AntiVirus Program에서 발견되는 취약점은 왜 더 위험한가?](https://beistlab.wordpress.com/2011/07/22/why-antivirus-program-bugs-get-serious/) |
| 12 | 2014.05.22 | corelan | [On CVE-2014-1770 / ZDI-14-140 : Internet Explorer 8 "0day"](https://www.corelan.be/index.php/2014/05/22/on-cve-2014-1770-zdi-14-140-internet-explorer-8-0day/) |
| 12 | 2019.04.11 | kitploit_exploit | [Microsoft Internet Explorer 11 XML Injection](https://exploit.kitploit.com/2019/04/microsoft-internet-explorer-11-xml.html) |
| 12 | 2019.01.18 | 360_anquanke_learning | [高中生,一年,从 0 到 0day 的秘密](https://www.anquanke.com/post/id/169829/) |
| 11 | 2018.09.12 | knownsec | [ECShop 0day 的堕落之路](http://blog.knownsec.com/2018/09/ecshop-0day-%e7%9a%84%e5%a0%95%e8%90%bd%e4%b9%8b%e8%b7%af/) |
| 11 | 2018.09.05 | venus_seebug | [ECShop 0day 的堕落之路](https://paper.seebug.org/695/) |
| 11 | 2016.02.11 | cybersecpolitics | [0days](https://cybersecpolitics.blogspot.com/2016/02/0days.html) |
| 11 | 2017.03.15 | hboeck | [Zero Days and Cargo Cult Science](https://blog.hboeck.de/archives/882-Zero-Days-and-Cargo-Cult-Science.html) |
| 11 | 2017.07.02 | ttias_blog | [Giving perspective on systemd's "usernames that start with digit get root privileges"-bug](https://ma.ttias.be/giving-perspective-systemds-usernames-start-digit-get-root-privileges-bug/) |
| 11 | 2011.07.29 | beistlab | [Targeted attack의 개념 이해](https://beistlab.wordpress.com/2011/07/29/targeted-attack-overview/) |
| 11 | 2013.01.10 | dontneedcoffee | [0 day 1.7u10 (CVE-2013-0422) spotted in the Wild - Disable Java Plugin NOW !](https://malware.dontneedcoffee.com/2013/01/0-day-17u10-spotted-in-while-disable.html) |
| 11 | 2015.07.12 | summitroute | [Downclimb](https://summitroute.com/blog/2015/07/12/downclimb/) |
| 11 | 2013.04.02 | krebsonsecurity | [Fool Me Once…](https://krebsonsecurity.com/2013/04/fool-me-once/) |
| 10 | 2014.04.16 | freebuf | [奥巴马允许NSA利用网络0day漏洞](http://www.freebuf.com/news/32203.html) |
| 10 | 2018.02.11 | 4hou_vulnerable | [Adobe Flash零日漏洞(cve-2018-4878)在野攻击完全分析报告](http://www.4hou.com/vulnerable/10370.html) |
| 10 | 2018.02.17 | freebuf | [Adobe Flash零日漏洞(CVE-2018-4878)在野攻击完全分析报告](http://www.freebuf.com/vuls/162629.html) |
| 10 | 2012.10.23 | trendmicro_security | [Watering Holes and  Zero-Day Attacks](https://blog.trendmicro.com/trendlabs-security-intelligence/watering-holes-and-zero-day-attacks/) |
| 10 | 2013.01.04 | exodusintel | [Bypassing Microsoft’s Internet Explorer 0day “Fix It” Patch for CVE-2012-4792](https://blog.exodusintel.com/2013/01/04/bypassing-microsofts-internet-explorer-0day-fix-it-patch-for-cve-2012-4792/) |
| 10 | 2012.08.28 | dontneedcoffee | [Java 0day ( CVE-2012-4681) Update available for Blackhole Exploit Kit owner](https://malware.dontneedcoffee.com/2012/08/java-0day-cve-2012-4681-update.html) |
| 10 | 2019.01.16 | 360_anquanke_learning | [知道创宇404实验室2018年网络空间安全报告](https://www.anquanke.com/post/id/169676/) |
| 10 | 2017.01.13 | 360_anquanke_learning | [使用任天堂的6502处理器指令对桌面版Linux系统进行漏洞利用](https://www.anquanke.com/post/id/85322/) |
| 10 | 2018.02.11 | pediy_new_digest | [[原创]Adobe Flash零日漏洞(cve-2018-4878)在野攻击完全分析报告](https://bbs.pediy.com/thread-224626.htm) |
| 10 | 2013.08.09 | privacy_pc | [The Modern History of Cyber Warfare 4: 0day Black Market and State Sponsored Attacks](http://privacy-pc.com/articles/the-modern-history-of-cyber-warfare-4-0day-black-market-and-state-sponsored-attacks.html) |
| 10 | 2013.01.16 | krebsonsecurity | [New Java Exploit Fetches $5,000 Per Buyer](https://krebsonsecurity.com/2013/01/new-java-exploit-fetches-5000-per-buyer/) |
| 10 | 2019.01.22 | freebuf | [知道创宇2018年网络空间安全报告](https://www.freebuf.com/vuls/194201.html) |
| 9 | 2015.02.08 | grandstreamdreams | [Patch, Patch, Patch!](http://grandstreamdreams.blogspot.com/2015/02/patch-patch-patch.html) |
| 9 | 2018.08.28 | thecharlestendellshow | [Expert publicly disclosed exploit code for Windows Task Scheduler Zero-Day](http://thecharlestendellshow.com/expert-publicly-disclosed-exploit-code-for-windows-task-scheduler-zero-day/) |
| 9 | 2013.06.17 | _91ri | [浅谈服务器被黑后的检查工作流程](http://www.91ri.org/6344.html) |
| 9 | 2018.01.05 | _360_blogs | [Operation Poison Needles - APT Group Attacked the Polyclinic of the Presidential Administration of Russia, Exploiting a Zero-day](http://blogs.360.cn/post/PoisonNeedles_CVE-2018-15982_EN.html) |
| 9 | 2012.07.09 | krebsonsecurity | [How to Break Into Security, Grossman Edition](https://krebsonsecurity.com/2012/07/how-to-break-into-security-grossman-edition/) |
| 9 | 2018.01.23 | _360_blogs | [From A Patched ITW 0day to Remote Code Execution (Part I) – From Patch to New 0day](http://blogs.360.cn/post/from-a-patched-itw-0day-to-remote-code-execution-part-i-from-patch-to-new-0day.html) |
| 9 | 2016.07.02 | pediy_new_digest | [[原创]《漏洞战争:软件漏洞分析精要》已开售……](https://bbs.pediy.com/thread-211344.htm) |
| 9 | 2017.10.18 | venus_seebug | [BlackOasis APT 和利用 0day 漏洞的新目标攻击](https://paper.seebug.org/418/) |
| 9 | 2012.09.19 | _91ri | [[0day]最新IE远程代码执行漏洞Exploit](http://www.91ri.org/4075.html) |
| 9 | 2006.09.19 | sans_edu_diaryarchive | [0day this, 0day that, I've got the 0day blah's, as does Microsoft Office 2000 PPT](https://isc.sans.edu/forums/diary/0day+this+0day+that+Ive+got+the+0day+blahs+as+does+Microsoft+Office+2000+PPT/1717/) |
| 9 | 2018.10.03 | _0patch | [Words "Patching" and "Instantly" Now in the Same Phrase](https://blog.0patch.com/2018/10/words-patching-and-instantly-now-in.html) |
| 9 | 2015.08.10 | securelist | [Darkhotel’s attacks in 2015](https://securelist.com/darkhotels-attacks-in-2015/71713/) |
| 9 | 2018.12.06 | venus_seebug | [“毒针”行动 - 针对“俄罗斯总统办所属医疗机构”发起的 0day 攻击](https://paper.seebug.org/753/) |
| 9 | 2012.11.30 | rapid7 | [Let's do #FollowFriday the Metasploit Way](https://blog.rapid7.com/2012/11/30/lets-do-followfriday-the-metasploit-way/) |
| 9 | 2011.03.17 | scadahacker_blog | [Agora+ SCADA Exploit Pack for CANVAS](http://scadahacker.blogspot.com/2011/03/agora-scada-exploit-pack-for-canvas.html) |
| 8 | 2015.10.16 | trendmicro_security | [Latest Flash Exploit Used in Pawn Storm Circumvents Mitigation Techniques](https://blog.trendmicro.com/trendlabs-security-intelligence/latest-flash-exploit-used-in-pawn-storm-circumvents-mitigation-techniques/) |
| 8 | 2012.08.29 | krebsonsecurity | [Researchers: Java Zero-Day Leveraged Two Flaws](https://krebsonsecurity.com/2012/08/java-exploit-leveraged-two-flaws/) |
| 8 | 2017.09.21 | mrg_effitas_exploit_protection_testing | [Encrypted exploit delivery – #IRONSQUIRREL](https://www.mrg-effitas.com/research/encrypted-exploit-delivery-ironsquirrel/) |
| 8 | 2015.08.11 | kaspersky_blog | [Spreading the Disease: Darkhotel gets HackingTeam 0-day, but still stoppable](https://www.kaspersky.com/blog/darkhotel-hackingteam/15090/) |
| 8 | 2014.05.01 | securelist | [Microsoft Updates Internet Explorer against Highly Targeted 0day Distributing Pirpi](https://securelist.com/microsoft-updates-internet-explorer/59408/) |
| 8 | 2012.09.17 | alienvault_blog | [New Internet Explorer zero day being exploited in the wild](https://www.alienvault.com/blogs/labs-research/new-internet-explorer-zero-day-being-exploited-in-the-wild) |
| 8 | 2015.10.11 | freebuf | [杀毒软件Avast被曝0day漏洞,可被利用在用户电脑上执行恶意代码](http://www.freebuf.com/news/81102.html) |
| 8 | 2017.05.11 | scarybeastsecurity | [[0day] Proving Box.com fixed ASLR via ImageMagick uninitialized zlib stream buffer](https://scarybeastsecurity.blogspot.com/2017/05/0day-proving-boxcom-fixed-aslr-via.html) |
| 8 | 2014.02.20 | krebsonsecurity | [Adobe, Microsoft Push Fixes For 0-Day Threats](https://krebsonsecurity.com/2014/02/adobe-microsoft-push-fixes-for-0-day-threats/) |
| 8 | 2015.01.07 | _360_blogs | [Hacking Team攻击代码分析Part 1: Flash 0day](http://blogs.360.cn/post/hacking-team-flash-0day.html) |
| 8 | 2016.02.12 | cybersecpolitics | [The value of an 0day stockpile to the country versus the value of feeling self-rightous](https://cybersecpolitics.blogspot.com/2016/02/the-value-of-0day-stockpile-to-country.html) |
| 8 | 2019.02.14 | 360_anquanke_learning | [VBScript in 2018](https://www.anquanke.com/post/id/170727/) |
| 8 | 2010.11.10 | contagiodump | [None](http://contagiodump.blogspot.com/2010/11/cve-2010-3654.html) |
| 8 | 2013.01.15 | rapid7 | [December Exploit Trends: Internet Explorer CButton](https://blog.rapid7.com/2013/01/15/december-exploit-trends/) |
| 8 | 2013.11.12 | krebsonsecurity | [Zero-Days Rule November’s Patch Tuesday](https://krebsonsecurity.com/2013/11/zero-days-rule-novembers-patch-tuesday/) |
| 8 | 2016.01.05 | freebuf | [Apache被曝疑似mod_status模块的0day](http://www.freebuf.com/vuls/92232.html) |
| 8 | 2017.04.24 | nsfocus_blog | [【安全报告】2017网络安全威胁4月月报](http://blog.nsfocus.net/2017-network-security-threat-april-monthly/) |
| 8 | 2019.01.04 | freebuf | [2018年全球十大APT攻击事件盘点](https://www.freebuf.com/articles/system/193393.html) |
| 8 | 2019.01.02 | 360_anquanke_learning | [2018年全球十大APT攻击事件盘点](https://www.anquanke.com/post/id/169007/) |
| 8 | 2019.03.08 | tencent_s_bsafe | [CVE-2019-5786和Windows 0day漏洞组合在野利用预警](https://s.tencent.com/research/bsafe/673.html) |
| 8 | 2012.05.31 | knownsec | [遨游浏览器最新版爆0day漏洞,数千万用户面临威胁](http://blog.knownsec.com/2012/05/%e9%81%a8%e6%b8%b8%e6%b5%8f%e8%a7%88%e5%99%a8%e6%9c%80%e6%96%b0%e7%89%88%e7%88%860day%e6%bc%8f%e6%b4%9e%ef%bc%8c%e4%b8%80%e5%8d%83%e5%a4%9a%e4%b8%87%e7%94%a8%e6%88%b7%e9%9d%a2%e4%b8%b4%e5%a8%81/) |
| 7 | 2018.07.26 | 360_totalsecurity | [Analysis of the new exploitable issues with CVE-2018-8174 patch and VBScript zero-day vulnerability](https://blog.360totalsecurity.com/en/analysis-of-the-new-exploitable-issues-with-cve-2018-8174-patch-and-vbscript-zero-day-exploit/) |
| 7 | 2018.01.13 | pediy_new_digest | [[原创]盘点继Mirai后2017年出现的iot僵尸网络](https://bbs.pediy.com/thread-224042.htm) |
| 7 | 2017.03.12 | summitroute | [Downclimb](https://summitroute.com/blog/2017/03/12/downclimb/) |
| 7 | 2015.01.27 | kaspersky_blog | [Google vs Microsoft: Game of Flaws](https://www.kaspersky.com/blog/google-vs-microsoft-game-of-flaws/3531/) |
| 7 | 2013.05.21 | dontneedcoffee | [Unveiling the Locker Bomba (aka Lucky Locker v0.6 aka Lyposit/Adneukine )](https://malware.dontneedcoffee.com/2013/05/unveiling-locker-bomba-aka-lucky-locker.html) |
| 7 | 2018.12.20 | 360_anquanke_learning | [认识二进制安全与漏洞攻防技术  (Windows平台)](https://www.anquanke.com/post/id/168276/) |
| 7 | 2017.05.10 | 360_anquanke_learning | [5月10日 - 每日安全知识热点](https://www.anquanke.com/post/id/86055/) |
| 7 | 2015.07.07 | _360_blogs | [Hacking Team攻击代码分析Part 1: Flash 0day](http://blogs.360.cn/blog/hacking-team-flash-0day/) |
| 7 | 2017.04.14 | randhome | [ShadowBrokers Easter Gift](https://www.randhome.io/blog/2017/04/14/shadowbrokers-easter-gift/) |
| 7 | 2014.04.28 | krebsonsecurity | [Adobe Update Nixes Flash Player Zero Day](https://krebsonsecurity.com/2014/04/adobe-update-nixes-flash-player-zero-day/) |
| 7 | 2007.12.23 | pediy_new_digest | [[技术专题]软件漏洞分析入门_7_案例](https://bbs.pediy.com/thread-56963.htm) |
| 7 | 2018.01.07 | _360_blogs | [CVE-2018-5002 - Analysis of the Second Wave of Flash Zero-day Exploit in 2018](http://blogs.360.cn/post/cve-2018-5002-en.html) |
| 7 | 2015.07.07 | _360_360safe | [Hacking Team攻击代码分析Part 1: Flash 0day](http://blogs.360.cn/360safe/2015/07/07/hacking-team-flash-0day/) |
| 7 | 2018.03.27 | thief | [记一次爬虫批量爬取exp](https://thief.one/2018/03/27/1/) |
| 7 | 2017.03.03 | pediy_new_digest | [[翻译]为 CVE-2017-0038 Windows gdi32.dll 内存信息泄露漏洞写临时补丁](https://bbs.pediy.com/thread-216052.htm) |
| 7 | 2018.10.05 | hackerfactor | [Defensive Exploits](http://hackerfactor.com/blog/index.php?/archives/817-Defensive-Exploits.html) |
| 7 | 2015.04.14 | hackerone | [The Wolves of Vuln Street - The First System Dynamics Model of the 0day Market](https://www.hackerone.com/blog/the-wolves-of-vuln-street) |
| 7 | 2018.06.08 | 360_totalsecurity | [CVE-2018-5002 – Analysis of the Second Wave of Flash Zero-day Exploit in 2018](https://blog.360totalsecurity.com/en/cve-2018-5002-analysis-of-the-second-wave-of-flash-zero-day-exploit-in-2018/) |
| 7 | 2017.10.11 | _360_blogs | [New Office 0day (CVE-2017-11826) Exploited in the Wild](http://blogs.360.cn/blog/office_0day_cve-2017-11826_en/) |
| 7 | 2018.07.23 | _360_blogs | [From A Patched ITW 0day to Remote Code Execution (Part I) – From Patch to New 0day](http://blogs.360.cn/blog/from-a-patched-itw-0day-to-remote-code-execution-part-i-from-patch-to-new-0day/) |
| 7 | 2012.10.08 | rapid7 | [Exploit Trends: Java and IE 0days](https://blog.rapid7.com/2012/10/08/exploit-trends-java-and-ie-0days/) |
| 7 | 2017.10.11 | 360_totalsecurity | [New Office 0day attack CVE-2017-11826 recently disclosed by 360](https://blog.360totalsecurity.com/en/new-office-0day-cve-2017-11826/) |
| 7 | 2018.12.19 | googleprojectzero | [On VBScript](https://googleprojectzero.blogspot.com/2018/12/on-vbscript.html) |
| 7 | 2018.05.22 | cybersecpolitics | [Exploits as Fundamental Metrics for Cyber Power](https://cybersecpolitics.blogspot.com/2018/05/exploits-as-fundamental-metrics-for.html) |
| 7 | 2010.01.14 | contagiodump | [None](http://contagiodump.blogspot.com/2009/12/2009-12-22-analysis-of-cve-2009-4324.html) |
| 7 | 2008.10.28 | talosintelligence_blog | [Update on Snort and ClamAV for ms08-067](https://blog.talosintelligence.com/2008/10/update-on-snort-and-clamav-for-ms08-067.html) |
| 7 | 2010.09.17 | contagiodump | [None](http://contagiodump.blogspot.com/2010/09/cve-david-leadbetters-one-point-lesson.html) |
| 7 | 2018.06.09 | tencent_s_report | [The Root Cause Analysis of Flash 0day  CVE-2018-5002 Exploit](https://s.tencent.com/research/report/489.html) |
| 7 | 2016.04.11 | n0tr00t | [从老漏洞到新漏洞 - iMessage 0day(CVE-2016-1843) 挖掘实录](https://n0tr00t.com/2016/04/11/iMessage-0day-CVE-2016-1843.html) |
| 7 | 2018.06.07 | _360_blogs | [CVE-2018-5002 – Analysis of the Second Wave of Flash Zero-day Exploit in 2018](http://blogs.360.cn/blog/cve-2018-5002-en/) |
| 7 | 2010.02.08 | sans_edu_diaryarchive | [When is a 0day not a 0day? Fake OpenSSh exploit, again. ](https://isc.sans.edu/forums/diary/When+is+a+0day+not+a+0day+Fake+OpenSSh+exploit+again/8185/) |
| 7 | 2015.07.10 | malwarebytes_blog | [Another Hacking Team Flash Player 0day Uncovered (UPDATED)](https://blog.malwarebytes.com/threat-analysis/2015/07/new-hacking-team-flash-player-0day-uncovered/) |
| 7 | 2017.01.11 | _360_blogs | [New Office 0day (CVE-2017-11826) Exploited in the Wild](http://blogs.360.cn/post/office_0day_cve-2017-11826_en.html) |
| 7 | 2018.10.23 | specterops | [CVE-2018–8414: A Case Study in Responsible Disclosure](https://medium.com/p/ff74c39615ba) |
| 7 | 2018.01.21 | _360_blogs | [Poison Ivy Group  and the Cyberespionage Campaign  Against Chinese Military and Goverment](http://blogs.360.cn/post/APT_C_01_en.html) |
| 6 | 2015.07.14 | _360_blogs | [Hacking Team攻击代码分析Part5: Adobe Font Driver内核权限提升漏洞第二弹+Win32k KALSR绕过漏洞](http://blogs.360.cn/blog/hacking-team-part5-atmfd-0day-2/) |
| 6 | 2015.01.13 | _360_blogs | [Hacking Team攻击代码分析Part5: Adobe Font Driver内核权限提升漏洞第二弹+Win32k KALSR绕过漏洞](http://blogs.360.cn/post/hacking-team-part5-atmfd-0day-2.html) |
| 6 | 2015.07.19 | summitroute | [Downclimb](https://summitroute.com/blog/2015/07/19/downclimb/) |
| 6 | 2017.12.04 | pediy_new_digest | [[原创]IE浏览器漏洞综合利用技术:UAF利用技术的发展](https://bbs.pediy.com/thread-223107.htm) |
| 6 | 2013.06.04 | bsk_consulting | [Signatur für Windows 0-day EPATHOBJ Exploit](https://www.bsk-consulting.de/2013/06/04/signatur-fur-windows-0-day-epathobj-exploit/) |
| 6 | 2018.01.12 | _360_blogs | [被遗漏的0day ? —APT-C-06组织另一网络武器库分析揭秘](http://blogs.360.cn/post/VBScript_vul_CH.html) |
| 6 | 2012.08.27 | krebsonsecurity | [Attackers Pounce on Zero-Day Java Exploit](https://krebsonsecurity.com/2012/08/attackers-pounce-on-zero-day-java-exploit/) |
| 6 | 2013.10.08 | krebsonsecurity | [Adobe, Microsoft Push Critical Security Fixes](https://krebsonsecurity.com/2013/10/adobe-microsoft-push-critical-security-fixes-3/) |
| 6 | 2012.09.17 | krebsonsecurity | [Exploit Released for Zero-Day in Internet Explorer](https://krebsonsecurity.com/2012/09/exploit-released-for-zero-day-in-internet-explorer/) |
| 6 | 2014.01.12 | _0day5 | [phpMyWind又一注入(无视知道创宇补丁)](http://0day5.com/archives/1146/) |
| 6 | 2015.01.22 | _360_blogs | [从Nday漏洞被利用谈补丁与安全软件的重要性](http://blogs.360.cn/post/talk_about_importance_of_patches_and_security_software_from_nday_exploits.html) |
| 6 | 2018.01.07 | _360_blogs | [CVE-2018-5002---2018年第二波Flash零日漏洞在野攻击分析预警](http://blogs.360.cn/post/cve-2018-5002.html) |
| 6 | 2008.10.21 | pediy_new_digest | [[技术专题]软件安全测试(fuzz)之大家一起学1: fuzz platform架构](https://bbs.pediy.com/thread-75032.htm) |
| 6 | 2016.03.11 | cybersecpolitics | [The CFR 0day Meeting](https://cybersecpolitics.blogspot.com/2016/03/the-cfr-0day-meeting.html) |
| 6 | 2018.10.23 | enigma0x3 | [CVE-2018–8414: A Case Study in Responsible Disclosure](https://enigma0x3.net/2018/10/23/cve-2018-8414-a-case-study-in-responsible-disclosure/) |
| 6 | 2015.01.11 | _360_blogs | [Hacking Team攻击代码分析Part 4: Flash 0day漏洞第二弹 - CVE-2015-5122](http://blogs.360.cn/post/hacking-team-part4-flash-2.html) |
| 6 | 2012.02.29 | techworld | [Google offers $1 million bounty for Chrome exploits](https://www.techworld.com/news/security/google-offers-1-million-bounty-for-chrome-exploits-3340975/) |
| 6 | 2017.03.28 | 360_anquanke_learning | [IE浏览器漏洞综合利用技术:UAF利用技术的发展](https://www.anquanke.com/post/id/85797/) |
| 6 | 2015.07.11 | _360_360safe | [Hacking Team攻击代码分析Part 4: Flash 0day漏洞第二弹 – CVE-2015-5122](http://blogs.360.cn/360safe/2015/07/11/hacking-team-part4-flash-2/) |
| 6 | 2015.07.11 | _360_blogs | [Hacking Team攻击代码分析Part 4: Flash 0day漏洞第二弹 – CVE-2015-5122](http://blogs.360.cn/blog/hacking-team-part4-flash-2/) |
| 6 | 2019.03.12 | venus_seebug | [48 小时逃逸 Virtualbox 虚拟机——记一次 CTF 中的 0day 之旅](https://paper.seebug.org/847/) |
| 6 | 2013.05.14 | freebuf | [路透社报告称美国政府是“0day”漏洞最大的买家](http://www.freebuf.com/news/9518.html) |
| 6 | 2015.07.07 | freebuf | [Hacking Team攻击代码分析Part 1:Flash 0day](http://www.freebuf.com/articles/system/71833.html) |
| 6 | 2016.10.12 | venus_seebug | [从老漏洞到新漏洞 --- iMessage 0day(CVE-2016-1843) 挖掘实录](https://paper.seebug.org/65/) |
| 6 | 2018.09.24 | _0patch | [Outrunning Attackers On The Jet Database Engine 0day](https://blog.0patch.com/2018/09/outrunning-attackers-on-jet-database.html) |
| 6 | 2016.11.17 | deepsec | [Disclosures, Jenkins, Conferences, and the Joys of 0Days](http://blog.deepsec.net/disclosures-jenkins-conferences-joys-0days/) |
| 6 | 2016.10.24 | _91ri | [从老漏洞到新漏洞 – iMessage 0day(CVE-2016-1843) 挖掘实录](http://www.91ri.org/16474.html) |
| 6 | 2016.12.01 | objective_see | [[0day] Bypassing Apple's System Integrity Protection](https://objective-see.com/blog/blog_0x14.html) |
| 6 | 2016.05.06 | cybersecpolitics | [Talking about 0days and Attacks from weird Datasets](https://cybersecpolitics.blogspot.com/2016/05/talking-about-0days-and-attacks-from.html) |
| 6 | 2013.01.10 | trustwave_SpiderLabs_Blog | [First Java 0day For The Year 2013](https://www.trustwave.com/Resources/SpiderLabs-Blog/First-Java-0day-For-The-Year-2013/) |
| 6 | 2015.07.13 | freebuf | [Hacking Team数据中惊现第二枚Flash 0day漏洞](http://www.freebuf.com/news/72268.html) |
| 6 | 2014.02.17 | pediy_new_digest | [[原创]CVE-2014-0322 0day Exploit分析](https://bbs.pediy.com/thread-184608.htm) |
| 6 | 2013.01.16 | trustwave_SpiderLabs_Blog | [Q&A w/ SpiderLabs Research: Java 0day CVE-2013-0422](https://www.trustwave.com/Resources/SpiderLabs-Blog/QA-w/-SpiderLabs-Research--Java-0day-CVE-2013-0422/) |
| 6 | 2012.09.19 | freebuf | [[0day]最新IE远程代码执行漏洞Exploit](http://www.freebuf.com/articles/web/5699.html) |
| 6 | 2017.08.01 | cybersecpolitics | [Do you need 0days? What about oxygen?](https://cybersecpolitics.blogspot.com/2017/08/do-you-need-0days-what-about-oxygen.html) |
| 6 | 2015.02.03 | malwarebytes_blog | [HanJuan EK fires third Flash Player 0day](https://blog.malwarebytes.com/threat-analysis/2015/02/hanjuan-ek-fires-third-flash-player-0day/) |
| 6 | 2016.10.12 | 360_anquanke_learning | [从老漏洞到新漏洞:iMessage 0day(CVE-2016-1843)挖掘实录](https://www.anquanke.com/post/id/84717/) |
| 6 | 2019.04.17 | _0patch | [Microsoft Edge Uses a Secret Trick And Breaks Internet Explorer's Security](https://blog.0patch.com/2019/04/microsoft-edge-uses-secret-trick-and.html) |
| 6 | 2006.06.20 | sans_edu_diaryarchive | [New Excel 0day (Are we evolving or going in circles?)](https://isc.sans.edu/forums/diary/New+Excel+0day+Are+we+evolving+or+going+in+circles/1431/) |
| 6 | 2012.09.17 | freebuf | [[0day]IE execCommand fuction Use after free Vulnerability 0day](http://www.freebuf.com/vuls/5675.html) |
| 6 | 2017.02.07 | asintsov | [How I have tested EndPointProtection solution...](http://asintsov.blogspot.com/2017/02/how-i-have-tested-endpointprotection.html) |
| 6 | 2012.08.30 | fox_it | [Observations on the recent Java 0-day exploits in the wild](https://blog.fox-it.com/2012/08/30/observations-on-the-recent-java-0-day-exploits-in-the-wild/) |
| 6 | 2016.10.12 | knownsec | [从老漏洞到新漏洞—iMessage 0day(CVE-2016-1843)挖掘实录](http://blog.knownsec.com/2016/10/imessage-0day_cve-2016-1843/) |
| 6 | 2015.07.14 | _360_360safe | [Hacking Team攻击代码分析Part5: Adobe Font Driver内核权限提升漏洞第二弹+Win32k KALSR绕过漏洞](http://blogs.360.cn/360safe/2015/07/14/hacking-team-part5-atmfd-0day-2/) |
| 6 | 2009.07.09 | sans_edu_diaryarchive | [OpenSSH 0day FUD](https://isc.sans.edu/forums/diary/OpenSSH+0day+FUD/6760/) |
| 6 | 2017.09.27 | nsfocus_blog | [【安全报告】网络安全威胁月报 201709](http://blog.nsfocus.net/network-security-threats-monthly-2010/) |
| 6 | 2017.04.25 | htbridge | [How exploits have become the hot ticket in town](https://www.htbridge.com/blog/how-exploits-have-become-the-hot-ticket-in-town.html) |
| 6 | 2012.09.17 | rapid7 | [New Metasploit 0-day exploit for IE 7, 8 & 9 on Windows XP, Vista, and 7](https://blog.rapid7.com/2012/09/17/lets-start-the-week-with-a-new-internet-explorer-0-day-in-metasploit/) |
| 6 | 2014.10.15 | antiy_response | [沙虫(CVE-2014-4114)相关威胁综合分析报告——及对追影安全平台检测问题的复盘](http://www.antiy.com/response/cve-2014-4114.html) |
| 6 | 2018.01.12 | _360_blogs | [A Missed 0day ? - Reveal another Cyber Arsenal of APT-C-06](http://blogs.360.cn/post/VBScript_vul_EN.html) |
| 6 | 2018.06.07 | _360_blogs | [CVE-2018-5002—2018年第二波Flash零日漏洞在野攻击分析预警](http://blogs.360.cn/blog/cve-2018-5002/) |
| 6 | 2018.06.07 | 4hou_vulnerable | [CVE-2018-5002 - 2018年第二波Flash零日漏洞在野攻击分析预警](http://www.4hou.com/vulnerable/11994.html) |
| 5 | 2017.03.16 | freebuf | [【企业研究报告】新一代防火墙的撕X大戏:Palo Alto Networks安全公司全解读](http://www.freebuf.com/special/128852.html) |
| 5 | 2017.04.11 | kaspersky_blog | [Pegasus: The ultimate spyware for iOS and Android](https://www.kaspersky.com/blog/pegasus-spyware/14604/) |
| 5 | 2015.07.31 | kaspersky_blog | [What are exploits and why they are so scary?](https://www.kaspersky.com/blog/exploits-problem-explanation/9448/) |
| 5 | 2018.12.20 | venus_seebug | [Thinkphp5 远程代码执行漏洞事件分析报告](https://paper.seebug.org/770/) |
| 5 | 2016.02.14 | summitroute | [Downclimb](https://summitroute.com/blog/2016/02/14/downclimb/) |
| 5 | 2012.12.06 | trendmicro_security | [Multiple Zero-Day POC Exploits Threaten Oracle MySQL Server](https://blog.trendmicro.com/trendlabs-security-intelligence/multiple-zero-day-poc-exploits-threaten-oracle-mysql-server/) |
| 5 | 2016.08.17 | korpritzombie | [Bug Bounty Program Primer – Finding Vulnerabilities for Fun and Profit](http://www.korpritzombie.com/bug-bounty-program-primer-finding-vulnerabilities-for-fun-and-profit/) |
| 5 | 2018.11.13 | venus_seebug | [被遗漏的0day ? —APT-C-06组织另一网络武器库分析揭秘](https://paper.seebug.org/743/) |
| 5 | 2014.04.29 | _91ri | [[投稿]某众多高校邮件系统的0day挖掘思路及XSS新防御方案](http://www.91ri.org/8698.html) |
| 5 | 2018.11.13 | 360_anquanke_learning | [被遗漏的0day ? —APT-C-06组织另一网络武器库分析揭秘](https://www.anquanke.com/post/id/164092/) |
| 5 | 2018.02.06 | 360_anquanke_learning | [卡巴斯基2018年网络威胁形势预测](https://www.anquanke.com/post/id/97693/) |
| 5 | 2018.03.12 | freebuf | [远丰集团旗下CMS疑有官方后门](http://www.freebuf.com/articles/web/164609.html) |
| 5 | 2015.01.22 | krebsonsecurity | [Flash Patch Targets Zero-Day Exploit](https://krebsonsecurity.com/2015/01/flash-patch-targets-zero-day-exploit/) |
| 5 | 2018.02.13 | freebuf | [CVE-2018-4878 Flash 0day漏洞攻击样本解析](http://www.freebuf.com/vuls/162493.html) |
| 5 | 2018.02.08 | 360_anquanke_learning | [CVE-2018-4878 Flash 0day漏洞攻击样本解析](https://www.anquanke.com/post/id/97870/) |
| 5 | 2015.07.08 | dontneedcoffee | [CVE-2015-5119 (HackingTeam 0d - Flash up to 18.0.0.194) and Exploit Kits](https://malware.dontneedcoffee.com/2015/07/hackingteam-flash-0d-cve-2015-xxxx-and.html) |
| 5 | 2013.05.14 | krebsonsecurity | [Microsoft, Adobe Push Critical Security Updates](https://krebsonsecurity.com/2013/05/microsoft-adobe-push-critical-security-updates-2/) |
| 5 | 2016.04.14 | us_cert_alerts | [Alert (TA16-105A)](https://www.us-cert.gov/ncas/alerts/TA16-105A) |
| 5 | 2015.07.31 | freebuf | [一次意外的0day之旅](http://www.freebuf.com/articles/terminal/73775.html) |
| 5 | 2015.04.29 | checkpoint | [Threat Alert: WordPress Cross-Site Scripting - Check Point Software Blog](https://blog.checkpoint.com/2015/04/29/threat-alert-wordpress-cross-site-scripting/) |
| 5 | 2017.11.04 | xpnsec_blog | [Defcon 25 in Review](https://blog.xpnsec.com/defcon-25/) |
| 5 | 2017.01.31 | pentest_blog | [Unexpected Journey into the AlienVault OSSIM/USM During Engagement](https://pentest.blog/unexpected-journey-into-the-alienvault-ossimusm-during-engagement/) |
| 5 | 2018.01.16 | 360_anquanke_learning | [Whats APT:浅谈APT攻击](https://www.anquanke.com/post/id/94968/) |
| 5 | 2015.01.21 | malwarebytes_blog | [New Adobe Flash Zero-Day found in the Wild](https://blog.malwarebytes.com/threat-analysis/2015/01/new-adobe-flash-zero-day-found-in-the-wild/) |
| 5 | 2016.11.30 | malwarebytes_blog | [Tor Browser zero-day strikes again](https://blog.malwarebytes.com/threat-analysis/2016/11/tor-browser-zero-day-strikes-again/) |
| 5 | 2017.06.08 | pediy_new_digest | [[翻译]在无线网络摄像头(P2P)WIFICAM摄像头的自定义http服务器中发现多个漏洞](https://bbs.pediy.com/thread-218288.htm) |
| 5 | 2013.01.02 | exodusintel | [Happy New Year Analysis of CVE-2012-4792](https://blog.exodusintel.com/2013/01/02/happy-new-year-analysis-of-cve-2012-4792/) |
| 5 | 2015.02.11 | dontneedcoffee | [CVE-2015-0313 (Flash up to 16.0.0.296) and Exploit Kits](https://malware.dontneedcoffee.com/2015/02/cve-2015-0313-flash-up-to-1600296-and.html) |
| 5 | 2005.08.19 | sans_edu_diaryarchive | [Infocon gone yellow; Patch available for Internet Explorer (.Net) 0day Exploit; Open letter; OS-X Patches; 1433 scans after Zotob; Zotob MSRT updated](https://isc.sans.edu/forums/diary/Infocon+gone+yellow+Patch+available+for+Internet+Explorer+Net+0day+Exploit+Open+letter+OSX+Patches+1433+scans+after+Zotob+Zotob+MSRT+updated/631/) |
| 5 | 2019.05.02 | kitploit_exploit | [Windows PowerShell ISE / Filename Parsing Flaw Remote Code Execution](https://exploit.kitploit.com/2019/05/windows-powershell-ise-filename-parsing.html) |
| 5 | 2018.12.25 | knownsec | [Thinkphp5 远程代码执行漏洞事件分析报告](http://blog.knownsec.com/2018/12/thinkphp5-%e8%bf%9c%e7%a8%8b%e4%bb%a3%e7%a0%81%e6%89%a7%e8%a1%8c%e6%bc%8f%e6%b4%9e%e4%ba%8b%e4%bb%b6%e5%88%86%e6%9e%90%e6%8a%a5%e5%91%8a/) |
| 5 | 2015.10.22 | _360_360safe | [从Nday漏洞被利用谈补丁与安全软件的重要性](http://blogs.360.cn/360safe/2015/10/22/talk_about_importance_of_patches_and_security_software_from_nday_exploits/) |
| 5 | 2010.10.28 | contagiodump | [None](http://contagiodump.blogspot.com/2010/10/potential-new-adobe-flash-player-zero.html) |
| 5 | 2017.01.17 | imperva_blog | [Defend Against PHPMailer Vulnerability with 0day Protection](https://www.imperva.com/blog/2017/01/defend-phpmailer-vulnerability-0day-protection/) |
| 5 | 2012.09.17 | sans_edu_diaryarchive | [IE Zero Day is "For Real"](https://isc.sans.edu/forums/diary/IE+Zero+Day+is+For+Real/14107/) |
| 5 | 2017.10.23 | exodusintel | [Introduction to Embedded Exploitation](https://blog.exodusintel.com/2017/10/23/introduction-to-embedded-exploitation/) |
| 5 | 2018.09.05 | exodusintel | [Introduction to Embedded Exploitation](https://blog.exodusintel.com/2018/09/05/introduction-to-embedded-exploitation-training/) |
| 5 | 2012.07.07 | _0day5 | [php5.4.3版本 远程代码执行漏洞](http://0day5.com/archives/179/) |
| 5 | 2015.01.27 | krebsonsecurity | [Yet Another Emergency Flash Player Patch](https://krebsonsecurity.com/2015/01/yet-another-emergency-flash-player-patch/) |
| 5 | 2014.05.01 | krebsonsecurity | [Microsoft Issues Fix for IE Zero-Day, Includes XP Users](https://krebsonsecurity.com/2014/05/microsoft-issues-fix-for-ie-zero-day-includes-xp-users/) |
| 5 | 2016.06.28 | cr4 | [Exploring and exploiting Lenovo firmware secrets](http://blog.cr4.sh/2016/06/exploring-and-exploiting-lenovo.html) |
| 5 | 2017.02.01 | zimperium | [Zimperium Announces Its Exploit Acquisition Program for N-Days](https://blog.zimperium.com/zimperium-announces-its-exploit-acquisition-program-for-n-days/) |
| 5 | 2014.06.18 | zimperium | [LinkedIn 0day Vulnerability Puts Your Data at Risk](https://blog.zimperium.com/linkedin-0day-vulnerability-puts-your-data-at-risk/) |
| 5 | 2012.08.28 | immunityproducts | [Java 0day analysis (CVE-2012-4681)](https://immunityproducts.blogspot.com/2012/08/java-0day-analysis-cve-2012-4681.html) |
| 5 | 2012.12.11 | rapid7 | [November Exploit Trends: Apache Killer Exploit New to List](https://blog.rapid7.com/2012/12/11/exploit-trends-new-exploits-make-the-top-10/) |
| 5 | 2017.10.08 | pentest_blog | [One ring to rule them all – Same RCE on multiple Trend Micro products](https://pentest.blog/one-ring-to-rule-them-all-same-rce-on-multiple-trend-micro-products/) |
| 5 | 2016.02.24 | cr4 | [Exploiting SMM callout vulnerabilities in Lenovo firmware](http://blog.cr4.sh/2016/02/exploiting-smm-callout-vulnerabilities.html) |
| 5 | 2016.11.30 | endgame_blog | [Another 0 Day, Another Prevention: Protection from a Use-After-Free Vulnerability](https://www.endgame.com/blog/technical-blog/another-0day-another-prevention) |
| 5 | 2012.05.24 | krebsonsecurity | [WHMCS Breach May Be Only Tip of the Trouble](https://krebsonsecurity.com/2012/05/whmcs-breach-may-be-only-tip-of-the-trouble/) |
| 5 | 2012.12.30 | rapid7 | [Microsoft Internet Explorer 0-Day Marks the End of 2012](https://blog.rapid7.com/2012/12/29/microsoft-internet-explorer-0-day-marks-the-end-of-2012/) |
| 5 | 2013.09.05 | scadahacker_blog | [InteVyDis releases Ver 10 of the VulnDisco Exploit Pack for Immunity Canvas with ICS Modules](http://scadahacker.blogspot.com/2013/09/intevydis-releases-ver-10-of-vulndisco.html) |
| 5 | 2013.05.08 | krebsonsecurity | [A Stopgap Fix for the IE8 Zero-Day Flaw](https://krebsonsecurity.com/2013/05/a-stopgap-fix-for-the-ie8-zero-day-flaw/) |
| 5 | 2017.09.13 | malwarebytes_blog | [PSA: New Microsoft Word 0day used in the wild](https://blog.malwarebytes.com/threat-analysis/2017/09/psa-new-microsoft-word-0day-used-wild/) |
| 5 | 2015.07.15 | freebuf | [Java曝高危0day漏洞,已被俄罗斯黑客组织利用](http://www.freebuf.com/news/72484.html) |
| 5 | 2017.01.17 | blackmoreops_kali_linux | [Find Linux Exploits by Kernel version](https://www.blackmoreops.com/2017/01/17/find-linux-exploits-by-kernel-version/) |
| 5 | 2012.05.15 | _0day5 | [PHP 5.4 (5.4.3) Code Execution (Win32)](http://0day5.com/archives/114/) |
| 5 | 2018.12.27 | 360_anquanke_learning | [CVE-2018-15982漏洞详细分析](https://www.anquanke.com/post/id/168654/) |
| 5 | 2012.06.07 | knownsec | [知道创宇:企业网站现漏洞,更新补丁保安全](http://blog.knownsec.com/2012/06/%e7%9f%a5%e9%81%93%e5%88%9b%e5%ae%87%ef%bc%9a%e6%98%93%e9%80%9a%e4%bc%81%e4%b8%9a%e7%bd%91%e7%ab%99%e7%b3%bb%e7%bb%9f%e5%ad%98%e5%9c%a80day%e6%bc%8f%e6%b4%9e%ef%bc%8c%e8%af%b7%e5%8f%8a%e6%97%b6/) |
| 5 | 2013.01.11 | freebuf | [[更新]新年伊始,Java惊爆首个0day](http://www.freebuf.com/news/6788.html) |
| 5 | 2012.05.21 | freebuf | [PHP 5.4 Win32 Code Execution](http://www.freebuf.com/articles/1806.html) |


================================================
FILE: posts/cc/0Day_post_sort_by_time.md
================================================
0Day

None

| 时间 | CC数目 | URL | 标题 |
| ---- | ----- | --- | --- |
| 5 | 2019.05.02 | kitploit_exploit | [Windows PowerShell ISE / Filename Parsing Flaw Remote Code Execution](https://exploit.kitploit.com/2019/05/windows-powershell-ise-filename-parsing.html) |
| 6 | 2019.04.17 | _0patch | [Microsoft Edge Uses a Secret Trick And Breaks Internet Explorer's Security](https://blog.0patch.com/2019/04/microsoft-edge-uses-secret-trick-and.html) |
| 12 | 2019.04.11 | kitploit_exploit | [Microsoft Internet Explorer 11 XML Injection](https://exploit.kitploit.com/2019/04/microsoft-internet-explorer-11-xml.html) |
| 6 | 2019.03.12 | venus_seebug | [48 小时逃逸 Virtualbox 虚拟机——记一次 CTF 中的 0day 之旅](https://paper.seebug.org/847/) |
| 8 | 2019.03.08 | tencent_s_bsafe | [CVE-2019-5786和Windows 0day漏洞组合在野利用预警](https://s.tencent.com/research/bsafe/673.html) |
| 8 | 2019.02.14 | 360_anquanke_learning | [VBScript in 2018](https://www.anquanke.com/post/id/170727/) |
| 10 | 2019.01.22 | freebuf | [知道创宇2018年网络空间安全报告](https://www.freebuf.com/vuls/194201.html) |
| 13 | 2019.01.22 | _0patch | [One... Two... Three Micropatches For Three Windows 0days](https://blog.0patch.com/2019/01/one-two-three-micropatches-for-three.html) |
| 12 | 2019.01.18 | 360_anquanke_learning | [高中生,一年,从 0 到 0day 的秘密](https://www.anquanke.com/post/id/169829/) |
| 10 | 2019.01.16 | 360_anquanke_learning | [知道创宇404实验室2018年网络空间安全报告](https://www.anquanke.com/post/id/169676/) |
| 31 | 2019.01.09 | freebuf | [全球高级持续性威胁(APT)2018年总结报告](https://www.freebuf.com/articles/paper/193553.html) |
| 8 | 2019.01.04 | freebuf | [2018年全球十大APT攻击事件盘点](https://www.freebuf.com/articles/system/193393.html) |
| 20 | 2019.01.03 | venus_seebug | [全球高级持续性威胁(APT)2018年总结报告](https://paper.seebug.org/783/) |
| 24 | 2019.01.03 | 360_anquanke_learning | [全球高级持续性威胁2018年总结报告](https://www.anquanke.com/post/id/169081/) |
| 8 | 2019.01.02 | 360_anquanke_learning | [2018年全球十大APT攻击事件盘点](https://www.anquanke.com/post/id/169007/) |
| 5 | 2018.12.27 | 360_anquanke_learning | [CVE-2018-15982漏洞详细分析](https://www.anquanke.com/post/id/168654/) |
| 5 | 2018.12.25 | knownsec | [Thinkphp5 远程代码执行漏洞事件分析报告](http://blog.knownsec.com/2018/12/thinkphp5-%e8%bf%9c%e7%a8%8b%e4%bb%a3%e7%a0%81%e6%89%a7%e8%a1%8c%e6%bc%8f%e6%b4%9e%e4%ba%8b%e4%bb%b6%e5%88%86%e6%9e%90%e6%8a%a5%e5%91%8a/) |
| 7 | 2018.12.20 | 360_anquanke_learning | [认识二进制安全与漏洞攻防技术  (Windows平台)](https://www.anquanke.com/post/id/168276/) |
| 5 | 2018.12.20 | venus_seebug | [Thinkphp5 远程代码执行漏洞事件分析报告](https://paper.seebug.org/770/) |
| 7 | 2018.12.19 | googleprojectzero | [On VBScript](https://googleprojectzero.blogspot.com/2018/12/on-vbscript.html) |
| 29 | 2018.12.06 | 360_anquanke_learning | [Flash 0day + Hacking Team远控:利用最新Flash 0day漏洞的攻击活动与关联分析](https://www.anquanke.com/post/id/167334/) |
| 9 | 2018.12.06 | venus_seebug | [“毒针”行动 - 针对“俄罗斯总统办所属医疗机构”发起的 0day 攻击](https://paper.seebug.org/753/) |
| 29 | 2018.12.06 | freebuf | [Flash 0day+Hacking Team远控:利用最新Flash 0day漏洞的攻击活动与关联分析](https://www.freebuf.com/articles/system/191382.html) |
| 5 | 2018.11.13 | 360_anquanke_learning | [被遗漏的0day ? —APT-C-06组织另一网络武器库分析揭秘](https://www.anquanke.com/post/id/164092/) |
| 5 | 2018.11.13 | venus_seebug | [被遗漏的0day ? —APT-C-06组织另一网络武器库分析揭秘](https://paper.seebug.org/743/) |
| 7 | 2018.10.23 | specterops | [CVE-2018–8414: A Case Study in Responsible Disclosure](https://medium.com/p/ff74c39615ba) |
| 6 | 2018.10.23 | enigma0x3 | [CVE-2018–8414: A Case Study in Responsible Disclosure](https://enigma0x3.net/2018/10/23/cve-2018-8414-a-case-study-in-responsible-disclosure/) |
| 7 | 2018.10.05 | hackerfactor | [Defensive Exploits](http://hackerfactor.com/blog/index.php?/archives/817-Defensive-Exploits.html) |
| 9 | 2018.10.03 | _0patch | [Words "Patching" and "Instantly" Now in the Same Phrase](https://blog.0patch.com/2018/10/words-patching-and-instantly-now-in.html) |
| 6 | 2018.09.24 | _0patch | [Outrunning Attackers On The Jet Database Engine 0day](https://blog.0patch.com/2018/09/outrunning-attackers-on-jet-database.html) |
| 11 | 2018.09.12 | knownsec | [ECShop 0day 的堕落之路](http://blog.knownsec.com/2018/09/ecshop-0day-%e7%9a%84%e5%a0%95%e8%90%bd%e4%b9%8b%e8%b7%af/) |
| 11 | 2018.09.05 | venus_seebug | [ECShop 0day 的堕落之路](https://paper.seebug.org/695/) |
| 5 | 2018.09.05 | exodusintel | [Introduction to Embedded Exploitation](https://blog.exodusintel.com/2018/09/05/introduction-to-embedded-exploitation-training/) |
| 9 | 2018.08.28 | thecharlestendellshow | [Expert publicly disclosed exploit code for Windows Task Scheduler Zero-Day](http://thecharlestendellshow.com/expert-publicly-disclosed-exploit-code-for-windows-task-scheduler-zero-day/) |
| 18 | 2018.08.25 | freebuf | [利用CVE-2018-8373 0day漏洞的攻击与Darkhotel团伙相关的分析](http://www.freebuf.com/articles/system/181482.html) |
| 18 | 2018.08.17 | 360_anquanke_learning | [利用CVE-2018-8373 0day漏洞的攻击与Darkhotel团伙相关的分析](https://www.anquanke.com/post/id/156793/) |
| 7 | 2018.07.26 | 360_totalsecurity | [Analysis of the new exploitable issues with CVE-2018-8174 patch and VBScript zero-day vulnerability](https://blog.360totalsecurity.com/en/analysis-of-the-new-exploitable-issues-with-cve-2018-8174-patch-and-vbscript-zero-day-exploit/) |
| 7 | 2018.07.23 | _360_blogs | [From A Patched ITW 0day to Remote Code Execution (Part I) – From Patch to New 0day](http://blogs.360.cn/blog/from-a-patched-itw-0day-to-remote-code-execution-part-i-from-patch-to-new-0day/) |
| 14 | 2018.06.13 | freebuf | [Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联](http://www.freebuf.com/vuls/174246.html) |
| 7 | 2018.06.09 | tencent_s_report | [The Root Cause Analysis of Flash 0day  CVE-2018-5002 Exploit](https://s.tencent.com/research/report/489.html) |
| 14 | 2018.06.08 | 360_anquanke_learning | [Hacking Team卷土重来?Flash 0day漏洞APT攻击分析与关联](https://www.anquanke.com/post/id/147372/) |
| 7 | 2018.06.08 | 360_totalsecurity | [CVE-2018-5002 – Analysis of the Second Wave of Flash Zero-day Exploit in 2018](https://blog.360totalsecurity.com/en/cve-2018-5002-analysis-of-the-second-wave-of-flash-zero-day-exploit-in-2018/) |
| 7 | 2018.06.07 | _360_blogs | [CVE-2018-5002 – Analysis of the Second Wave of Flash Zero-day Exploit in 2018](http://blogs.360.cn/blog/cve-2018-5002-en/) |
| 6 | 2018.06.07 | _360_blogs | [CVE-2018-5002—2018年第二波Flash零日漏洞在野攻击分析预警](http://blogs.360.cn/blog/cve-2018-5002/) |
| 6 | 2018.06.07 | 4hou_vulnerable | [CVE-2018-5002 - 2018年第二波Flash零日漏洞在野攻击分析预警](http://www.4hou.com/vulnerable/11994.html) |
| 14 | 2018.05.25 | 360_totalsecurity | [Analysis of CVE-2018-8174 VBScript 0day and APT actor related to Office targeted attack](https://blog.360totalsecurity.com/en/analysis-cve-2018-8174-vbscript-0day-apt-actor-related-office-targeted-attack/) |
| 7 | 2018.05.22 | cybersecpolitics | [Exploits as Fundamental Metrics for Cyber Power](https://cybersecpolitics.blogspot.com/2018/05/exploits-as-fundamental-metrics-for.html) |
| 14 | 2018.05.09 | _360_blogs | [Analysis of CVE-2018-8174 VBScript 0day and APT actor related to Office targeted attack](http://blogs.360.cn/blog/cve-2018-8174-en/) |
| 7 | 2018.03.27 | thief | [记一次爬虫批量爬取exp](https://thief.one/2018/03/27/1/) |
| 5 | 2018.03.12 | freebuf | [远丰集团旗下CMS疑有官方后门](http://www.freebuf.com/articles/web/164609.html) |
| 10 | 2018.02.17 | freebuf | [Adobe Flash零日漏洞(CVE-2018-4878)在野攻击完全分析报告](http://www.freebuf.com/vuls/162629.html) |
| 5 | 2018.02.13 | freebuf | [CVE-2018-4878 Flash 0day漏洞攻击样本解析](http://www.freebuf.com/vuls/162493.html) |
| 10 | 2018.02.11 | 4hou_vulnerable | [Adobe Flash零日漏洞(cve-2018-4878)在野攻击完全分析报告](http://www.4hou.com/vulnerable/10370.html) |
| 10 | 2018.02.11 | pediy_new_digest | [[原创]Adobe Flash零日漏洞(cve-2018-4878)在野攻击完全分析报告](https://bbs.pediy.com/thread-224626.htm) |
| 13 | 2018.02.08 | tencent_s_report | [腾讯TRP-AI反病毒引擎白皮书](https://s.tencent.com/research/report/418.html) |
| 13 | 2018.02.08 | qq_slab | [腾讯TRP-AI反病毒引擎白皮书](https://slab.qq.com/news/authority/1744.html) |
| 5 | 2018.02.08 | 360_anquanke_learning | [CVE-2018-4878 Flash 0day漏洞攻击样本解析](https://www.anquanke.com/post/id/97870/) |
| 5 | 2018.02.06 | 360_anquanke_learning | [卡巴斯基2018年网络威胁形势预测](https://www.anquanke.com/post/id/97693/) |
| 9 | 2018.01.23 | _360_blogs | [From A Patched ITW 0day to Remote Code Execution (Part I) – From Patch to New 0day](http://blogs.360.cn/post/from-a-patched-itw-0day-to-remote-code-execution-part-i-from-patch-to-new-0day.html) |
| 7 | 2018.01.21 | _360_blogs | [Poison Ivy Group  and the Cyberespionage Campaign  Against Chinese Military and Goverment](http://blogs.360.cn/post/APT_C_01_en.html) |
| 5 | 2018.01.16 | 360_anquanke_learning | [Whats APT:浅谈APT攻击](https://www.anquanke.com/post/id/94968/) |
| 7 | 2018.01.13 | pediy_new_digest | [[原创]盘点继Mirai后2017年出现的iot僵尸网络](https://bbs.pediy.com/thread-224042.htm) |
| 6 | 2018.01.12 | _360_blogs | [A Missed 0day ? - Reveal another Cyber Arsenal of APT-C-06](http://blogs.360.cn/post/VBScript_vul_EN.html) |
| 6 | 2018.01.12 | _360_blogs | [被遗漏的0day ? —APT-C-06组织另一网络武器库分析揭秘](http://blogs.360.cn/post/VBScript_vul_CH.html) |
| 15 | 2018.01.09 | _360_blogs | [Analysis of CVE-2018-8174 VBScript 0day and APT actor related to Office targeted attack](http://blogs.360.cn/post/cve-2018-8174-en.html) |
| 7 | 2018.01.07 | _360_blogs | [CVE-2018-5002 - Analysis of the Second Wave of Flash Zero-day Exploit in 2018](http://blogs.360.cn/post/cve-2018-5002-en.html) |
| 6 | 2018.01.07 | _360_blogs | [CVE-2018-5002---2018年第二波Flash零日漏洞在野攻击分析预警](http://blogs.360.cn/post/cve-2018-5002.html) |
| 9 | 2018.01.05 | _360_blogs | [Operation Poison Needles - APT Group Attacked the Polyclinic of the Presidential Administration of Russia, Exploiting a Zero-day](http://blogs.360.cn/post/PoisonNeedles_CVE-2018-15982_EN.html) |
| 6 | 2017.12.04 | pediy_new_digest | [[原创]IE浏览器漏洞综合利用技术:UAF利用技术的发展](https://bbs.pediy.com/thread-223107.htm) |
| 5 | 2017.11.04 | xpnsec_blog | [Defcon 25 in Review](https://blog.xpnsec.com/defcon-25/) |
| 5 | 2017.10.23 | exodusintel | [Introduction to Embedded Exploitation](https://blog.exodusintel.com/2017/10/23/introduction-to-embedded-exploitation/) |
| 9 | 2017.10.18 | venus_seebug | [BlackOasis APT 和利用 0day 漏洞的新目标攻击](https://paper.seebug.org/418/) |
| 7 | 2017.10.11 | _360_blogs | [New Office 0day (CVE-2017-11826) Exploited in the Wild](http://blogs.360.cn/blog/office_0day_cve-2017-11826_en/) |
| 7 | 2017.10.11 | 360_totalsecurity | [New Office 0day attack CVE-2017-11826 recently disclosed by 360](https://blog.360totalsecurity.com/en/new-office-0day-cve-2017-11826/) |
| 5 | 2017.10.08 | pentest_blog | [One ring to rule them all – Same RCE on multiple Trend Micro products](https://pentest.blog/one-ring-to-rule-them-all-same-rce-on-multiple-trend-micro-products/) |
| 6 | 2017.09.27 | nsfocus_blog | [【安全报告】网络安全威胁月报 201709](http://blog.nsfocus.net/network-security-threats-monthly-2010/) |
| 8 | 2017.09.21 | mrg_effitas_exploit_protection_testing | [Encrypted exploit delivery – #IRONSQUIRREL](https://www.mrg-effitas.com/research/encrypted-exploit-delivery-ironsquirrel/) |
| 5 | 2017.09.13 | malwarebytes_blog | [PSA: New Microsoft Word 0day used in the wild](https://blog.malwarebytes.com/threat-analysis/2017/09/psa-new-microsoft-word-0day-used-wild/) |
| 6 | 2017.08.01 | cybersecpolitics | [Do you need 0days? What about oxygen?](https://cybersecpolitics.blogspot.com/2017/08/do-you-need-0days-what-about-oxygen.html) |
| 11 | 2017.07.02 | ttias_blog | [Giving perspective on systemd's "usernames that start with digit get root privileges"-bug](https://ma.ttias.be/giving-perspective-systemds-usernames-start-digit-get-root-privileges-bug/) |
| 5 | 2017.06.08 | pediy_new_digest | [[翻译]在无线网络摄像头(P2P)WIFICAM摄像头的自定义http服务器中发现多个漏洞](https://bbs.pediy.com/thread-218288.htm) |
| 8 | 2017.05.11 | scarybeastsecurity | [[0day] Proving Box.com fixed ASLR via ImageMagick uninitialized zlib stream buffer](https://scarybeastsecurity.blogspot.com/2017/05/0day-proving-boxcom-fixed-aslr-via.html) |
| 7 | 2017.05.10 | 360_anquanke_learning | [5月10日 - 每日安全知识热点](https://www.anquanke.com/post/id/86055/) |
| 41 | 2017.05.02 | zeltser_blog | [Disambiguate “Zero-Day” Before Considering Countermeasures](https://zeltser.com/zero-day-terminology/) |
| 6 | 2017.04.25 | htbridge | [How exploits have become the hot ticket in town](https://www.htbridge.com/blog/how-exploits-have-become-the-hot-ticket-in-town.html) |
| 8 | 2017.04.24 | nsfocus_blog | [【安全报告】2017网络安全威胁4月月报](http://blog.nsfocus.net/2017-network-security-threat-april-monthly/) |
| 14 | 2017.04.21 | trendmicro | [TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 17, 2017](http://blog.trendmicro.com/tippingpoint-threat-intelligence-zero-day-coverage-week-april-17-2017/) |
| 7 | 2017.04.14 | randhome | [ShadowBrokers Easter Gift](https://www.randhome.io/blog/2017/04/14/shadowbrokers-easter-gift/) |
| 15 | 2017.04.14 | freebuf | [近期正热的Word 0day漏洞已经被用于恶意软件散播和国家攻击](http://www.freebuf.com/news/131918.html) |
| 5 | 2017.04.11 | kaspersky_blog | [Pegasus: The ultimate spyware for iOS and Android](https://www.kaspersky.com/blog/pegasus-spyware/14604/) |
| 6 | 2017.03.28 | 360_anquanke_learning | [IE浏览器漏洞综合利用技术:UAF利用技术的发展](https://www.anquanke.com/post/id/85797/) |
| 5 | 2017.03.16 | freebuf | [【企业研究报告】新一代防火墙的撕X大戏:Palo Alto Networks安全公司全解读](http://www.freebuf.com/special/128852.html) |
| 11 | 2017.03.15 | hboeck | [Zero Days and Cargo Cult Science](https://blog.hboeck.de/archives/882-Zero-Days-and-Cargo-Cult-Science.html) |
| 7 | 2017.03.12 | summitroute | [Downclimb](https://summitroute.com/blog/2017/03/12/downclimb/) |
| 7 | 2017.03.03 | pediy_new_digest | [[翻译]为 CVE-2017-0038 Windows gdi32.dll 内存信息泄露漏洞写临时补丁](https://bbs.pediy.com/thread-216052.htm) |
| 6 | 2017.02.07 | asintsov | [How I have tested EndPointProtection solution...](http://asintsov.blogspot.com/2017/02/how-i-have-tested-endpointprotection.html) |
| 5 | 2017.02.01 | zimperium | [Zimperium Announces Its Exploit Acquisition Program for N-Days](https://blog.zimperium.com/zimperium-announces-its-exploit-acquisition-program-for-n-days/) |
| 5 | 2017.01.31 | pentest_blog | [Unexpected Journey into the AlienVault OSSIM/USM During Engagement](https://pentest.blog/unexpected-journey-into-the-alienvault-ossimusm-during-engagement/) |
| 5 | 2017.01.17 | blackmoreops_kali_linux | [Find Linux Exploits by Kernel version](https://www.blackmoreops.com/2017/01/17/find-linux-exploits-by-kernel-version/) |
| 5 | 2017.01.17 | imperva_blog | [Defend Against PHPMailer Vulnerability with 0day Protection](https://www.imperva.com/blog/2017/01/defend-phpmailer-vulnerability-0day-protection/) |
| 10 | 2017.01.13 | 360_anquanke_learning | [使用任天堂的6502处理器指令对桌面版Linux系统进行漏洞利用](https://www.anquanke.com/post/id/85322/) |
| 7 | 2017.01.11 | _360_blogs | [New Office 0day (CVE-2017-11826) Exploited in the Wild](http://blogs.360.cn/post/office_0day_cve-2017-11826_en.html) |
| 6 | 2016.12.01 | objective_see | [[0day] Bypassing Apple's System Integrity Protection](https://objective-see.com/blog/blog_0x14.html) |
| 5 | 2016.11.30 | endgame_blog | [Another 0 Day, Another Prevention: Protection from a Use-After-Free Vulnerability](https://www.endgame.com/blog/technical-blog/another-0day-another-prevention) |
| 5 | 2016.11.30 | malwarebytes_blog | [Tor Browser zero-day strikes again](https://blog.malwarebytes.com/threat-analysis/2016/11/tor-browser-zero-day-strikes-again/) |
| 6 | 2016.11.17 | deepsec | [Disclosures, Jenkins, Conferences, and the Joys of 0Days](http://blog.deepsec.net/disclosures-jenkins-conferences-joys-0days/) |
| 6 | 2016.10.24 | _91ri | [从老漏洞到新漏洞 – iMessage 0day(CVE-2016-1843) 挖掘实录](http://www.91ri.org/16474.html) |
| 6 | 2016.10.12 | 360_anquanke_learning | [从老漏洞到新漏洞:iMessage 0day(CVE-2016-1843)挖掘实录](https://www.anquanke.com/post/id/84717/) |
| 6 | 2016.10.12 | venus_seebug | [从老漏洞到新漏洞 --- iMessage 0day(CVE-2016-1843) 挖掘实录](https://paper.seebug.org/65/) |
| 6 | 2016.10.12 | knownsec | [从老漏洞到新漏洞—iMessage 0day(CVE-2016-1843)挖掘实录](http://blog.knownsec.com/2016/10/imessage-0day_cve-2016-1843/) |
| 5 | 2016.08.17 | korpritzombie | [Bug Bounty Program Primer – Finding Vulnerabilities for Fun and Profit](http://www.korpritzombie.com/bug-bounty-program-primer-finding-vulnerabilities-for-fun-and-profit/) |
| 9 | 2016.07.02 | pediy_new_digest | [[原创]《漏洞战争:软件漏洞分析精要》已开售……](https://bbs.pediy.com/thread-211344.htm) |
| 5 | 2016.06.28 | cr4 | [Exploring and exploiting Lenovo firmware secrets](http://blog.cr4.sh/2016/06/exploring-and-exploiting-lenovo.html) |
| 27 | 2016.06.09 | trustwave_SpiderLabs_Blog | [Zero Day Auction for the Masses](https://www.trustwave.com/Resources/SpiderLabs-Blog/Zero-Day-Auction-for-the-Masses/) |
| 6 | 2016.05.06 | cybersecpolitics | [Talking about 0days and Attacks from weird Datasets](https://cybersecpolitics.blogspot.com/2016/05/talking-about-0days-and-attacks-from.html) |
| 5 | 2016.04.14 | us_cert_alerts | [Alert (TA16-105A)](https://www.us-cert.gov/ncas/alerts/TA16-105A) |
| 7 | 2016.04.11 | n0tr00t | [从老漏洞到新漏洞 - iMessage 0day(CVE-2016-1843) 挖掘实录](https://n0tr00t.com/2016/04/11/iMessage-0day-CVE-2016-1843.html) |
| 6 | 2016.03.11 | cybersecpolitics | [The CFR 0day Meeting](https://cybersecpolitics.blogspot.com/2016/03/the-cfr-0day-meeting.html) |
| 5 | 2016.02.24 | cr4 | [Exploiting SMM callout vulnerabilities in Lenovo firmware](http://blog.cr4.sh/2016/02/exploiting-smm-callout-vulnerabilities.html) |
| 5 | 2016.02.14 | summitroute | [Downclimb](https://summitroute.com/blog/2016/02/14/downclimb/) |
| 8 | 2016.02.12 | cybersecpolitics | [The value of an 0day stockpile to the country versus the value of feeling self-rightous](https://cybersecpolitics.blogspot.com/2016/02/the-value-of-0day-stockpile-to-country.html) |
| 11 | 2016.02.11 | cybersecpolitics | [0days](https://cybersecpolitics.blogspot.com/2016/02/0days.html) |
| 8 | 2016.01.05 | freebuf | [Apache被曝疑似mod_status模块的0day](http://www.freebuf.com/vuls/92232.html) |
| 5 | 2015.10.22 | _360_360safe | [从Nday漏洞被利用谈补丁与安全软件的重要性](http://blogs.360.cn/360safe/2015/10/22/talk_about_importance_of_patches_and_security_software_from_nday_exploits/) |
| 8 | 2015.10.16 | trendmicro_security | [Latest Flash Exploit Used in Pawn Storm Circumvents Mitigation Techniques](https://blog.trendmicro.com/trendlabs-security-intelligence/latest-flash-exploit-used-in-pawn-storm-circumvents-mitigation-techniques/) |
| 8 | 2015.10.11 | freebuf | [杀毒软件Avast被曝0day漏洞,可被利用在用户电脑上执行恶意代码](http://www.freebuf.com/news/81102.html) |
| 18 | 2015.08.12 | freebuf | [揭秘:0day漏洞的供应商到底是谁?](http://www.freebuf.com/news/74757.html) |
| 8 | 2015.08.11 | kaspersky_blog | [Spreading the Disease: Darkhotel gets HackingTeam 0-day, but still stoppable](https://www.kaspersky.com/blog/darkhotel-hackingteam/15090/) |
| 9 | 2015.08.10 | securelist | [Darkhotel’s attacks in 2015](https://securelist.com/darkhotels-attacks-in-2015/71713/) |
| 5 | 2015.07.31 | kaspersky_blog | [What are exploits and why they are so scary?](https://www.kaspersky.com/blog/exploits-problem-explanation/9448/) |
| 5 | 2015.07.31 | freebuf | [一次意外的0day之旅](http://www.freebuf.com/articles/terminal/73775.html) |
| 6 | 2015.07.19 | summitroute | [Downclimb](https://summitroute.com/blog/2015/07/19/downclimb/) |
| 18 | 2015.07.16 | _91ri | [分析分享: Hacking Team Flash 0Day](http://www.91ri.org/13481.html) |
| 5 | 2015.07.15 | freebuf | [Java曝高危0day漏洞,已被俄罗斯黑客组织利用](http://www.freebuf.com/news/72484.html) |
| 6 | 2015.07.14 | _360_blogs | [Hacking Team攻击代码分析Part5: Adobe Font Driver内核权限提升漏洞第二弹+Win32k KALSR绕过漏洞](http://blogs.360.cn/blog/hacking-team-part5-atmfd-0day-2/) |
| 19 | 2015.07.14 | nsfocus_blog | [Hacking Team Flash 0Day 分析分享](http://blog.nsfocus.net/hacking-team-flash-0day/) |
| 6 | 2015.07.14 | _360_360safe | [Hacking Team攻击代码分析Part5: Adobe Font Driver内核权限提升漏洞第二弹+Win32k KALSR绕过漏洞](http://blogs.360.cn/360safe/2015/07/14/hacking-team-part5-atmfd-0day-2/) |
| 6 | 2015.07.13 | freebuf | [Hacking Team数据中惊现第二枚Flash 0day漏洞](http://www.freebuf.com/news/72268.html) |
| 11 | 2015.07.12 | summitroute | [Downclimb](https://summitroute.com/blog/2015/07/12/downclimb/) |
| 23 | 2015.07.11 | grandstreamdreams | [Taking Flash Player out to the Bins](http://grandstreamdreams.blogspot.com/2015/07/taking-flash-player-out-to-bins.html) |
| 6 | 2015.07.11 | _360_blogs | [Hacking Team攻击代码分析Part 4: Flash 0day漏洞第二弹 – CVE-2015-5122](http://blogs.360.cn/blog/hacking-team-part4-flash-2/) |
| 6 | 2015.07.11 | _360_360safe | [Hacking Team攻击代码分析Part 4: Flash 0day漏洞第二弹 – CVE-2015-5122](http://blogs.360.cn/360safe/2015/07/11/hacking-team-part4-flash-2/) |
| 7 | 2015.07.10 | malwarebytes_blog | [Another Hacking Team Flash Player 0day Uncovered (UPDATED)](https://blog.malwarebytes.com/threat-analysis/2015/07/new-hacking-team-flash-player-0day-uncovered/) |
| 16 | 2015.07.10 | nsfocus_blog | [Hacking Team数据泄露防护方案](http://blog.nsfocus.net/hacking-team-event-protection/) |
| 5 | 2015.07.08 | dontneedcoffee | [CVE-2015-5119 (HackingTeam 0d - Flash up to 18.0.0.194) and Exploit Kits](https://malware.dontneedcoffee.com/2015/07/hackingteam-flash-0d-cve-2015-xxxx-and.html) |
| 7 | 2015.07.07 | _360_blogs | [Hacking Team攻击代码分析Part 1: Flash 0day](http://blogs.360.cn/blog/hacking-team-flash-0day/) |
| 7 | 2015.07.07 | _360_360safe | [Hacking Team攻击代码分析Part 1: Flash 0day](http://blogs.360.cn/360safe/2015/07/07/hacking-team-flash-0day/) |
| 6 | 2015.07.07 | freebuf | [Hacking Team攻击代码分析Part 1:Flash 0day](http://www.freebuf.com/articles/system/71833.html) |
| 22 | 2015.05.07 | zonealarm | [What the Heck are Zero-Day Attacks? (And 3 Ways to Avoid Them)](https://www.zonealarm.com/blog/2015/05/how-to-avoid-zero-day-attacks/) |
| 5 | 2015.04.29 | checkpoint | [Threat Alert: WordPress Cross-Site Scripting - Check Point Software Blog](https://blog.checkpoint.com/2015/04/29/threat-alert-wordpress-cross-site-scripting/) |
| 7 | 2015.04.14 | hackerone | [The Wolves of Vuln Street - The First System Dynamics Model of the 0day Market](https://www.hackerone.com/blog/the-wolves-of-vuln-street) |
| 14 | 2015.02.11 | welivesecurity | [Security terms explained: What does Zero Day mean?](https://www.welivesecurity.com/2015/02/11/security-terms-explained-zero-day-mean/) |
| 5 | 2015.02.11 | dontneedcoffee | [CVE-2015-0313 (Flash up to 16.0.0.296) and Exploit Kits](https://malware.dontneedcoffee.com/2015/02/cve-2015-0313-flash-up-to-1600296-and.html) |
| 9 | 2015.02.08 | grandstreamdreams | [Patch, Patch, Patch!](http://grandstreamdreams.blogspot.com/2015/02/patch-patch-patch.html) |
| 6 | 2015.02.03 | malwarebytes_blog | [HanJuan EK fires third Flash Player 0day](https://blog.malwarebytes.com/threat-analysis/2015/02/hanjuan-ek-fires-third-flash-player-0day/) |
| 7 | 2015.01.27 | kaspersky_blog | [Google vs Microsoft: Game of Flaws](https://www.kaspersky.com/blog/google-vs-microsoft-game-of-flaws/3531/) |
| 5 | 2015.01.27 | krebsonsecurity | [Yet Another Emergency Flash Player Patch](https://krebsonsecurity.com/2015/01/yet-another-emergency-flash-player-patch/) |
| 5 | 2015.01.22 | krebsonsecurity | [Flash Patch Targets Zero-Day Exploit](https://krebsonsecurity.com/2015/01/flash-patch-targets-zero-day-exploit/) |
| 6 | 2015.01.22 | _360_blogs | [从Nday漏洞被利用谈补丁与安全软件的重要性](http://blogs.360.cn/post/talk_about_importance_of_patches_and_security_software_from_nday_exploits.html) |
| 5 | 2015.01.21 | malwarebytes_blog | [New Adobe Flash Zero-Day found in the Wild](https://blog.malwarebytes.com/threat-analysis/2015/01/new-adobe-flash-zero-day-found-in-the-wild/) |
| 6 | 2015.01.13 | _360_blogs | [Hacking Team攻击代码分析Part5: Adobe Font Driver内核权限提升漏洞第二弹+Win32k KALSR绕过漏洞](http://blogs.360.cn/post/hacking-team-part5-atmfd-0day-2.html) |
| 6 | 2015.01.11 | _360_blogs | [Hacking Team攻击代码分析Part 4: Flash 0day漏洞第二弹 - CVE-2015-5122](http://blogs.360.cn/post/hacking-team-part4-flash-2.html) |
| 8 | 2015.01.07 | _360_blogs | [Hacking Team攻击代码分析Part 1: Flash 0day](http://blogs.360.cn/post/hacking-team-flash-0day.html) |
| 6 | 2014.10.15 | antiy_response | [沙虫(CVE-2014-4114)相关威胁综合分析报告——及对追影安全平台检测问题的复盘](http://www.antiy.com/response/cve-2014-4114.html) |
| 18 | 2014.10.15 | freebuf | [国产“骄傲”:最先进的国产IOS木马Xsser现身分析](http://www.freebuf.com/news/topnews/46822.html) |
| 59 | 2014.10.08 | _91ri | [“Xsser mRAT”首个X国高级IOS木马](http://www.91ri.org/11000.html) |
| 39 | 2014.09.30 | checkpoint | [Lacoon Discovers Xsser mRAT, the First Advanced iOS Trojan](https://blog.checkpoint.com/2014/09/30/lacoon-discovers-xsser-mrat-first-advanced-ios-trojan/) |
| 5 | 2014.06.18 | zimperium | [LinkedIn 0day Vulnerability Puts Your Data at Risk](https://blog.zimperium.com/linkedin-0day-vulnerability-puts-your-data-at-risk/) |
| 12 | 2014.05.22 | corelan | [On CVE-2014-1770 / ZDI-14-140 : Internet Explorer 8 "0day"](https://www.corelan.be/index.php/2014/05/22/on-cve-2014-1770-zdi-14-140-internet-explorer-8-0day/) |
| 5 | 2014.05.01 | krebsonsecurity | [Microsoft Issues Fix for IE Zero-Day, Includes XP Users](https://krebsonsecurity.com/2014/05/microsoft-issues-fix-for-ie-zero-day-includes-xp-users/) |
| 8 | 2014.05.01 | securelist | [Microsoft Updates Internet Explorer against Highly Targeted 0day Distributing Pirpi](https://securelist.com/microsoft-updates-internet-explorer/59408/) |
| 5 | 2014.04.29 | _91ri | [[投稿]某众多高校邮件系统的0day挖掘思路及XSS新防御方案](http://www.91ri.org/8698.html) |
| 7 | 2014.04.28 | krebsonsecurity | [Adobe Update Nixes Flash Player Zero Day](https://krebsonsecurity.com/2014/04/adobe-update-nixes-flash-player-zero-day/) |
| 10 | 2014.04.16 | freebuf | [奥巴马允许NSA利用网络0day漏洞](http://www.freebuf.com/news/32203.html) |
| 8 | 2014.02.20 | krebsonsecurity | [Adobe, Microsoft Push Fixes For 0-Day Threats](https://krebsonsecurity.com/2014/02/adobe-microsoft-push-fixes-for-0-day-threats/) |
| 6 | 2014.02.17 | pediy_new_digest | [[原创]CVE-2014-0322 0day Exploit分析](https://bbs.pediy.com/thread-184608.htm) |
| 6 | 2014.01.12 | _0day5 | [phpMyWind又一注入(无视知道创宇补丁)](http://0day5.com/archives/1146/) |
| 8 | 2013.11.12 | krebsonsecurity | [Zero-Days Rule November’s Patch Tuesday](https://krebsonsecurity.com/2013/11/zero-days-rule-novembers-patch-tuesday/) |
| 6 | 2013.10.08 | krebsonsecurity | [Adobe, Microsoft Push Critical Security Fixes](https://krebsonsecurity.com/2013/10/adobe-microsoft-push-critical-security-fixes-3/) |
| 5 | 2013.09.05 | scadahacker_blog | [InteVyDis releases Ver 10 of the VulnDisco Exploit Pack for Immunity Canvas with ICS Modules](http://scadahacker.blogspot.com/2013/09/intevydis-releases-ver-10-of-vulndisco.html) |
| 10 | 2013.08.09 | privacy_pc | [The Modern History of Cyber Warfare 4: 0day Black Market and State Sponsored Attacks](http://privacy-pc.com/articles/the-modern-history-of-cyber-warfare-4-0day-black-market-and-state-sponsored-attacks.html) |
| 9 | 2013.06.17 | _91ri | [浅谈服务器被黑后的检查工作流程](http://www.91ri.org/6344.html) |
| 6 | 2013.06.04 | bsk_consulting | [Signatur für Windows 0-day EPATHOBJ Exploit](https://www.bsk-consulting.de/2013/06/04/signatur-fur-windows-0-day-epathobj-exploit/) |
| 7 | 2013.05.21 | dontneedcoffee | [Unveiling the Locker Bomba (aka Lucky Locker v0.6 aka Lyposit/Adneukine )](https://malware.dontneedcoffee.com/2013/05/unveiling-locker-bomba-aka-lucky-locker.html) |
| 5 | 2013.05.14 | krebsonsecurity | [Microsoft, Adobe Push Critical Security Updates](https://krebsonsecurity.com/2013/05/microsoft-adobe-push-critical-security-updates-2/) |
| 6 | 2013.05.14 | freebuf | [路透社报告称美国政府是“0day”漏洞最大的买家](http://www.freebuf.com/news/9518.html) |
| 5 | 2013.05.08 | krebsonsecurity | [A Stopgap Fix for the IE8 Zero-Day Flaw](https://krebsonsecurity.com/2013/05/a-stopgap-fix-for-the-ie8-zero-day-flaw/) |
| 11 | 2013.04.02 | krebsonsecurity | [Fool Me Once…](https://krebsonsecurity.com/2013/04/fool-me-once/) |
| 6 | 2013.01.16 | trustwave_SpiderLabs_Blog | [Q&A w/ SpiderLabs Research: Java 0day CVE-2013-0422](https://www.trustwave.com/Resources/SpiderLabs-Blog/QA-w/-SpiderLabs-Research--Java-0day-CVE-2013-0422/) |
| 10 | 2013.01.16 | krebsonsecurity | [New Java Exploit Fetches $5,000 Per Buyer](https://krebsonsecurity.com/2013/01/new-java-exploit-fetches-5000-per-buyer/) |
| 8 | 2013.01.15 | rapid7 | [December Exploit Trends: Internet Explorer CButton](https://blog.rapid7.com/2013/01/15/december-exploit-trends/) |
| 5 | 2013.01.11 | freebuf | [[更新]新年伊始,Java惊爆首个0day](http://www.freebuf.com/news/6788.html) |
| 6 | 2013.01.10 | trustwave_SpiderLabs_Blog | [First Java 0day For The Year 2013](https://www.trustwave.com/Resources/SpiderLabs-Blog/First-Java-0day-For-The-Year-2013/) |
| 11 | 2013.01.10 | dontneedcoffee | [0 day 1.7u10 (CVE-2013-0422) spotted in the Wild - Disable Java Plugin NOW !](https://malware.dontneedcoffee.com/2013/01/0-day-17u10-spotted-in-while-disable.html) |
| 10 | 2013.01.04 | exodusintel | [Bypassing Microsoft’s Internet Explorer 0day “Fix It” Patch for CVE-2012-4792](https://blog.exodusintel.com/2013/01/04/bypassing-microsofts-internet-explorer-0day-fix-it-patch-for-cve-2012-4792/) |
| 5 | 2013.01.02 | exodusintel | [Happy New Year Analysis of CVE-2012-4792](https://blog.exodusintel.com/2013/01/02/happy-new-year-analysis-of-cve-2012-4792/) |
| 5 | 2012.12.30 | rapid7 | [Microsoft Internet Explorer 0-Day Marks the End of 2012](https://blog.rapid7.com/2012/12/29/microsoft-internet-explorer-0-day-marks-the-end-of-2012/) |
| 5 | 2012.12.11 | rapid7 | [November Exploit Trends: Apache Killer Exploit New to List](https://blog.rapid7.com/2012/12/11/exploit-trends-new-exploits-make-the-top-10/) |
| 5 | 2012.12.06 | trendmicro_security | [Multiple Zero-Day POC Exploits Threaten Oracle MySQL Server](https://blog.trendmicro.com/trendlabs-security-intelligence/multiple-zero-day-poc-exploits-threaten-oracle-mysql-server/) |
| 9 | 2012.11.30 | rapid7 | [Let's do #FollowFriday the Metasploit Way](https://blog.rapid7.com/2012/11/30/lets-do-followfriday-the-metasploit-way/) |
| 24 | 2012.10.28 | _91ri | [Android平台上的XSS攻击](http://www.91ri.org/4557.html) |
| 10 | 2012.10.23 | trendmicro_security | [Watering Holes and  Zero-Day Attacks](https://blog.trendmicro.com/trendlabs-security-intelligence/watering-holes-and-zero-day-attacks/) |
| 7 | 2012.10.08 | rapid7 | [Exploit Trends: Java and IE 0days](https://blog.rapid7.com/2012/10/08/exploit-trends-java-and-ie-0days/) |
| 22 | 2012.10.01 | krebsonsecurity | [In a Zero-Day World, It’s Active Attacks that Matter](https://krebsonsecurity.com/2012/10/in-a-zero-day-world-its-active-attacks-that-matter/) |
| 9 | 2012.09.19 | _91ri | [[0day]最新IE远程代码执行漏洞Exploit](http://www.91ri.org/4075.html) |
| 6 | 2012.09.19 | freebuf | [[0day]最新IE远程代码执行漏洞Exploit](http://www.freebuf.com/articles/web/5699.html) |
| 8 | 2012.09.17 | alienvault_blog | [New Internet Explorer zero day being exploited in the wild](https://www.alienvault.com/blogs/labs-research/new-internet-explorer-zero-day-being-exploited-in-the-wild) |
| 6 | 2012.09.17 | rapid7 | [New Metasploit 0-day exploit for IE 7, 8 & 9 on Windows XP, Vista, and 7](https://blog.rapid7.com/2012/09/17/lets-start-the-week-with-a-new-internet-explorer-0-day-in-metasploit/) |
| 6 | 2012.09.17 | krebsonsecurity | [Exploit Released for Zero-Day in Internet Explorer](https://krebsonsecurity.com/2012/09/exploit-released-for-zero-day-in-internet-explorer/) |
| 6 | 2012.09.17 | freebuf | [[0day]IE execCommand fuction Use after free Vulnerability 0day](http://www.freebuf.com/vuls/5675.html) |
| 5 | 2012.09.17 | sans_edu_diaryarchive | [IE Zero Day is "For Real"](https://isc.sans.edu/forums/diary/IE+Zero+Day+is+For+Real/14107/) |
| 6 | 2012.08.30 | fox_it | [Observations on the recent Java 0-day exploits in the wild](https://blog.fox-it.com/2012/08/30/observations-on-the-recent-java-0-day-exploits-in-the-wild/) |
| 8 | 2012.08.29 | krebsonsecurity | [Researchers: Java Zero-Day Leveraged Two Flaws](https://krebsonsecurity.com/2012/08/java-exploit-leveraged-two-flaws/) |
| 5 | 2012.08.28 | immunityproducts | [Java 0day analysis (CVE-2012-4681)](https://immunityproducts.blogspot.com/2012/08/java-0day-analysis-cve-2012-4681.html) |
| 10 | 2012.08.28 | dontneedcoffee | [Java 0day ( CVE-2012-4681) Update available for Blackhole Exploit Kit owner](https://malware.dontneedcoffee.com/2012/08/java-0day-cve-2012-4681-update.html) |
| 6 | 2012.08.27 | krebsonsecurity | [Attackers Pounce on Zero-Day Java Exploit](https://krebsonsecurity.com/2012/08/attackers-pounce-on-zero-day-java-exploit/) |
| 9 | 2012.07.09 | krebsonsecurity | [How to Break Into Security, Grossman Edition](https://krebsonsecurity.com/2012/07/how-to-break-into-security-grossman-edition/) |
| 5 | 2012.07.07 | _0day5 | [php5.4.3版本 远程代码执行漏洞](http://0day5.com/archives/179/) |
| 5 | 2012.06.07 | knownsec | [知道创宇:企业网站现漏洞,更新补丁保安全](http://blog.knownsec.com/2012/06/%e7%9f%a5%e9%81%93%e5%88%9b%e5%ae%87%ef%bc%9a%e6%98%93%e9%80%9a%e4%bc%81%e4%b8%9a%e7%bd%91%e7%ab%99%e7%b3%bb%e7%bb%9f%e5%ad%98%e5%9c%a80day%e6%bc%8f%e6%b4%9e%ef%bc%8c%e8%af%b7%e5%8f%8a%e6%97%b6/) |
| 8 | 2012.05.31 | knownsec | [遨游浏览器最新版爆0day漏洞,数千万用户面临威胁](http://blog.knownsec.com/2012/05/%e9%81%a8%e6%b8%b8%e6%b5%8f%e8%a7%88%e5%99%a8%e6%9c%80%e6%96%b0%e7%89%88%e7%88%860day%e6%bc%8f%e6%b4%9e%ef%bc%8c%e4%b8%80%e5%8d%83%e5%a4%9a%e4%b8%87%e7%94%a8%e6%88%b7%e9%9d%a2%e4%b8%b4%e5%a8%81/) |
| 5 | 2012.05.24 | krebsonsecurity | [WHMCS Breach May Be Only Tip of the Trouble](https://krebsonsecurity.com/2012/05/whmcs-breach-may-be-only-tip-of-the-trouble/) |
| 5 | 2012.05.21 | freebuf | [PHP 5.4 Win32 Code Execution](http://www.freebuf.com/articles/1806.html) |
| 5 | 2012.05.15 | _0day5 | [PHP 5.4 (5.4.3) Code Execution (Win32)](http://0day5.com/archives/114/) |
| 6 | 2012.02.29 | techworld | [Google offers $1 million bounty for Chrome exploits](https://www.techworld.com/news/security/google-offers-1-million-bounty-for-chrome-exploits-3340975/) |
| 19 | 2011.12.03 | n0tr00t | [Android 应用安全之 Android 平台上的 XSS 攻击](https://n0tr00t.com/2011/12/03/heige-android-02.html) |
| 11 | 2011.07.29 | beistlab | [Targeted attack의 개념 이해](https://beistlab.wordpress.com/2011/07/29/targeted-attack-overview/) |
| 12 | 2011.07.22 | beistlab | [AntiVirus Program에서 발견되는 취약점은 왜 더 위험한가?](https://beistlab.wordpress.com/2011/07/22/why-antivirus-program-bugs-get-serious/) |
| 16 | 2011.05.03 | krebsonsecurity | [Advanced Persistent Tweets: Zero-Day in 140 Characters](https://krebsonsecurity.com/2011/05/advanced-persistent-tweets-zero-day-in-140-characters/) |
| 9 | 2011.03.17 | scadahacker_blog | [Agora+ SCADA Exploit Pack for CANVAS](http://scadahacker.blogspot.com/2011/03/agora-scada-exploit-pack-for-canvas.html) |
| 8 | 2010.11.10 | contagiodump | [None](http://contagiodump.blogspot.com/2010/11/cve-2010-3654.html) |
| 5 | 2010.10.28 | contagiodump | [None](http://contagiodump.blogspot.com/2010/10/potential-new-adobe-flash-player-zero.html) |
| 7 | 2010.09.17 | contagiodump | [None](http://contagiodump.blogspot.com/2010/09/cve-david-leadbetters-one-point-lesson.html) |
| 7 | 2010.02.08 | sans_edu_diaryarchive | [When is a 0day not a 0day? Fake OpenSSh exploit, again. ](https://isc.sans.edu/forums/diary/When+is+a+0day+not+a+0day+Fake+OpenSSh+exploit+again/8185/) |
| 7 | 2010.01.14 | contagiodump | [None](http://contagiodump.blogspot.com/2009/12/2009-12-22-analysis-of-cve-2009-4324.html) |
| 6 | 2009.07.09 | sans_edu_diaryarchive | [OpenSSH 0day FUD](https://isc.sans.edu/forums/diary/OpenSSH+0day+FUD/6760/) |
| 7 | 2008.10.28 | talosintelligence_blog | [Update on Snort and ClamAV for ms08-067](https://blog.talosintelligence.com/2008/10/update-on-snort-and-clamav-for-ms08-067.html) |
| 6 | 2008.10.21 | pediy_new_digest | [[技术专题]软件安全测试(fuzz)之大家一起学1: fuzz platform架构](https://bbs.pediy.com/thread-75032.htm) |
| 7 | 2007.12.23 | pediy_new_digest | [[技术专题]软件漏洞分析入门_7_案例](https://bbs.pediy.com/thread-56963.htm) |
| 9 | 2006.09.19 | sans_edu_diaryarchive | [0day this, 0day that, I've got the 0day blah's, as does Microsoft Office 2000 PPT](https://isc.sans.edu/forums/diary/0day+this+0day+that+Ive+got+the+0day+blahs+as+does+Microsoft+Office+2000+PPT/1717/) |
| 14 | 2006.08.05 | pediy_new_digest | [[原创]揭檫0day神秘的面?](https://bbs.pediy.com/thread-30133.htm) |
| 15 | 2006.06.20 | sans_edu_diaryarchive | [Comments on 0day](https://isc.sans.edu/forums/diary/Comments+on+0day/1432/) |
| 6 | 2006.06.20 | sans_edu_diaryarchive | [New Excel 0day (Are we evolving or going in circles?)](https://isc.sans.edu/forums/diary/New+Excel+0day+Are+we+evolving+or+going+in+circles/1431/) |
| 5 | 2005.08.19 | sans_edu_diaryarchive | [Infocon gone yellow; Patch available for Internet Explorer (.Net) 0day Exploit; Open letter; OS-X Patches; 1433 scans after Zotob; Zotob MSRT updated](https://isc.sans.edu/forums/diary/Infocon+gone+yellow+Patch+available+for+Internet+Explorer+Net+0day+Exploit+Open+letter+OSX+Patches+1433+scans+after+Zotob+Zotob+MSRT+updated/631/) |


================================================
FILE: posts/cc/1Day_post_sort_by_cc_cnt.md
================================================
1Day

None

| 时间 | CC数目 | URL | 标题 |
| ---- | ----- | --- | --- |
| 6 | 2016.06.28 | cr4 | [Exploring and exploiting Lenovo firmware secrets](http://blog.cr4.sh/2016/06/exploring-and-exploiting-lenovo.html) |
| 6 | 2019.04.04 | nsfocus_blog | [跟时间赛跑——1Day、NDay漏洞防护](http://blog.nsfocus.net/running-time-1day-nday-vulnerability-protection/) |


================================================
FILE: posts/cc/1Day_post_sort_by_time.md
================================================
1Day

None

| 时间 | CC数目 | URL | 标题 |
| ---- | ----- | --- | --- |
| 6 | 2019.04.04 | nsfocus_blog | [跟时间赛跑——1Day、NDay漏洞防护](http://blog.nsfocus.net/running-time-1day-nday-vulnerability-protection/) |
| 6 | 2016.06.28 | cr4 | [Exploring and exploiting Lenovo firmware secrets](http://blog.cr4.sh/2016/06/exploring-and-exploiting-lenovo.html) |


================================================
FILE: posts/cc/4G_post_sort_by_cc_cnt.md
================================================
4G

None

| 时间 | CC数目 | URL | 标题 |
| ---- | ----- | --- | --- |
| 132 | 2019.01.03 | linuxgizmos | [Catalog of 122 open-spec Linux hacker boards](http://linuxgizmos.com/catalog-of-122-open-spec-linux-hacker-boards/) |
| 119 | 2018.06.05 | linuxgizmos | [Catalog of 116 open-spec hacker boards](http://linuxgizmos.com/catalog-of-116-open-spec-hacker-boards/) |
| 61 | 2011.02.10 | cleanbytes | [Is Google.com hacked ? Google Images redirecting to malware(fake antivirus)](http://cleanbytes.net/is-google-com-hacked-google-images-redirecting-to-malwarefake-antivirus) |
| 24 | 2011.07.28 | pediy_new_digest | [[原创]让XP用上4G内存,有图有真相,带破解补丁](https://bbs.pediy.com/thread-137830.htm) |
| 22 | 2018.08.06 | pediy_new_digest | [[推荐]有防范GSM劫持短信的方法吗?](https://bbs.pediy.com/thread-246077.htm) |
| 21 | 2019.04.17 | 360_anquanke_learning | [VxWorks固件逆向:WRT54Gv8](https://www.anquanke.com/post/id/176481/) |
| 21 | 2018.06.14 | ptsecurity_analytics | [Diameter vulnerabilities exposure report, 2018](https://www.ptsecurity.com/ww-en/analytics/diameter-2018/) |
| 20 | 2015.04.05 | pediy_new_digest | [[原创]如何使用OpeniBoot](https://bbs.pediy.com/thread-199324.htm) |
| 19 | 2019.01.07 | linuxgizmos | [Linux-driven i.MX ULL board drives $99 touch-panel kit](http://linuxgizmos.com/linux-driven-i-mx-ull-board-drives-99-touch-panel-kit/) |
| 18 | 2012.10.31 | arbornetworks_blog_insight | [Best of 4G Awards for User Experience & Policy Management](https://www.netscout.com/news/press-release/4g-awards-user-experience) |
| 17 | 2019.02.11 | enterprisetech_networks | [5G Readiness Lags — Here’s What to Do Now](https://www.enterpriseai.news/2019/02/11/5g-readiness-lags-heres-what-to-do-now/) |
| 17 | 2019.02.11 | enterprisetech_networks | [5G Readiness Lags — Here’s What to Do Now](https://www.enterprisetech.com/2019/02/11/5g-readiness-lags-heres-what-to-do-now/) |
| 15 | 2018.03.23 | linuxgizmos | [Wireless crazed Orange Pi boasts 4G LTE, WiFi, BT, FM, and GPS](http://linuxgizmos.com/wireless-crazed-orange-pi-boasts-4g-lte-wifi-bt-fm-and-gps/) |
| 14 | 2018.02.28 | thishosting | [Best Linux Laptops To Buy in 2018](https://thishosting.rocks/best-linux-laptops/) |
| 13 | 2018.07.19 | pediy_new_digest | [[翻译]基于MSIL字节码注入操作.NET程序](https://bbs.pediy.com/thread-230012.htm) |
| 11 | 2018.10.22 | 4hou_technology | [寻找物联网设备连接的端点: 射频与硬件(一)](http://www.4hou.com/technology/13881.html) |
| 11 | 2018.09.13 | synacktiv_blog | [Hunting mobile devices endpoints - the RF and the Hard way](https://www.synacktiv.com/posts/hardware/hunting-mobile-devices-endpoints-the-rf-and-the-hard-way.html) |
| 11 | 2018.10.25 | linuxgizmos | [Raspberry Pi gains first CAT4 LTE add-on](http://linuxgizmos.com/raspberry-pi-gains-first-cat4-lte-add-on/) |
| 10 | 2007.04.05 | pediy_new_digest | [[翻译]Pinczakko的AwardBIOS逆向工程指导](https://bbs.pediy.com/thread-42166.htm) |
| 9 | 2019.02.06 | caceriadespammers | [¿Qué es el VoLTE?](https://www.caceriadespammers.com.ar/2019/02/que-es-el-volte.html) |
| 9 | 2018.06.13 | ptsecurity_news | [Positive Technologies: testing shows all 4G networks vulnerable to denial of service attacks](https://www.ptsecurity.com/ww-en/about/news/292977/) |
| 9 | 2019.03.08 | freebuf | [研究人员发现4G和5G通信网络中的新型通话拦截和位置追踪漏洞](https://www.freebuf.com/articles/web/196650.html) |
| 9 | 2016.07.06 | cn0xroot | [GnuRadio + BladeRF + OpenLTE 搭建4G LTE 基站 Part 1](https://cn0xroot.com/2016/07/06/how-to-build-4g-lte-base-station-with-gnuradio-bladerf-openlte-part-1/) |
| 9 | 2017.10.09 | ptsecurity_news | [Positive Technologies launches 4G and 5G security assessment service](https://www.ptsecurity.com/ww-en/about/news/286211/) |
| 9 | 2016.07.13 | freebuf | [使用GnuRadio + OpenLTE + SDR 搭建4G LTE 基站(上)](http://www.freebuf.com/articles/wireless/108417.html) |
| 8 | 2013.10.25 | troyhunt | [On getting Pineappled at Web Directions South](https://www.troyhunt.com/on-getting-pineappled-at-web-directions/) |
| 8 | 2017.04.07 | freebuf | [八百元八核的服务器?二手服务器(工作站)搭建指南(下)](http://www.freebuf.com/geek/131151.html) |
| 8 | 2019.02.25 | linuxgizmos | [Robotics kit runs Linux on new DragonBoard 845c 96Boards SBC](http://linuxgizmos.com/robotics-kit-runs-linux-on-new-dragonboard-845c-96boards-sbc/) |
| 8 | 2014.11.21 | hypervsir | [Improve Performance for Separating Kernel and User Address Space with Process-Context Identifiers (PCIDs)](http://hypervsir.blogspot.com/2014/11/improve-performance-for-separating.html) |
| 8 | 2017.04.25 | linuxroutes | [Quick guide for Linux check disk space](https://linuxroutes.com/how-to-linux-check-disk-space-commands/) |
| 8 | 2017.02.20 | linuxroutes | [3 Simple ways to find Linux current boot disk path.](https://linuxroutes.com/linux-current-boot-disk-path/) |
| 8 | 2018.10.30 | dyn | [Is 4G DDNS Possible?](https://dyn.com/blog/is-4g-ddns-possible/) |
| 8 | 2018.05.16 | maketecheasier | [5G Is on the Horizon. How’s It Shaping Up?](https://www.maketecheasier.com/5g-is-on-the-horizon/) |
| 8 | 2015.06.03 | insinuator | [ERNW@HAXPO/HITB 2015](https://insinuator.net/2015/06/ernwhaxpohitb-2015/) |
| 8 | 2015.02.12 | f5_whitepapers | [TCP Optimization for Service Providers](https://f5.com/resources/white-papers/tcp-optimization-for-service-providers) |
| 7 | 2016.01.16 | _0day5 | [Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778](http://0day5.com/archives/3711/) |
| 7 | 2018.09.17 | osandamalith | [EE 4GEE Mini Local Privilege Escalation Vulnerability (CVE-2018-14327)](https://osandamalith.com/2018/09/17/ee-4gee-mini-local-privilege-escalation-vulnerability-cve-2018-14327/) |
| 7 | 2016.02.16 | linuxjournal | [What's in the Box? Interrogate Your Linux Machine's Hardware](https://www.linuxjournal.com/content/whats-box-interrogate-your-linux-machines-hardware) |
| 7 | 2013.08.08 | mwrinfosecurity_our_thinking | [LTE Security Testing](https://www.mwrinfosecurity.com/our-thinking/lte-security-testing/) |
| 7 | 2016.10.30 | 8090_sec_linux | [linux磁盘和文件系统管理(一)](http://www.8090-sec.com/archives/4566) |
| 7 | 2015.02.26 | labs_ripe | [Today's Mobile Internet](https://labs.ripe.net/Members/gih/todays-mobile-internet) |
| 7 | 2018.06.13 | linuxgizmos | [RK3399 SBC has 9-36V DC and optional 4G, WiFi, serial, and HDMI-in modules](http://linuxgizmos.com/rk3399-sbc-has-9-36v-dc-and-optional-4g-wifi-serial-and-hdmi-in-modules/) |
| 7 | 2016.02.22 | f5_blog | [The perfect storm: Security at massive scale to support the IoT & 4G/5G networks](https://f5.com/about-us/blog/articles/the-perfect-storm-security-at-massive-scale-to-support-the-iot-4g-5g-networks) |
| 7 | 2018.05.23 | linuxgizmos | [Smallest RK3399 hacker board yet ships at $129 with 4GB DDR4](http://linuxgizmos.com/smallest-rk3399-hacker-board-yet-ships-at-129-with-4gb-ddr4/) |
| 7 | 2017.11.30 | venus_seebug | [Milipol Paris 2017,总有些技术超出想象](https://paper.seebug.org/466/) |
| 6 | 2017.06.10 | pediy_new_digest | [[原创]记一次安卓系统源码下载过程。](https://bbs.pediy.com/thread-218366.htm) |
| 6 | 2019.04.03 | hakin9_blog | [Building a Raspberry Pi Cluster by Garrett Mills](https://hakin9.org/building-a-raspberry-pi-cluster-by-garrett-mills/) |
| 6 | 2018.12.24 | _2daygeek | [Easy Way to Format USB Disk Drive in Linux Command Line](https://www.2daygeek.com/format-usb-drive-disk-stick-in-linux/) |
| 6 | 2016.11.03 | troyhunt | [Ubiquiti all the things: how I finally fixed my dodgy wifi](https://www.troyhunt.com/ubiquiti-all-the-things-how-i-finally-fixed-my-dodgy-wifi/) |
| 6 | 2013.07.19 | f5_whitepapers | [Simplifying Security for Mobile Networks](https://f5.com/resources/white-papers/simplifying-security-for-mobile-networks) |
| 6 | 2019.04.17 | daringfireball | [Why Apple Settled With Qualcomm](https://daringfireball.net/2019/04/why_apple_settled_with_qualcomm) |
| 6 | 2015.10.29 | arxiv | [[1510.08531] New Threats to SMS-Assisted Mobile Internet Services from 4G LTE: Lessons Learnt from Distributed Mobile-Initiated Attacks towards Facebook and Other Services](https://arxiv.org/abs/1510.08531) |
| 6 | 2017.08.14 | arxiv | [[1708.04027] Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes](https://arxiv.org/abs/1708.04027) |
| 6 | 2017.06.08 | myriadrf | [Over The Air: Ebrahim Bushehri Interview, ERASynth Update, LimeSDR 4G Repeater, Lime Hackathon Deadline, QB50 Satellites, Drone Hijacking, LTE IMSI Catcher, Chazwazza VNA, Fixing a Bent Antenna, and Focus On Alexandru Csete](https://myriadrf.org/blog/ota-ebrahmin-bushehri-interview-erasynth-update-limesdr-4g-repeater-lime-hackathon-deadline-qb50-satellites-drone-hijacking-lte-imsi-catcher-chazwazza-vna-fixing-bent-antenna-focus-on-alex-csete/) |
| 6 | 2019.04.18 | linuxgizmos | [Open-spec touch panel computer runs on octa-core SoC](http://linuxgizmos.com/open-spec-touch-panel-computer-runs-on-octa-core-soc/) |
| 6 | 2018.04.03 | _2daygeek | [17 Ways To Check Size Of Physical Memory (RAM) In Linux](https://www.2daygeek.com/easy-ways-to-check-size-of-physical-memory-ram-in-linux/) |
| 6 | 2018.08.04 | freebuf | [“短信验证码”早已不安全,睡梦之中就能被盗刷](http://www.freebuf.com/news/179743.html) |
| 6 | 2015.09.09 | darknet | [Android Phones (Possibly) Hacked At Defcon On CDMA & 4G (HSPA)](https://www.darknet.org.uk/2011/08/android-phones-possibly-hacked-at-defcon-on-cdma-4g-hspa/) |
| 6 | 2015.11.14 | sec_un | [2015欧洲黑帽大会Black Hat Euro速写](https://www.sec-un.org/sketch-of-black-hat-europe-2015/) |
| 6 | 2018.11.26 | linuxgizmos | [Tiny SBCs run Linux on i.MX6 ULL and i.MX6 Solo](http://linuxgizmos.com/tiny-linux-driven-sbcs-build-on-i-mx6-ull-and-i-mx6-solo/) |
| 6 | 2016.06.21 | maketecheasier | [Leagoo Elite 5 4G Phablet Review](https://www.maketecheasier.com/leagoo-elite-5-review/) |
| 6 | 2018.03.02 | myriadrf | [OTA: LimeSDR in Space, 4G on the Moon, and More](https://myriadrf.org/blog/ota-limesdr-space-4g-moon/) |
| 6 | 2016.02.03 | insinuator | [TelcoSecDay 2016 – Second Round of Talks](https://insinuator.net/2016/02/telcosecday-2016-second-round-of-talks/) |
| 6 | 2015.02.27 | maketecheasier | [5G Mobile Internet: The Pros and Cons](https://www.maketecheasier.com/5g-mobile-internet-pros-and-cons/) |
| 6 | 2019.01.15 | linuxgizmos | [Compact i.MX6 UL gateway offers WiFi, 4G, LoRa, and ZigBee](http://linuxgizmos.com/compact-i-mx6-ul-gateway-offers-wifi-4g-lora-and-zigbee/) |
| 6 | 2018.06.15 | linuxgizmos | [LTE-equipped automotive gateway runs Ubuntu on Bay Trail](http://linuxgizmos.com/lte-equipped-automotive-gateway-runs-ubuntu-on-bay-trail/) |
| 6 | 2015.11.02 | 360_anquanke_learning | [比葫芦娃还可怕的百度全系APP SDK漏洞 - WormHole虫洞漏洞分析报告](https://www.anquanke.com/post/id/82828/) |
| 6 | 2019.03.15 | linuxgizmos | [i.MX8M Mini SBC is loaded with options](http://linuxgizmos.com/i-mx8m-mini-sbc-is-loaded-with-options/) |
| 5 | 2016.06.12 | cn0xroot | [BLE Hacking:使用Ubertooth one扫描嗅探低功耗蓝牙](https://cn0xroot.com/2016/06/12/ble-hacking%ef%bc%9able-scan-and-sniffer-withubertooth-one/) |
| 5 | 2018.05.05 | maketecheasier | [What Does It Mean When Data is “Roaming?”](https://www.maketecheasier.com/what-is-data-roaming/) |
| 5 | 2017.09.20 | rtl_sdr | [LimeSDR and SDRAngel Running on a LattePanda](https://www.rtl-sdr.com/limesdr-and-sdrangel-running-on-a-lattepanda/) |
| 5 | 2017.06.11 | sec_un | [美国两大顶级黑客会议下月召开 360三议题入选](https://www.sec-un.org/%e7%be%8e%e5%9b%bd%e4%b8%a4%e5%a4%a7%e9%a1%b6%e7%ba%a7%e9%bb%91%e5%ae%a2%e4%bc%9a%e8%ae%ae%e4%b8%8b%e6%9c%88%e5%8f%ac%e5%bc%80-360%e4%b8%89%e8%ae%ae%e9%a2%98%e5%85%a5%e9%80%89/) |
| 5 | 2018.03.13 | 4hou_technology | [4G LTE协议安全性及潜在攻击风险分析](http://www.4hou.com/technology/10645.html) |
| 5 | 2016.03.25 | freebuf | [伪基站识别技巧(一)](http://www.freebuf.com/articles/terminal/99957.html) |
| 5 | 2013.07.08 | kudelskisecurity | [Telecom’s walled gardens are falling apart](https://research.kudelskisecurity.com/2013/07/08/telecoms-walled-gardens-are-falling-apart/) |
| 5 | 2017.09.29 | ostechnix | [How To Find Files Bigger Or Smaller Than X Size In Linux](https://www.ostechnix.com/find-files-bigger-smaller-x-size-linux/) |
| 5 | 2016.03.11 | freebuf | [阿里发布2015物联网安全年报,威胁攻击日益凸显](http://www.freebuf.com/articles/terminal/98336.html) |
| 5 | 2018.04.13 | freebuf | [HITB 2018 - 黑客利器HackCUBE全球首秀,360鲲鹏安全团队采访实录](http://www.freebuf.com/articles/people/168165.html) |
| 5 | 2017.09.28 | ptsecurity_news | [4G and 5G networks are not ready for smart cities](https://www.ptsecurity.com/ww-en/about/news/285718/) |
| 5 | 2018.07.03 | 4hou_vulnerable | [4G LTE数据链路层出现安全漏洞](http://www.4hou.com/vulnerable/12307.html) |
| 5 | 2017.07.26 | ixiacom_blog | [GTP Session: The ABCs of Network Visibility](https://www.ixiacom.com/company/blog/gtp-session-abcs-network-visibility) |
| 5 | 2012.06.12 | ixiacom_blog | [Helping Mobile Operators Flatten The World](https://www.ixiacom.com/company/blog/helping-mobile-operators-flatten-world) |
| 5 | 2016.04.06 | calyxinstitute | [The Calyx Institute now has access to Sprint's 4G / LTE data network and you can get a full year of wireless data for FREE with membership * !!](https://www.calyxinstitute.org/news/calyx-institute-now-has-access-sprints-4g-lte-data-network-and-you-can-get-full-year-wireless) |
| 5 | 2018.03.07 | 8090_sec_yl | [4G 网络也不安全!黑客居然能利用漏洞监视用户](http://www.8090-sec.com/archives/10768) |
| 5 | 2016.09.06 | rafayhackingarticles | [Whatsapp 4G VIP SCAM  - Technical Analysis](http://www.rafayhackingarticles.net/2016/09/whatsapp-4g-vip-scam-technical-analysis.html) |
| 5 | 2017.12.20 | rehmann | [WiFi USB Adapter Drivers (OSX/Mac, Linux, and Windows)](https://rehmann.co/blog/drivers-wifi-usb-adapter-osxmac-linux-windows/) |
| 5 | 2017.07.12 | f5_blog | [TCP Optimization Enhancements for a Better Mobile Experience](https://f5.com/about-us/blog/articles/tcp-optimization-enhancements-for-a-better-mobile-experience-27371) |
| 5 | 2011.03.10 | daringfireball | [Bending Over Backwards](https://daringfireball.net/2011/03/bending_over_backwards) |
| 5 | 2013.10.28 | f5_whitepapers | [The F5 Security for Service Providers Reference Architecture](https://f5.com/resources/white-papers/the-f5-security-for-service-providers-reference-architecture) |
| 5 | 2015.11.04 | kaspersky_blog | [Voice as a threat: VoLTE, a new tool to compromise mobile networks](https://www.kaspersky.com/blog/volte-insecurity/10463/) |
| 5 | 2015.05.25 | shkspr | [ZeleSouris Wireless Vertical Mouse and Linux](https://shkspr.mobi/blog/2015/05/zelesouris-wireless-vertical-mouse-and-linux/) |
| 5 | 2019.04.02 | youtube | [NDSS 2019 Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information](https://www.youtube.com/watch?v=Wh603IiqSLY) |
| 5 | 2018.02.21 | f5_blog | [My New Car, the Rise of Multi-Access Edge Computing, and the BIG-IP i15000 Series](https://f5.com/about-us/blog/articles/my-new-car-the-rise-of-multi-access-edge-computing-and-the-big-ip-i15000-series-29877) |
| 5 | 2015.11.24 | dangerousprototypes | [Hong Kong/China dual number data SIMs with quality internet](http://dangerousprototypes.com/blog/2015/11/24/hong-kongchina-dual-number-data-sims-with-quality-internet/) |
| 5 | 2017.07.27 | freebuf | [【BlackHat 2017】美国黑客大会首日议题汇总,演讲PPT下载也在这里](http://www.freebuf.com/news/142159.html) |
| 5 | 2013.05.08 | nebelwelt_blog | [FreedomPop Overdrive: first thoughts](http://nebelwelt.net/blog/20130508-freedompop-overdrive-first-thoughts.html) |
| 5 | 2012.04.14 | webroot | [Hewlett-Packard shipping malware-infected compact flash cards](https://www.webroot.com/blog/2012/04/14/hewlett-packard-shipping-malware-infected-compact-flash-cards/) |
| 5 | 2012.09.16 | pediy_new_digest | [None](https://bbs.pediy.com/thread-156036.htm) |
| 5 | 2017.06.30 | ixiacom_blog | [Ten Myths About 5G - Debunked](https://www.ixiacom.com/company/blog/ten-myths-about-5g-debunked) |
| 5 | 2014.10.19 | shubs | [Breaking International Voicemail Security via VVM Exploitation](https://shubs.io/breaking-international-voicemail-security-via-vvm-exploitation/) |
| 5 | 2014.12.25 | freebuf | [极路由(HiWiFi)1S硬件分析与改造研究](http://www.freebuf.com/news/topnews/54862.html) |
| 5 | 2018.06.27 | linuxgizmos | [Expandable, Apollo Lake based MintBox Mini 2 starts at $299](http://linuxgizmos.com/expandable-apollo-lake-based-mintbox-mini-2-starts-at-299/) |
| 5 | 2016.06.12 | freebuf | [BLE Hacking:使用Ubertooth one扫描嗅探低功耗蓝牙](http://www.freebuf.com/articles/wireless/106298.html) |


================================================
FILE: posts/cc/4G_post_sort_by_time.md
================================================
4G

None

| 时间 | CC数目 | URL | 标题 |
| ---- | ----- | --- | --- |
| 6 | 2019.04.18 | linuxgizmos | [Open-spec touch panel computer runs on octa-core SoC](http://linuxgizmos.com/open-spec-touch-panel-computer-runs-on-octa-core-soc/) |
| 21 | 2019.04.17 | 360_anquanke_learning | [VxWorks固件逆向:WRT54Gv8](https://www.anquanke.com/post/id/176481/) |
| 6 | 2019.04.17 | daringfireball | [Why Apple Settled With Qualcomm](https://daringfireball.net/2019/04/why_apple_settled_with_qualcomm) |
| 6 | 2019.04.03 | hakin9_blog | [Building a Raspberry Pi Cluster by Garrett Mills](https://hakin9.org/building-a-raspberry-pi-cluster-by-garrett-mills/) |
| 5 | 2019.04.02 | youtube | [NDSS 2019 Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information](https://www.youtube.com/watch?v=Wh603IiqSLY) |
| 6 | 2019.03.15 | linuxgizmos | [i.MX8M Mini SBC is loaded with options](http://linuxgizmos.com/i-mx8m-mini-sbc-is-loaded-with-options/) |
| 9 | 2019.03.08 | freebuf | [研究人员发现4G和5G通信网络中的新型通话拦截和位置追踪漏洞](https://www.freebuf.com/articles/web/196650.html) |
| 8 | 2019.02.25 | linuxgizmos | [Robotics kit runs Linux on new DragonBoard 845c 96Boards SBC](http://linuxgizmos.com/robotics-kit-runs-linux-on-new-dragonboard-845c-96boards-sbc/) |
| 17 | 2019.02.11 | enterprisetech_networks | [5G Readiness Lags — Here’s What to Do Now](https://www.enterpriseai.news/2019/02/11/5g-readiness-lags-heres-what-to-do-now/) |
| 17 | 2019.02.11 | enterprisetech_networks | [5G Readiness Lags — Here’s What to Do Now](https://www.enterprisetech.com/2019/02/11/5g-readiness-lags-heres-what-to-do-now/) |
| 9 | 2019.02.06 | caceriadespammers | [¿Qué es el VoLTE?](https://www.caceriadespammers.com.ar/2019/02/que-es-el-volte.html) |
| 6 | 2019.01.15 | linuxgizmos | [Compact i.MX6 UL gateway offers WiFi, 4G, LoRa, and ZigBee](http://linuxgizmos.com/compact-i-mx6-ul-gateway-offers-wifi-4g-lora-and-zigbee/) |
| 19 | 2019.01.07 | linuxgizmos | [Linux-driven i.MX ULL board drives $99 touch-panel kit](http://linuxgizmos.com/linux-driven-i-mx-ull-board-drives-99-touch-panel-kit/) |
| 132 | 2019.01.03 | linuxgizmos | [Catalog of 122 open-spec Linux hacker boards](http://linuxgizmos.com/catalog-of-122-open-spec-linux-hacker-boards/) |
| 6 | 2018.12.24 | _2daygeek | [Easy Way to Format USB Disk Drive in Linux Command Line](https://www.2daygeek.com/format-usb-drive-disk-stick-in-linux/) |
| 6 | 2018.11.26 | linuxgizmos | [Tiny SBCs run Linux on i.MX6 ULL and i.MX6 Solo](http://linuxgizmos.com/tiny-linux-driven-sbcs-build-on-i-mx6-ull-and-i-mx6-solo/) |
| 8 | 2018.10.30 | dyn | [Is 4G DDNS Possible?](https://dyn.com/blog/is-4g-ddns-possible/) |
| 11 | 2018.10.25 | linuxgizmos | [Raspberry Pi gains first CAT4 LTE add-on](http://linuxgizmos.com/raspberry-pi-gains-first-cat4-lte-add-on/) |
| 11 | 2018.10.22 | 4hou_technology | [寻找物联网设备连接的端点: 射频与硬件(一)](http://www.4hou.com/technology/13881.html) |
| 7 | 2018.09.17 | osandamalith | [EE 4GEE Mini Local Privilege Escalation Vulnerability (CVE-2018-14327)](https://osandamalith.com/2018/09/17/ee-4gee-mini-local-privilege-escalation-vulnerability-cve-2018-14327/) |
| 11 | 2018.09.13 | synacktiv_blog | [Hunting mobile devices endpoints - the RF and the Hard way](https://www.synacktiv.com/posts/hardware/hunting-mobile-devices-endpoints-the-rf-and-the-hard-way.html) |
| 22 | 2018.08.06 | pediy_new_digest | [[推荐]有防范GSM劫持短信的方法吗?](https://bbs.pediy.com/thread-246077.htm) |
| 6 | 2018.08.04 | freebuf | [“短信验证码”早已不安全,睡梦之中就能被盗刷](http://www.freebuf.com/news/179743.html) |
| 13 | 2018.07.19 | pediy_new_digest | [[翻译]基于MSIL字节码注入操作.NET程序](https://bbs.pediy.com/thread-230012.htm) |
| 5 | 2018.07.03 | 4hou_vulnerable | [4G LTE数据链路层出现安全漏洞](http://www.4hou.com/vulnerable/12307.html) |
| 5 | 2018.06.27 | linuxgizmos | [Expandable, Apollo Lake based MintBox Mini 2 starts at $299](http://linuxgizmos.com/expandable-apollo-lake-based-mintbox-mini-2-starts-at-299/) |
| 6 | 2018.06.15 | linuxgizmos | [LTE-equipped automotive gateway runs Ubuntu on Bay Trail](http://linuxgizmos.com/lte-equipped-automotive-gateway-runs-ubuntu-on-bay-trail/) |
| 21 | 2018.06.14 | ptsecurity_analytics | [Diameter vulnerabilities exposure report, 2018](https://www.ptsecurity.com/ww-en/analytics/diameter-2018/) |
| 9 | 2018.06.13 | ptsecurity_news | [Positive Technologies: testing shows all 4G networks vulnerable to denial of service attacks](https://www.ptsecurity.com/ww-en/about/news/292977/) |
| 7 | 2018.06.13 | linuxgizmos | [RK3399 SBC has 9-36V DC and optional 4G, WiFi, serial, and HDMI-in modules](http://linuxgizmos.com/rk3399-sbc-has-9-36v-dc-and-optional-4g-wifi-serial-and-hdmi-in-modules/) |
| 119 | 2018.06.05 | linuxgizmos | [Catalog of 116 open-spec hacker boards](http://linuxgizmos.com/catalog-of-116-open-spec-hacker-boards/) |
| 7 | 2018.05.23 | linuxgizmos | [Smallest RK3399 hacker board yet ships at $129 with 4GB DDR4](http://linuxgizmos.com/smallest-rk3399-hacker-board-yet-ships-at-129-with-4gb-ddr4/) |
| 8 | 2018.05.16 | maketecheasier | [5G Is on the Horizon. How’s It Shaping Up?](https://www.maketecheasier.com/5g-is-on-the-horizon/) |
| 5 | 2018.05.05 | maketecheasier | [What Does It Mean When Data is “Roaming?”](https://www.maketecheasier.com/what-is-data-roaming/) |
| 5 | 2018.04.13 | freebuf | [HITB 2018 - 黑客利器HackCUBE全球首秀,360鲲鹏安全团队采访实录](http://www.freebuf.com/articles/people/168165.html) |
| 6 | 2018.04.03 | _2daygeek | [17 Ways To Check Size Of Physical Memory (RAM) In Linux](https://www.2daygeek.com/easy-ways-to-check-size-of-physical-memory-ram-in-linux/) |
| 15 | 2018.03.23 | linuxgizmos | [Wireless crazed Orange Pi boasts 4G LTE, WiFi, BT, FM, and GPS](http://linuxgizmos.com/wireless-crazed-orange-pi-boasts-4g-lte-wifi-bt-fm-and-gps/) |
| 5 | 2018.03.13 | 4hou_technology | [4G LTE协议安全性及潜在攻击风险分析](http://www.4hou.com/technology/10645.html) |
| 5 | 2018.03.07 | 8090_sec_yl | [4G 网络也不安全!黑客居然能利用漏洞监视用户](http://www.8090-sec.com/archives/10768) |
| 6 | 2018.03.02 | myriadrf | [OTA: LimeSDR in Space, 4G on the Moon, and More](https://myriadrf.org/blog/ota-limesdr-space-4g-moon/) |
| 14 | 2018.02.28 | thishosting | [Best Linux Laptops To Buy in 2018](https://thishosting.rocks/best-linux-laptops/) |
| 5 | 2018.02.21 | f5_blog | [My New Car, the Rise of Multi-Access Edge Computing, and the BIG-IP i15000 Series](https://f5.com/about-us/blog/articles/my-new-car-the-rise-of-multi-access-edge-computing-and-the-big-ip-i15000-series-29877) |
| 5 | 2017.12.20 | rehmann | [WiFi USB Adapter Drivers (OSX/Mac, Linux, and Windows)](https://rehmann.co/blog/drivers-wifi-usb-adapter-osxmac-linux-windows/) |
| 7 | 2017.11.30 | venus_seebug | [Milipol Paris 2017,总有些技术超出想象](https://paper.seebug.org/466/) |
| 9 | 2017.10.09 | ptsecurity_news | [Positive Technologies launches 4G and 5G security assessment service](https://www.ptsecurity.com/ww-en/about/news/286211/) |
| 5 | 2017.09.29 | ostechnix | [How To Find Files Bigger Or Smaller Than X Size In Linux](https://www.ostechnix.com/find-files-bigger-smaller-x-size-linux/) |
| 5 | 2017.09.28 | ptsecurity_news | [4G and 5G networks are not ready for smart cities](https://www.ptsecurity.com/ww-en/about/news/285718/) |
| 5 | 2017.09.20 | rtl_sdr | [LimeSDR and SDRAngel Running on a LattePanda](https://www.rtl-sdr.com/limesdr-and-sdrangel-running-on-a-lattepanda/) |
| 6 | 2017.08.14 | arxiv | [[1708.04027] Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes](https://arxiv.org/abs/1708.04027) |
| 5 | 2017.07.27 | freebuf | [【BlackHat 2017】美国黑客大会首日议题汇总,演讲PPT下载也在这里](http://www.freebuf.com/news/142159.html) |
| 5 | 2017.07.26 | ixiacom_blog | [GTP Session: The ABCs of Network Visibility](https://www.ixiacom.com/company/blog/gtp-session-abcs-network-visibility) |
| 5 | 2017.07.12 | f5_blog | [TCP Optimization Enhancements for a Better Mobile Experience](https://f5.com/about-us/blog/articles/tcp-optimization-enhancements-for-a-better-mobile-experience-27371) |
| 5 | 2017.06.30 | ixiacom_blog | [Ten Myths About 5G - Debunked](https://www.ixiacom.com/company/blog/ten-myths-about-5g-debunked) |
| 5 | 2017.06.11 | sec_un | [美国两大顶级黑客会议下月召开 360三议题入选](https://www.sec-un.org/%e7%be%8e%e5%9b%bd%e4%b8%a4%e5%a4%a7%e9%a1%b6%e7%ba%a7%e9%bb%91%e5%ae%a2%e4%bc%9a%e8%ae%ae%e4%b8%8b%e6%9c%88%e5%8f%ac%e5%bc%80-360%e4%b8%89%e8%ae%ae%e9%a2%98%e5%85%a5%e9%80%89/) |
| 6 | 2017.06.10 | pediy_new_digest | [[原创]记一次安卓系统源码下载过程。](https://bbs.pediy.com/thread-218366.htm) |
| 6 | 2017.06.08 | myriadrf | [Over The Air: Ebrahim Bushehri Interview, ERASynth Update, LimeSDR 4G Repeater, Lime Hackathon Deadline, QB50 Satellites, Drone Hijacking, LTE IMSI Catcher, Chazwazza VNA, Fixing a Bent Antenna, and Focus On Alexandru Csete](https://myriadrf.org/blog/ota-ebrahmin-bushehri-interview-erasynth-update-limesdr-4g-repeater-lime-hackathon-deadline-qb50-satellites-drone-hijacking-lte-imsi-catcher-chazwazza-vna-fixing-bent-antenna-focus-on-alex-csete/) |
| 8 | 2017.04.25 | linuxroutes | [Quick guide for Linux check disk space](https://linuxroutes.com/how-to-linux-check-disk-space-commands/) |
| 8 | 2017.04.07 | freebuf | [八百元八核的服务器?二手服务器(工作站)搭建指南(下)](http://www.freebuf.com/geek/131151.html) |
| 8 | 2017.02.20 | linuxroutes | [3 Simple ways to find Linux current boot disk path.](https://linuxroutes.com/linux-current-boot-disk-path/) |
| 6 | 2016.11.03 | troyhunt | [Ubiquiti all the things: how I finally fixed my dodgy wifi](https://www.troyhunt.com/ubiquiti-all-the-things-how-i-finally-fixed-my-dodgy-wifi/) |
| 7 | 2016.10.30 | 8090_sec_linux | [linux磁盘和文件系统管理(一)](http://www.8090-sec.com/archives/4566) |
| 5 | 2016.09.06 | rafayhackingarticles | [Whatsapp 4G VIP SCAM  - Technical Analysis](http://www.rafayhackingarticles.net/2016/09/whatsapp-4g-vip-scam-technical-analysis.html) |
| 9 | 2016.07.13 | freebuf | [使用GnuRadio + OpenLTE + SDR 搭建4G LTE 基站(上)](http://www.freebuf.com/articles/wireless/108417.html) |
| 9 | 2016.07.06 | cn0xroot | [GnuRadio + BladeRF + OpenLTE 搭建4G LTE 基站 Part 1](https://cn0xroot.com/2016/07/06/how-to-build-4g-lte-base-station-with-gnuradio-bladerf-openlte-part-1/) |
| 6 | 2016.06.21 | maketecheasier | [Leagoo Elite 5 4G Phablet Review](https://www.maketecheasier.com/leagoo-elite-5-review/) |
| 5 | 2016.06.12 | cn0xroot | [BLE Hacking:使用Ubertooth one扫描嗅探低功耗蓝牙](https://cn0xroot.com/2016/06/12/ble-hacking%ef%bc%9able-scan-and-sniffer-withubertooth-one/) |
| 5 | 2016.06.12 | freebuf | [BLE Hacking:使用Ubertooth one扫描嗅探低功耗蓝牙](http://www.freebuf.com/articles/wireless/106298.html) |
| 5 | 2016.04.06 | calyxinstitute | [The Calyx Institute now has access to Sprint's 4G / LTE data network and you can get a full year of wireless data for FREE with membership * !!](https://www.calyxinstitute.org/news/calyx-institute-now-has-access-sprints-4g-lte-data-network-and-you-can-get-full-year-wireless) |
| 5 | 2016.03.25 | freebuf | [伪基站识别技巧(一)](http://www.freebuf.com/articles/terminal/99957.html) |
| 5 | 2016.03.11 | freebuf | [阿里发布2015物联网安全年报,威胁攻击日益凸显](http://www.freebuf.com/articles/terminal/98336.html) |
| 7 | 2016.02.22 | f5_blog | [The perfect storm: Security at massive scale to support the IoT & 4G/5G networks](https://f5.com/about-us/blog/articles/the-perfect-storm-security-at-massive-scale-to-support-the-iot-4g-5g-networks) |
| 7 | 2016.02.16 | linuxjournal | [What's in the Box? Interrogate Your Linux Machine's Hardware](https://www.linuxjournal.com/content/whats-box-interrogate-your-linux-machines-hardware) |
| 6 | 2016.02.03 | insinuator | [TelcoSecDay 2016 – Second Round of Talks](https://insinuator.net/2016/02/telcosecday-2016-second-round-of-talks/) |
| 7 | 2016.01.16 | _0day5 | [Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778](http://0day5.com/archives/3711/) |
| 5 | 2015.11.24 | dangerousprototypes | [Hong Kong/China dual number data SIMs with quality internet](http://dangerousprototypes.com/blog/2015/11/24/hong-kongchina-dual-number-data-sims-with-quality-internet/) |
| 6 | 2015.11.14 | sec_un | [2015欧洲黑帽大会Black Hat Euro速写](https://www.sec-un.org/sketch-of-black-hat-europe-2015/) |
| 5 | 2015.11.04 | kaspersky_blog | [Voice as a threat: VoLTE, a new tool to compromise mobile networks](https://www.kaspersky.com/blog/volte-insecurity/10463/) |
| 6 | 2015.11.02 | 360_anquanke_learning | [比葫芦娃还可怕的百度全系APP SDK漏洞 - WormHole虫洞漏洞分析报告](https://www.anquanke.com/post/id/82828/) |
| 6 | 2015.10.29 | arxiv | [[1510.08531] New Threats to SMS-Assisted Mobile Internet Services from 4G LTE: Lessons Learnt from Distributed Mobile-Initiated Attacks towards Facebook and Other Services](https://arxiv.org/abs/1510.08531) |
| 6 | 2015.09.09 | darknet | [Android Phones (Possibly) Hacked At Defcon On CDMA & 4G (HSPA)](https://www.darknet.org.uk/2011/08/android-phones-possibly-hacked-at-defcon-on-cdma-4g-hspa/) |
| 8 | 2015.06.03 | insinuator | [ERNW@HAXPO/HITB 2015](https://insinuator.net/2015/06/ernwhaxpohitb-2015/) |
| 5 | 2015.05.25 | shkspr | [ZeleSouris Wireless Vertical Mouse and Linux](https://shkspr.mobi/blog/2015/05/zelesouris-wireless-vertical-mouse-and-linux/) |
| 20 | 2015.04.05 | pediy_new_digest | [[原创]如何使用OpeniBoot](https://bbs.pediy.com/thread-199324.htm) |
| 6 | 2015.02.27 | maketecheasier | [5G Mobile Internet: The Pros and Cons](https://www.maketecheasier.com/5g-mobile-internet-pros-and-cons/) |
| 7 | 2015.02.26 | labs_ripe | [Today's Mobile Internet](https://labs.ripe.net/Members/gih/todays-mobile-internet) |
| 8 | 2015.02.12 | f5_whitepapers | [TCP Optimization for Service Providers](https://f5.com/resources/white-papers/tcp-optimization-for-service-providers) |
| 5 | 2014.12.25 | freebuf | [极路由(HiWiFi)1S硬件分析与改造研究](http://www.freebuf.com/news/topnews/54862.html) |
| 8 | 2014.11.21 | hypervsir | [Improve Performance for Separating Kernel and User Address Space with Process-Context Identifiers (PCIDs)](http://hypervsir.blogspot.com/2014/11/improve-performance-for-separating.html) |
| 5 | 2014.10.19 | shubs | [Breaking International Voicemail Security via VVM Exploitation](https://shubs.io/breaking-international-voicemail-security-via-vvm-exploitation/) |
| 5 | 2013.10.28 | f5_whitepapers | [The F5 Security for Service Providers Reference Architecture](https://f5.com/resources/white-papers/the-f5-security-for-service-providers-reference-architecture) |
| 8 | 2013.10.25 | troyhunt | [On getting Pineappled at Web Directions South](https://www.troyhunt.com/on-getting-pineappled-at-web-directions/) |
| 7 | 2013.08.08 | mwrinfosecurity_our_thinking | [LTE Security Testing](https://www.mwrinfosecurity.com/our-thinking/lte-security-testing/) |
| 6 | 2013.07.19 | f5_whitepapers | [Simplifying Security for Mobile Networks](https://f5.com/resources/white-papers/simplifying-security-for-mobile-networks) |
| 5 | 2013.07.08 | kudelskisecurity | [Telecom’s walled gardens are falling apart](https://research.kudelskisecurity.com/2013/07/08/telecoms-walled-gardens-are-falling-apart/) |
| 5 | 2013.05.08 | nebelwelt_blog | [FreedomPop Overdrive: first thoughts](http://nebelwelt.net/blog/20130508-freedompop-overdrive-first-thoughts.html) |
| 18 | 2012.10.31 | arbornetworks_blog_insight | [Best of 4G Awards for User Experience & Policy Management](https://www.netscout.com/news/press-release/4g-awards-user-experience) |
| 5 | 2012.09.16 | pediy_new_digest | [None](https://bbs.pediy.com/thread-156036.htm) |
| 5 | 2012.06.12 | ixiacom_blog | [Helping Mobile Operators Flatten The World](https://www.ixiacom.com/company/blog/helping-mobile-operators-flatten-world) |
| 5 | 2012.04.14 | webroot | [Hewlett-Packard shipping malware-infected compact flash cards](https://www.webroot.com/blog/2012/04/14/hewlett-packard-shipping-malware-infected-compact-flash-cards/) |
| 24 | 2011.07.28 | pediy_new_digest | [[原创]让XP用上4G内存,有图有真相,带破解补丁](https://bbs.pediy.com/thread-137830.htm) |
| 5 | 2011.03.10 | daringfireball | [Bending Over Backwards](https://daringfireball.net/2011/03/bending_over_backwards) |
| 61 | 2011.02.10 | cleanbytes | [Is Google.com hacked ? Google Images redirecting to malware(fake antivirus)](http://cleanbytes.net/is-google-com-hacked-google-images-redirecting-to-malwarefake-antivirus) |
| 10 | 2007.04.05 | pediy_new_digest | [[翻译]Pinczakko的AwardBIOS逆向工程指导](https://bbs.pediy.com/thread-42166.htm) |


================================================
FILE: posts/cc/5G_post_sort_by_cc_cnt.md
================================================
5G

None

| 时间 | CC数目 | URL | 标题 |
| ---- | ----- | --- | --- |
| 67 | 2018.10.18 | 4hou_wireless | [5G规范安全性和协议漏洞分析(上篇)](http://www.4hou.com/wireless/13826.html) |
| 48 | 2019.05.07 | freebuf | [“预建未来”聚焦5G安全,2019 C3安全峰会精华回顾](https://www.freebuf.com/fevents/202847.html) |
| 44 | 2017.06.30 | ixiacom_blog | [Ten Myths About 5G - Debunked](https://www.ixiacom.com/company/blog/ten-myths-about-5g-debunked) |
| 42 | 2018.05.16 | maketecheasier | [5G Is on the Horizon. How’s It Shaping Up?](https://www.maketecheasier.com/5g-is-on-the-horizon/) |
| 40 | 2019.02.11 | enterprisetech_networks | [5G Readiness Lags — Here’s What to Do Now](https://www.enterprisetech.com/2019/02/11/5g-readiness-lags-heres-what-to-do-now/) |
| 40 | 2019.02.11 | enterprisetech_networks | [5G Readiness Lags — Here’s What to Do Now](https://www.enterpriseai.news/2019/02/11/5g-readiness-lags-heres-what-to-do-now/) |
| 40 | 2018.10.19 | 4hou_wireless | [5G规范安全性和协议漏洞分析(下篇)](http://www.4hou.com/wireless/13827.html) |
| 38 | 2018.12.20 | cisco_blogs | [Transforming Enterprise Applications with 25G Ethernet SMF](https://blogs.cisco.com/sp/transforming-enterprise-applications-with-25g-ethernet-smf) |
| 36 | 2011.02.10 | cleanbytes | [Is Google.com hacked ? Google Images redirecting to malware(fake antivirus)](http://cleanbytes.net/is-google-com-hacked-google-images-redirecting-to-malwarefake-antivirus) |
| 35 | 2018.09.07 | allaboutcircuits | [Does a Smart City Need to be 5G? Three Cities Implementing 5G Today](https://www.allaboutcircuits.com/news/does-a-smart-city-need-to-be-5g-3-cities-implementing-5g-today/) |
| 34 | 2006.09.20 | daringfireball | [Regarding the Features and Capabilities of the Various Fifth Generation iPods](https://daringfireball.net/2006/09/fifth_generation_ipod_features) |
| 31 | 2017.06.16 | ietf_blog | [5G and Internet Technology](https://www.ietf.org/blog/2017/06/5g-and-internet-technology/) |
| 30 | 2019.05.09 | cisco_blogs | [And That’s a Wrap – Big 5G Event](https://blogs.cisco.com/sp/and-thats-a-wrap-big-5g-event) |
| 30 | 2019.02.26 | cisco_blogs | [Uniting Enterprise Wi-Fi and 5G Cellular with Intent-based Networking](https://blogs.cisco.com/enterprise/uniting-enterprise-wi-fi-and-5g-cellular-with-intent-based-networking) |
| 29 | 2017.07.06 | labs_ripe | [5G and Internet Technology - a Work in Progress](https://labs.ripe.net/Members/mirjam/5g-and-internet-technology-a-work-in-progress) |
| 29 | 2018.09.05 | cisco_blogs | [Leading in 5G: We really are taking 5G to Orkney and more with 5G RuralFirst! (Part 2)](https://blogs.cisco.com/sp/taking-5g-to-orkney-and-more-5gruralfirst) |
| 28 | 2018.01.17 | ixiacom_blog | [Path To 5G](https://www.ixiacom.com/company/blog/path-5g) |
| 26 | 2018.12.04 | cisco_blogs | [Managing 5G at the Data Center Level: First Steps](https://blogs.cisco.com/sp/managing-5g-at-the-data-center-level-first-steps) |
| 26 | 2019.02.26 | cisco_blogs | [What does 5G look like for Industrial IoT?](https://blogs.cisco.com/internet-of-things/what-does-5g-look-like-for-industrial-iot) |
| 26 | 2019.04.17 | daringfireball | [Why Apple Settled With Qualcomm](https://daringfireball.net/2019/04/why_apple_settled_with_qualcomm) |
| 25 | 2019.04.18 | cisco_blogs | [Cisco is Looking Forward to Seeing You at the Big 5G Event](https://blogs.cisco.com/sp/cisco-is-looking-forward-to-seeing-you-at-the-big-5g-event) |
| 24 | 2018.06.28 | cisco_blogs | [Unleash the power of 5G](https://blogs.cisco.com/sp/unleash-the-power-of-5g) |
| 23 | 2018.04.19 | radware_blog | [5G Security Challenges and Ways to Overcome Them](https://blog.radware.com/security/2018/04/overcoming-5g-security-challenges/) |
| 23 | 2018.06.05 | cisco_blogs | [Impact of 5G on Industries](https://blogs.cisco.com/sp/impact-of-5g-on-industries) |
| 23 | 2019.03.19 | cisco_blogs | [Connecting the Unconnected: 5G and Wi-Fi 6 Will Play a Pivotal Role in Bridging the Digital Divide](https://blogs.cisco.com/sp/5g-and-wi-fi-6-bridging-the-digital-divide) |
| 22 | 2017.12.11 | ixiacom_blog | [Are you ready to accelerate the deployment of 5G in EU confidently?](https://www.ixiacom.com/company/blog/are-you-ready-accelerate-deployment-5g-eu-confidently) |
| 22 | 2017.08.31 | rambus_blog | [5G connections to hit 1.4 billion by 2025](https://www.rambus.com/blogs/5g-connections-to-hit-1-4-billion-by-2025/) |
| 22 | 2019.02.21 | cisco_blogs | [New Wireless Frontiers for the Enterprise: 5G, Wi-Fi 6, and CBRS](https://blogs.cisco.com/news/new-wireless-frontiers) |
| 22 | 2018.07.02 | cisco_blogs | [The Five Focus Areas for 5G Security Innovation and Thought Leadership](https://blogs.cisco.com/sp/the-five-focus-areas-for-5g-security-innovation-and-thought-leadership) |
| 22 | 2019.03.14 | cisco_blogs | [The Power of Cisco SD-WAN with 5G](https://blogs.cisco.com/enterprise/the-power-of-cisco-sd-wan-with-5g) |
| 22 | 2015.05.25 | kaspersky_blog | [5G: why do we need it?](https://www.kaspersky.com/blog/why-we-need-5g-mobile-networks/8782/) |
| 21 | 2018.06.07 | cisco_blogs | [5G Experience at Cisco Live Orlando, Florida](https://blogs.cisco.com/sp/5gexpclus) |
| 21 | 2019.02.20 | ncsc | [Security, complexity and Huawei; protecting the UK's telecoms networks](https://www.ncsc.gov.uk/blog-post/security-complexity-and-huawei-protecting-uks-telecoms-networks) |
| 21 | 2019.01.16 | fortinet | [The Security Implications for 5G and IoT](https://www.fortinet.com/blog/industry-trends/the-security-implications-for-5g-and-iot.html) |
| 20 | 2019.05.07 | googleblog_android_developers | [What’s New in Android: Q Beta 3 & More](https://android-developers.googleblog.com/2019/05/whats-new-in-android-q-beta-3-more.html) |
| 20 | 2016.03.22 | 360_anquanke_learning | [5G网络面临的机遇与挑战](https://www.anquanke.com/post/id/83668/) |
| 19 | 2018.12.06 | cisco_blogs | [5G IP Transport – A Strategic Opportunity for Service Providers](https://blogs.cisco.com/sp/5g-ip-transport-a-strategic-opportunity-for-service-providers) |
| 19 | 2018.03.16 | electronicsweekly_viewpoints | [Comment: US and China lead Europe in the 5G race](https://www.electronicsweekly.com/news/comment-us-china-lead-europe-5g-race-2018-03/) |
| 19 | 2016.02.23 | telefonica | [More than smartphones: 5G as a driver for industrial and societal changes](https://www.telefonica.com/en/c/blogs/find_entry?p_l_id=1261536&noSuchEntryRedirect=https%3A%2F%2Fwww.telefonica.com%2Fen%2Fweb%2Fresponsible-business%2Fblog%2Fall%2F-%2Fasset_publisher%2FrSIjYI6PG92f%2Fblog%2Fmore-than-smartphones-5g-as-a-driver-for-industrial-and-societal-changes%3FinheritRedirect%3Dfalse%26redirect%3Dhttps%253A%252F%252Fwww.telefonica.com%252Fen%252Fweb%252Fresponsible-business%252Fblog%252Fall%253Fp_p_id%253D101_INSTANCE_rSIjYI6PG92f%2526p_p_lifecycle%253D0%2526p_p_state%253Dnormal%2526p_p_mode%253Dview%2526p_p_col_id%253Dcolumn-3%2526p_p_col_pos%253D2%2526p_p_col_count%253D3%2526_101_INSTANCE_rSIjYI6PG92f_advancedSearch%253Dfalse%2526_101_INSTANCE_rSIjYI6PG92f_keywords%253D%2526_101_INSTANCE_rSIjYI6PG92f_delta%253D10%2526p_r_p_564233524_resetCur%253Dfalse%2526_101_INSTANCE_rSIjYI6PG92f_cur%253D3%2526_101_INSTANCE_rSIjYI6PG92f_andOperator%253Dtrue&entryId=22803137) |
| 19 | 2016.02.23 | telefonica | [More than smartphones: 5G as a driver for industrial and societal changes](https://www.telefonica.com/en/web/responsible-business/article/-/blogs/more-than-smartphones-5g-as-a-driver-for-industrial-and-societal-changes) |
| 19 | 2016.02.23 | telefonica | [More than smartphones: 5G as a driver for industrial and societal changes](https://www.telefonica.com/en/c/blogs/find_entry?p_l_id=1261536&noSuchEntryRedirect=https%3A%2F%2Fwww.telefonica.com%2Fen%2Fweb%2Fresponsible-business%2Fblog%2Fall%2F-%2Fasset_publisher%2FrSIjYI6PG92f%2Fblog%2Fmore-than-smartphones-5g-as-a-driver-for-industrial-and-societal-changes%3FinheritRedirect%3Dfalse%26redirect%3Dhttps%253A%252F%252Fwww.telefonica.com%252Fen%252Fweb%252Fresponsible-business%252Fblog%252Fall%253Fp_p_id%253D101_INSTANCE_rSIjYI6PG92f%2526p_p_lifecycle%253D0%2526p_p_state%253Dnormal%2526p_p_mode%253Dview%2526p_p_col_id%253Dcolumn-3%2526p_p_col_pos%253D1%2526p_p_col_count%253D2%2526_101_INSTANCE_rSIjYI6PG92f_cur%253D4%2526_101_INSTANCE_rSIjYI6PG92f_keywords%253D%2526_101_INSTANCE_rSIjYI6PG92f_advancedSearch%253Dfalse%2526_101_INSTANCE_rSIjYI6PG92f_delta%253D10%2526p_r_p_564233524_resetCur%253Dfalse%2526_101_INSTANCE_rSIjYI6PG92f_andOperator%253Dtrue&entryId=22803137) |
| 19 | 2016.03.17 | mcafee_securingtomorrow_labs | [5G Networks Pose Cyber Risks, Opportunities](https://securingtomorrow.mcafee.com/mcafee-labs/5g-networks-pose-cyber-risks-opportunities/) |
| 18 | 2019.02.26 | cisco_blogs | [Mobile VNI Forecast 2017-2022: 5G emerges and is here to stay!!](https://blogs.cisco.com/sp/mobile-vni-forecast-2017-2022-5g-emerges) |
| 18 | 2019.04.01 | cisco_blogs | [How 5G Will Make the Network-as-a-Service (NaaS) Model a Reality](https://blogs.cisco.com/sp/how-5g-will-make-the-network-as-a-service-naas-model-a-reality) |
| 18 | 2019.02.19 | cisco_blogs | [5G Gets Top Billing, But Don’t Forget Wi-Fi](https://blogs.cisco.com/sp/5g-gets-top-billing-but-dont-forget-wi-fi) |
| 17 | 2019.05.03 | cisco_blogs | [5G + IoT Tee Up Major Disruption & Business Opportunity](https://blogs.cisco.com/sp/5g-iot-tee-up-major-disruption-business-opportunity) |
| 17 | 2018.03.02 | myriadrf | [OTA: LimeSDR in Space, 4G on the Moon, and More](https://myriadrf.org/blog/ota-limesdr-space-4g-moon/) |
| 16 | 2017.12.08 | myriadrf | [OTA: LimeSDR Minis, Active Cooling, Sunny Interference, and More](https://myriadrf.org/blog/ota-limesdr-minis-active-cooling-sunny-interference/) |
| 16 | 2016.02.27 | maketecheasier | [5G Networks Are Being Tested. What Do You Need to Know About Them?](https://www.maketecheasier.com/5g-networks/) |
| 16 | 2018.06.11 | trendmicro_security | [Attack Vectors in Orbit: The Need for IoT and Satellite Security in the Age of 5G](https://blog.trendmicro.com/trendlabs-security-intelligence/attack-vectors-in-orbit-need-for-satellite-security-in-5g-iot/) |
| 16 | 2018.08.27 | cisco_blogs | [Cisco at Mobile World Congress Americas – 2018](https://blogs.cisco.com/sp/cisco-at-mwca2018) |
| 15 | 2018.09.19 | cisco_blogs | [Outstanding Outcomes at Mobile World Congress- Americas 2018](https://blogs.cisco.com/sp/mwca-post-show-recap) |
| 15 | 2018.02.19 | fortinet | [Fortinet Doubles Down on Mobile Core Security and Managed Security Services at Mobile World Congress](https://www.fortinet.com/blog/business-and-technology/fortinet-doubles-down-on-mobile-core-security-and-managed-security-services-at-mobile-world-congress.html) |
| 15 | 2018.05.31 | allaboutcircuits | [The RF Platformization for the 5G and IoT Designs](https://www.allaboutcircuits.com/news/RF-platformization-5G-IoT-designs/) |
| 15 | 2018.06.08 | cisco_blogs | [5G Security Innovation with Cisco](https://blogs.cisco.com/sp/5g-security-innovation-with-cisco) |
| 14 | 2017.07.04 | maketecheasier | [How to Find the Best WiFi Channel for 5Ghz Frequency](https://www.maketecheasier.com/best-wifi-channel-for-5ghz-frequency/) |
| 14 | 2018.11.26 | arbornetworks_blog_insight | [Virtualization Needs Visibility](https://www.netscout.com/blog/virtualization-needs-visibility) |
| 14 | 2018.07.12 | maketecheasier | [When Do You Think 5G Will Be Readily Available?](https://www.maketecheasier.com/5g-readily-available/) |
| 14 | 2019.04.09 | cisco_blogs | [Why Wi-Fi 6 and 5G Are Different: Physics, Economics, and Human Behavior](https://blogs.cisco.com/wireless/why-wifi6-and-5g-are-different) |
| 14 | 2018.03.23 | maketecheasier | [A Smartphone Battery Lasting a Month? 5G Could Make It So](https://www.maketecheasier.com/5g-smartphone-battery-lasting-a-month/) |
| 14 | 2018.06.22 | myriadrf | [OTA: One-Box Cellular, Finalised 5G, Altair-Powered SDR, and More](https://myriadrf.org/blog/ota-one-box-cellular-finalised-5g-altair-powered-sdr-and-more/) |
| 13 | 2017.08.29 | arbornetworks_blog_insight | [How IoT and Big Video Make the Case for 5G Investments](https://www.netscout.com/news/article/iot-big-video?language_content_entity=en) |
| 13 | 2017.07.12 | 0x48 | [对虚拟机进行磁盘扩容🐥](http://0x48.pw/2017/07/12/0x34/) |
| 13 | 2018.10.22 | cisco_blogs | [Cisco at the India Mobile Congress 2018](https://blogs.cisco.com/sp/cisco-at-the-india-mobile-congress-2018) |
| 13 | 2019.04.09 | cisco_blogs | [5G Will Give Mobile Carriers a Pass into the B2B World](https://blogs.cisco.com/sp/5g-will-give-mobile-carriers-a-pass-into-the-b2b-world) |
| 13 | 2018.07.19 | pediy_new_digest | [[翻译]基于MSIL字节码注入操作.NET程序](https://bbs.pediy.com/thread-230012.htm) |
| 13 | 2017.08.29 | arbornetworks_blog_insight | [How IoT and Big Video Make the Case for 5G Investments](https://www.netscout.com/news/article/iot-big-video) |
| 13 | 2017.06.12 | ietf_blog | [Working Together with 3GPP on 5G](https://www.ietf.org/blog/2017/06/working-together-with-3gpp-on-5g/) |
| 13 | 2018.05.31 | trendmicro_security | [Emerging 5G Technology Could Compromise SIM Card-Dependent IoT Devices on Massive Scale](https://blog.trendmicro.com/trendlabs-security-intelligence/emerging-5g-technology-could-compromise-sim-card-dependent-iot-devices/) |
| 12 | 2019.05.07 | cisco_blogs | [Leading Lights Awards – Industry recognition for Rakuten’s 5G Reimagined Network](https://blogs.cisco.com/sp/leading-lights-awards-industry-recognition-for-rakutens-5g-reimagined-network) |
| 12 | 2019.04.09 | cisco_blogs | [Retail and AR and VR: 5G brings it home!](https://blogs.cisco.com/sp/retail-and-ar-and-vr-5g-brings-it-home) |
| 12 | 2018.08.28 | cisco_blogs | [Traffic Is Building – Here Comes 5G](https://blogs.cisco.com/sp/traffic-is-building) |
| 12 | 2018.10.03 | linuxgizmos | [AT&T releases white box spec for its Linux-based 5G routers](http://linuxgizmos.com/att-releases-white-box-spec-for-its-linux-based-5g-routers/) |
| 12 | 2016.09.29 | radware_blog | [5G Mobile Security Challenge](https://blog.radware.com/security/2016/09/5g-mobile-security-challenge/) |
| 12 | 2019.01.09 | cisco_blogs | [Light Reading Webinar: 5G xHaul Transport Solution – Key for new 5G Services](https://blogs.cisco.com/sp/light-reading-webinar-5g-xhaul-transport-solution-key-for-new-5g-services) |
| 12 | 2018.06.07 | fortinet | [Could 5G Mutate the Threat Landscape?](https://www.fortinet.com/blog/industry-trends/could-5g-mutate-the-threat-landscape-.html) |
| 12 | 2017.12.06 | arbornetworks_blog_insight | [Carriers can transform enterprise infrastructure with 5G](https://www.netscout.com/news/blog/carriers-transform-infrastructure-5g) |
| 12 | 2019.03.08 | freebuf | [研究人员发现4G和5G通信网络中的新型通话拦截和位置追踪漏洞](https://www.freebuf.com/articles/web/196650.html) |
| 12 | 2017.12.06 | arbornetworks_blog_insight | [Carriers can transform enterprise infrastructure with 5G](https://www.netscout.com/news/blog/carriers-transform-infrastructure-5g?language_content_entity=en) |
| 11 | 2018.01.30 | maketecheasier | [Trump Administration Plan to Host Government-Run 5G Network Met with Resistance](https://www.maketecheasier.com/trump-host-government-run-5g/) |
| 11 | 2018.06.29 | cisco_blogs | [Network Services: Bringing it all Together](https://blogs.cisco.com/sp/network-services-bringing-it-all-together) |
| 11 | 2019.05.06 | enterprisetech_storage | [DDN to Acquire Nexenta, SDS Aimed at ‘Holy Trinity’ of AI-5G-IoT](https://www.enterpriseai.news/2019/05/06/ddn-to-acquire-nexenta-sds-aimed-at-holy-trinity-of-ai-5g-iot/) |
| 11 | 2016.10.06 | radware_blog | [APAC Carriers need time to prepare all the changes required for 5G](https://blog.radware.com/security/2016/10/apac-carriers-prepare-changes-required-for-5g/) |
| 11 | 2018.11.26 | securityledger_iot | [Podcast Episode 122: will 5G increase Internet of Things Risk?](https://securityledger.com/2018/11/podcast-episode-122-will-5g-increase-internet-of-things-risk/) |
| 11 | 2015.02.27 | maketecheasier | [5G Mobile Internet: The Pros and Cons](https://www.maketecheasier.com/5g-mobile-internet-pros-and-cons/) |
| 11 | 2017.08.10 | ixiacom_blog | [Like Winter, 5G is Coming](https://www.ixiacom.com/company/blog/winter-5g-coming) |
| 11 | 2018.08.28 | radware_blog | [IoT, 5G Networks and Cybersecurity: A New Atmosphere for Mobile Network Attacks](https://blog.radware.com/security/2018/08/mobile-network-attacks/) |
| 10 | 2017.10.03 | arbornetworks_blog_insight | [Connected Cars Offer Massive IoT Opportunity](https://www.netscout.com/news/article/connected-cars-iot-5g) |
| 10 | 2016.12.08 | f5_whitepapers | [The Internet of Things: Security and Business Impacts on Service Providers](https://f5.com/resources/white-papers/the-internet-of-things-security-and-business-impacts-on-service-providers-23635) |
| 10 | 2019.02.21 | cisco_blogs | [Join Cisco at MWC19](https://blogs.cisco.com/sp/cisco-at-mwc19) |
| 10 | 2018.02.26 | arbornetworks_blog_insight | [Evolution of HTTP and DNS for 5G](https://www.netscout.com/news/article/http-and-dns-5g-world?language_content_entity=en) |
| 10 | 2018.08.17 | arbornetworks_blog_insight | [Virtualization Picks Up the Pace for 5G Crawl, Walk, and Run Deployments](https://www.netscout.com/news/blog/virtualization-picks-pace-5g-crawl-walk-and-run-deployments?language_content_entity=en) |
| 10 | 2016.11.03 | troyhunt | [Ubiquiti all the things: how I finally fixed my dodgy wifi](https://www.troyhunt.com/ubiquiti-all-the-things-how-i-finally-fixed-my-dodgy-wifi/) |
| 10 | 2017.10.02 | rambus_blog | [Living on the edge with 5G and fog computing](https://www.rambus.com/blogs/living-on-the-edge-with-5g-and-fog-computing/) |
| 10 | 2019.02.24 | cisco_blogs | [MWC Series: Ultra Packet Core with CUPS to Deliver 5G Broadband Services for STC](https://blogs.cisco.com/sp/mwc-series-ultra-packet-core-with-cups-to-deliver-5g-broadband-services-for-stc) |
| 10 | 2017.10.03 | arbornetworks_blog_insight | [Connected Cars Offer Massive IoT Opportunity](https://www.netscout.com/news/article/connected-cars-iot-5g?language_content_entity=en) |
| 9 | 2014.03.26 | linuxjournal | [LVM, Demystified](https://www.linuxjournal.com/content/lvm-demystified) |
| 9 | 2019.03.06 | kaspersky_blog | [Mobile World Congress 2019 recap](https://www.kaspersky.com/blog/mwc19-recap/25885/) |
| 9 | 2019.02.14 | youtube | [AMD Radeon VII Benchmarks!!! Google Password Checkup Review. Facebook Alternative!!!](https://www.youtube.com/watch?v=xra1OZPim68) |
| 9 | 2018.02.24 | securityonline | [United States urges Australia: Huawei equipment is not trusted for the construction of 5G networks](https://securityonline.info/united-states-urges-australia-huawei-equipment-is-not-trusted-for-the-construction-of-5g-networks/) |
| 9 | 2016.02.22 | f5_blog | [The perfect storm: Security at massive scale to support the IoT & 4G/5G networks](https://f5.com/about-us/blog/articles/the-perfect-storm-security-at-massive-scale-to-support-the-iot-4g-5g-networks) |
| 9 | 2019.04.30 | cisco_blogs | [Wi-Fi 6 Will Help Power the 5G Era’s Positive Impact on Jobs, Economies, and Peoples’ Quality of Life](https://blogs.cisco.com/gov/wi-fi-6-will-help-power-the-5g-eras-positive-impact-on-jobs-economies-and-peoples-quality-of-life) |
| 9 | 2019.02.20 | cisco_blogs | [New Perspectives on Software-Defined WAN](https://blogs.cisco.com/enterprise/new-perspectives-on-software-defined-wan) |
| 8 | 2019.02.28 | nextplatform | [Arm Sharpens Its Edge With The “Helios” Neoverse E1](https://www.nextplatform.com/2019/02/28/arm-sharpens-its-edge-with-the-helios-neoverse-e1/) |
| 8 | 2017.10.09 | ptsecurity_news | [Positive Technologies launches 4G and 5G security assessment service](https://www.ptsecurity.com/ww-en/about/news/286211/) |
| 8 | 2018.02.08 | insinuator | [TelcoSecDay 2018 – CFP and First talks](https://insinuator.net/2018/02/telcosecday-2018-cfp-and-first-talks/) |
| 8 | 2018.05.08 | cisco_blogs | [Cisco Mobile Packet Core – Automating Mobile Data Into The 5G Future](https://blogs.cisco.com/sp/cisco-mobile-packet-core-automating-mobile-data-into-the-5g-future) |
| 8 | 2019.03.07 | cisco_blogs | [MWC19 Hot Topics: Cisco Customer Experience Recap](https://blogs.cisco.com/services/mwc19-hot-topics-cisco-customer-experience-recap) |
| 8 | 2019.03.08 | cisco_blogs | [Scoring A Hat Trick in Barcelona](https://blogs.cisco.com/sp/scoring-a-hat-trick-in-barcelona) |
| 8 | 2018.12.14 | cisco_blogs | [How Verizon Earned Top Partner Honors in 2018](https://blogs.cisco.com/sp/how-verizon-earned-top-partner-honors-in-2018) |
| 8 | 2013.10.02 | _91ri | [15个实用的Linux find命令示例](http://www.91ri.org/7309.html) |
| 8 | 2019.03.18 | cisco_blogs | [Trusted Infrastructure in a 5G World](https://blogs.cisco.com/sp/trusted-infrastructure-in-a-5g-world) |
| 8 | 2018.05.18 | enterprisetech_networks | [5G Seen as Key to IoT](https://www.enterprisetech.com/2018/05/18/5g-seen-as-key-to-iot/) |
| 8 | 2019.02.21 | radware_blog | [Securing the Customer Experience for 5G and IoT](https://blog.radware.com/serviceprovider/mobilesecurity/2019/02/securing-the-customer-experience-for-5g-and-iot/) |
| 8 | 2018.06.08 | cisco_blogs | [Service Provider Cheat Sheet: Sessions at Cisco Live Orlando](https://blogs.cisco.com/services/service-provider-cheat-sheet-sessions-at-cisco-live-orlando) |
| 8 | 2017.03.10 | ixiacom_blog | [5G-The Wireless Revolution](https://www.ixiacom.com/company/blog/5g-wireless-revolution) |
| 8 | 2018.09.14 | myriadrf | [OTA: CrowdCell Hackathon, LimeSDR Projects, Alphabet’s Loon, and More](https://myriadrf.org/blog/ota-crowdcell-hackathon-limesdr-projects-alphabets-loon-and-more/) |
| 8 | 2017.01.03 | insinuator | [TelcoSecDay 2017 – 2nd Round of Talks](https://insinuator.net/2017/01/telcosecday-2017-2nd-round-of-talks/) |
| 8 | 2019.01.04 | cisco_blogs | [Can the Tactile/Haptic Internet Take AR/VR to New Heights?](https://blogs.cisco.com/sp/can-the-tactile-haptic-internet-take-ar-vr-to-new-heights) |
| 8 | 2018.07.17 | radware_blog | [The Evolving Network Security Environment – Can You Protect Your Customers in a 5G Universe?](https://blog.radware.com/security/2018/07/evolving-network-security-environment-5g/) |
| 7 | 2018.06.13 | cisco_blogs | [ACG Research says “Cisco Continues Market Share Leadership in Mobility”](https://blogs.cisco.com/sp/ciscomktleaderinmobility) |
| 7 | 2018.11.06 | arxiv | [[1811.02293] Defeating the Downgrade Attack on Identity Privacy in 5G](https://arxiv.org/abs/1811.02293) |
| 7 | 2018.04.03 | ixiacom_blog | [Understanding the Self-Driving Car Revolution](https://www.ixiacom.com/company/blog/understanding-self-driving-car-revolution) |
| 7 | 2018.06.27 | arxiv | [[1806.10360] A Formal Analysis of 5G Authentication](https://arxiv.org/abs/1806.10360) |
| 7 | 2017.03.14 | radware_blog | [Mobile World Congress – Is It Over Yet?](https://blog.radware.com/security/2017/03/mobile-world-congress/) |
| 7 | 2018.02.22 | electronicsweekly_viewpoints | [Comment: Perhaps 5G should be built by governments](https://www.electronicsweekly.com/news/products/rf-microwave-optoelectronics/comment-perhaps-5g-built-governments-2018-02/) |
| 7 | 2018.11.16 | arxiv | [[1811.06922] The 5G-AKA Authentication Protocol Privacy](https://arxiv.org/abs/1811.06922) |
| 7 | 2018.10.17 | cisco_blogs | [Cisco and Partners Present a Clock Synchronization for Small Cell DOCSIS Backhaul](https://blogs.cisco.com/sp/small-cell-docsis-backhaul) |
| 7 | 2017.03.28 | arxiv | [[1703.09501] AES and SNOW 3G are Feasible Choices for a 5G Phone from Energy Perspective](https://arxiv.org/abs/1703.09501) |
| 7 | 2018.11.19 | arbornetworks_blog_insight | [Why 5G is Supercharging the SD-WAN Opportunity for Service Providers](https://www.netscout.com/blog/why-5g-supercharging-sd-wan-opportunity-service-providers) |
| 7 | 2018.05.11 | myriadrf | [OTA: Python SNAs and VNAs, High-Frequency Trading, Linux Containers, and More](https://myriadrf.org/blog/ota-python-snas-and-vnas-high-frequency-trading-linux-containers-and-more/) |
| 7 | 2018.10.10 | arbornetworks_blog_insight | [The Expansion of 5G Will Necessitate Service Assurance](https://www.netscout.com/news/blog/5G-expansion-will-need-service-assurance?language_content_entity=en) |
| 7 | 2018.09.18 | arxiv | [[1809.06925] Security and Protocol Exploit Analysis of the 5G Specifications](https://arxiv.org/abs/1809.06925) |
| 7 | 2018.11.19 | arbornetworks_blog_insight | [Why 5G is Supercharging the SD-WAN Opportunity for Service Providers](https://www.netscout.com/news/blog/why-5g-supercharging-sd-wan-opportunity-service-providers) |
| 7 | 2018.11.03 | venus_seebug | [2018 京东 HITB 安全峰会议题 PPT 公布](https://paper.seebug.org/735/) |
| 6 | 2017.03.03 | faire_ca_soi_meme | [Une journée au MWC17](http://faire-ca-soi-meme.fr/avis/2017/03/03/une-journee-au-mwc17/) |
| 6 | 2016.02.22 | f5_blog | [Service Providers and F5's New VIPRION B4450](https://f5.com/about-us/blog/articles/service-providers-and-f5s-new-viprion-b4450-17843) |
| 6 | 2018.12.24 | _2daygeek | [Easy Way to Format USB Disk Drive in Linux Command Line](https://www.2daygeek.com/format-usb-drive-disk-stick-in-linux/) |
| 6 | 2019.02.12 | radware_blog | [Don’t Be A “Dumb” Carrier](https://blog.radware.com/serviceprovider/mobilesecurity/2019/02/dont-be-a-dumb-carrier/) |
| 6 | 2018.09.17 | cisco_blogs | [Cisco at Network Virtualization & SDN Asia 2018](https://blogs.cisco.com/sp/cisco-at-network-virtualization-sdn-asia-2018) |
| 6 | 2018.02.23 | f5_blog | [Unlocking smart core network slicing for IoT and MVNOs](https://f5.com/about-us/blog/articles/unlocking-smart-core-network-slicing-for-iot-and-mvnos-30133) |
| 6 | 2017.08.14 | arxiv | [[1708.04027] Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes](https://arxiv.org/abs/1708.04027) |
| 6 | 2018.04.07 | arxiv | [[1804.02496] A Performance Analysis Model of TCP over Multiple Heterogeneous Paths for 5G Mobile Services](https://arxiv.org/abs/1804.02496) |
| 6 | 2018.02.21 | ixiacom_blog | [Go Big with 5G at Mobile World Congress 2018](https://www.ixiacom.com/company/blog/go-big-5g-mobile-world-congress-2018) |
| 6 | 2018.02.27 | f5_blog | [Don’t take your eye off GTP en route to 5G](https://f5.com/about-us/blog/articles/dont-take-your-eye-off-gtp-en-route-to-5g-30149) |
| 6 | 2018.06.09 | arxiv | [[1806.03406] ReHand: Secure Region-based Fast Handover with User Anonymity for Small Cell Networks in 5G](https://arxiv.org/abs/1806.03406) |
| 6 | 2017.07.26 | ixiacom_blog | [GTP Session: The ABCs of Network Visibility](https://www.ixiacom.com/company/blog/gtp-session-abcs-network-visibility) |
| 6 | 2018.02.26 | arbornetworks_blog_insight | [How Big Data Can Improve Network and Application Intelligence with 5G](https://www.netscout.com/news/article/big-data-intelligence-5g) |
| 6 | 2019.02.24 | cisco_blogs | [MWC Series: Testing 5G services for Manufacturing and Smart Cities Applications with TIM](https://blogs.cisco.com/sp/mwc-series-testing-5g-services-for-manufacturing-and-smart-cities-applications-with-tim) |
| 6 | 2019.02.12 | fairwaves | [XTRX platform is chosen by Airspan for AutoAir: 5G Testbed for Connected and Autonomous Vehicles](https://fairwaves.co/blog/xtrx-airspan-autoair-5g/) |
| 6 | 2018.11.09 | arxiv | [[1811.03741] Mutual Heterogeneous Signcryption Schemes for 5G Network Slicings](https://arxiv.org/abs/1811.03741) |
| 6 | 2017.06.01 | pediy_new_digest | [[翻译]虚拟机逃逸——QEMU的案例分析(三)](https://bbs.pediy.com/thread-218045.htm) |
| 5 | 2013.10.15 | cheney | [How does the go build command work ?](https://dave.cheney.net/2013/10/15/how-does-the-go-build-command-work) |
| 5 | 2018.05.23 | arbornetworks_blog_insight | [Moving Data Center Capabilities to the Edge of the Network](https://www.netscout.com/news/blog/moving-data-center-capabilities-edge-network?language_content_entity=en) |
| 5 | 2019.04.18 | freebuf | [CNCERT发布《2018年我国互联网网络安全态势报告》](https://www.freebuf.com/articles/network/201280.html) |
| 5 | 2018.03.07 | dyn | [MWC 2018: Oracle Dyn Blog](https://dyn.com/blog/mwc-2018-oracle-dyn-blog/) |
| 5 | 2015.02.26 | labs_ripe | [Today's Mobile Internet](https://labs.ripe.net/Members/gih/todays-mobile-internet) |
| 5 | 2019.04.08 | cisco_blogs | [Wi-Fi 6 or 5G – Why Choose One When You Can Have it All?](https://blogs.cisco.com/enterprise/wifi6-or-5g-why-choose) |
| 5 | 2018.12.11 | cisco_blogs | [Adopting Smart Operations to Scale in a 5G World](https://blogs.cisco.com/services/adopting-smart-operations-to-scale-in-a-5g-world) |
| 5 | 2018.06.18 | arbornetworks_blog_insight | [Revamping HTTP and DNS for a Brave New 5G World](https://www.netscout.com/news/blog/revamping-http-and-dns-brave-new-5g-world) |
| 5 | 2018.06.18 | arbornetworks_blog_insight | [Revamping HTTP and DNS for a Brave New 5G World](https://www.netscout.com/news/blog/revamping-http-and-dns-brave-new-5g-world?language_content_entity=en) |
| 5 | 2018.05.25 | myriadrf | [OTA: LimeSDR Shipping, 6G Cellular, New Osmocom, and More](https://myriadrf.org/blog/ota-limesdr-shipping-6g-cellular-new-osmocom-and-more/) |
| 5 | 2017.07.10 | arxiv | [[1708.04571] A Machine Learning Based Intrusion Detection System for Software Defined 5G Network](https://arxiv.org/abs/1708.04571) |
| 5 | 2018.02.16 | myriadrf | [OTA: LimeSDR GPIO, Mini Give-away, SpaceX Sats and More](https://myriadrf.org/blog/ota-limesdr-gpio-mini-give-away-spacex-sats/) |
| 5 | 2018.05.23 | arbornetworks_blog_insight | [Moving Data Center Capabilities to the Edge of the Network](https://www.netscout.com/news/blog/moving-data-center-capabilities-edge-network) |
| 5 | 2017.05.11 | 4hou_technology | [华硕路由器被发现多个CVE漏洞(CVE-2017-5891,CVE-2017-5892)](http://www.4hou.com/technology/4710.html) |
| 5 | 2018.09.13 | arxiv | [[1809.04966] Real-Time Lightweight Chaotic Encryption for 5G IoT Enabled Lip-Reading Driven Secure Hearing-Aid](https://arxiv.org/abs/1809.04966) |
| 5 | 2018.02.19 | nextplatform | [Pushed To The Edge](https://www.nextplatform.com/2018/02/19/pushed-to-the-edge/) |
| 5 | 2017.07.21 | myriadrf | [OTA: LimeNET Success, LimeSDR Guides, Bluetooth Mesh, and More](https://myriadrf.org/blog/ota-limenet-success-limesdr-guides-bluetooth-mesh/) |
| 5 | 2017.12.22 | myriadrf | [OTA: RAN Competition, ScratchRadio Updates, a Ham Watch, and More](https://myriadrf.org/blog/ota-ran-competition-scratchradio-updates-ham-watch/) |
| 5 | 2018.06.11 | cisco_blogs | [The Cable Story, Part 3: How to Monetize the Pipe](https://blogs.cisco.com/sp/cablestory3_monetizepipe) |
| 5 | 2019.02.28 | cisco_blogs | [MWC Series: Readying Fastweb’s Network for the 5G Era](https://blogs.cisco.com/sp/mwc-series-readying-fastwebs-network-for-the-5g-era) |
| 5 | 2019.02.01 | fortinet | [Fortinet at Mobile World Congress 2019](https://www.fortinet.com/blog/business-and-technology/fortinet-at-mobile-world-congress-2019.html) |
| 5 | 2018.12.11 | cisco_blogs | [Vodafone-Netherlands Ziggo takes RAN Automation to the Next Level of Excellence](https://blogs.cisco.com/sp/vodafone-netherlands-ziggo-ran-automation) |
| 5 | 2015.07.24 | kaspersky_blog | [LTE-U: on the way to 5G](https://www.kaspersky.com/blog/lte-unlicensed-explanation/9402/) |
| 5 | 2019.04.15 | cisco_blogs | [Transforming the future of mobile broadband in the Philippines](https://blogs.cisco.com/sp/transforming-the-future-of-mobile-broadband-in-the-philippines) |
| 5 | 2018.05.01 | infosecurityeurope_blog | [Threats to the IoT won’t change without privacy by design](https://blogs.infosecurityeurope.com/threats-to-the-iot-wont-change-without-privacy-by-design/) |
| 5 | 2018.11.14 | labs_ripe | [IGF 2018 Liveblog](https://labs.ripe.net/Members/gergana_petrova/igf-2018-liveblog) |
| 5 | 2015.09.22 | maketecheasier | [What LVM Is and How to Set It Up in Ubuntu](https://www.maketecheasier.com/lvm-set-up-ubuntu/) |
| 5 | 2018.06.06 | linuxgizmos | [Intel and AMD reveal new designs at Computex](http://linuxgizmos.com/intel-and-amd-reveal-new-designs-at-computex/) |
| 5 | 2018.02.05 | arxiv | [[1802.01719] Cross-Layer Authentication Protocol Design for Ultra-Dense 5G HetNets](https://arxiv.org/abs/1802.01719) |
| 5 | 2019.03.23 | 4hou_web | [从委内瑞拉的电力攻击事件中,预测一下针对物联网和5G的电信犯罪](https://www.4hou.com/web/16940.html) |
| 5 | 2017.08.22 | rambus_blog | [Wireless VR to strain data networks](https://www.rambus.com/blogs/wireless-vr-to-strain-data-networks/) |


================================================
FILE: posts/cc/5G_post_sort_by_time.md
================================================
5G

None

| 时间 | CC数目 | URL | 标题 |
| ---- | ----- | --- | --- |
| 30 | 2019.05.09 | cisco_blogs | [And That’s a Wrap – Big 5G Event](https://blogs.cisco.com/sp/and-thats-a-wrap-big-5g-event) |
| 12 | 2019.05.07 | cisco_blogs | [Leading Lights Awards – Industry recognition for Rakuten’s 5G Reimagined Network](https://blogs.cisco.com/sp/leading-lights-awards-industry-recognition-for-rakutens-5g-reimagined-network) |
| 48 | 2019.05.07 | freebuf | [“预建未来”聚焦5G安全,2019 C3安全峰会精华回顾](https://www.freebuf.com/fevents/202847.html) |
| 20 | 2019.05.07 | googleblog_android_developers | [What’s New in Android: Q Beta 3 & More](https://android-developers.googleblog.com/2019/05/whats-new-in-android-q-beta-3-more.html) |
| 11 | 2019.05.06 | enterprisetech_storage | [DDN to Acquire Nexenta, SDS Aimed at ‘Holy Trinity’ of AI-5G-IoT](https://www.enterpriseai.news/2019/05/06/ddn-to-acquire-nexenta-sds-aimed-at-holy-trinity-of-ai-5g-iot/) |
| 17 | 2019.05.03 | cisco_blogs | [5G + IoT Tee Up Major Disruption & Business Opportunity](https://blogs.cisco.com/sp/5g-iot-tee-up-major-disruption-business-opportunity) |
| 9 | 2019.04.30 | cisco_blogs | [Wi-Fi 6 Will Help Power the 5G Era’s Positive Impact on Jobs, Economies, and Peoples’ Quality of Life](https://blogs.cisco.com/gov/wi-fi-6-will-help-power-the-5g-eras-positive-impact-on-jobs-economies-and-peoples-quality-of-life) |
| 5 | 2019.04.18 | freebuf | [CNCERT发布《2018年我国互联网网络安全态势报告》](https://www.freebuf.com/articles/network/201280.html) |
| 25 | 2019.04.18 | cisco_blogs | [Cisco is Looking Forward to Seeing You at the Big 5G Event](https://blogs.cisco.com/sp/cisco-is-looking-forward-to-seeing-you-at-the-big-5g-event) |
| 26 | 2019.04.17 | daringfireball | [Why Apple Settled With Qualcomm](https://daringfireball.net/2019/04/why_apple_settled_with_qualcomm) |
| 5 | 2019.04.15 | cisco_blogs | [Transforming the future of mobile broadband in the Philippines](https://blogs.cisco.com/sp/transforming-the-future-of-mobile-broadband-in-the-philippines) |
| 14 | 2019.04.09 | cisco_blogs | [Why Wi-Fi 6 and 5G Are Different: Physics, Economics, and Human Behavior](https://blogs.cisco.com/wireless/why-wifi6-and-5g-are-different) |
| 13 | 2019.04.09 | cisco_blogs | [5G Will Give Mobile Carriers a Pass into the B2B World](https://blogs.cisco.com/sp/5g-will-give-mobile-carriers-a-pass-into-the-b2b-world) |
| 12 | 2019.04.09 | cisco_blogs | [Retail and AR and VR: 5G brings it home!](https://blogs.cisco.com/sp/retail-and-ar-and-vr-5g-brings-it-home) |
| 5 | 2019.04.08 | cisco_blogs | [Wi-Fi 6 or 5G – Why Choose One When You Can Have it All?](https://blogs.cisco.com/enterprise/wifi6-or-5g-why-choose) |
| 18 | 2019.04.01 | cisco_blogs | [How 5G Will Make the Network-as-a-Service (NaaS) Model a Reality](https://blogs.cisco.com/sp/how-5g-will-make-the-network-as-a-service-naas-model-a-reality) |
| 5 | 2019.03.23 | 4hou_web | [从委内瑞拉的电力攻击事件中,预测一下针对物联网和5G的电信犯罪](https://www.4hou.com/web/16940.html) |
| 23 | 2019.03.19 | cisco_blogs | [Connecting the Unconnected: 5G and Wi-Fi 6 Will Play a Pivotal Role in Bridging the Digital Divide](https://blogs.cisco.com/sp/5g-and-wi-fi-6-bridging-the-digital-divide) |
| 8 | 2019.03.18 | cisco_blogs | [Trusted Infrastructure in a 5G World](https://blogs.cisco.com/sp/trusted-infrastructure-in-a-5g-world) |
| 22 | 2019.03.14 | cisco_blogs | [The Power of Cisco SD-WAN with 5G](https://blogs.cisco.com/enterprise/the-power-of-cisco-sd-wan-with-5g) |
| 8 | 2019.03.08 | cisco_blogs | [Scoring A Hat Trick in Barcelona](https://blogs.cisco.com/sp/scoring-a-hat-trick-in-barcelona) |
| 12 | 2019.03.08 | freebuf | [研究人员发现4G和5G通信网络中的新型通话拦截和位置追踪漏洞](https://www.freebuf.com/articles/web/196650.html) |
| 8 | 2019.03.07 | cisco_blogs | [MWC19 Hot Topics: Cisco Customer Experience Recap](https://blogs.cisco.com/services/mwc19-hot-topics-cisco-customer-experience-recap) |
| 9 | 2019.03.06 | kaspersky_blog | [Mobile World Congress 2019 recap](https://www.kaspersky.com/blog/mwc19-recap/25885/) |
| 8 | 2019.02.28 | nextplatform | [Arm Sharpens Its Edge With The “Helios” Neoverse E1](https://www.nextplatform.com/2019/02/28/arm-sharpens-its-edge-with-the-helios-neoverse-e1/) |
| 5 | 2019.02.28 | cisco_blogs | [MWC Series: Readying Fastweb’s Network for the 5G Era](https://blogs.cisco.com/sp/mwc-series-readying-fastwebs-network-for-the-5g-era) |
| 26 | 2019.02.26 | cisco_blogs | [What does 5G look like for Industrial IoT?](https://blogs.cisco.com/internet-of-things/what-does-5g-look-like-for-industrial-iot) |
| 30 | 2019.02.26 | cisco_blogs | [Uniting Enterprise Wi-Fi and 5G Cellular with Intent-based Networking](https://blogs.cisco.com/enterprise/uniting-enterprise-wi-fi-and-5g-cellular-with-intent-based-networking) |
| 18 | 2019.02.26 | cisco_blogs | [Mobile VNI Forecast 2017-2022: 5G emerges and is here to stay!!](https://blogs.cisco.com/sp/mobile-vni-forecast-2017-2022-5g-emerges) |
| 10 | 2019.02.24 | cisco_blogs | [MWC Series: Ultra Packet Core with CUPS to Deliver 5G Broadband Services for STC](https://blogs.cisco.com/sp/mwc-series-ultra-packet-core-with-cups-to-deliver-5g-broadband-services-for-stc) |
| 6 | 2019.02.24 | cisco_blogs | [MWC Series: Testing 5G services for Manufacturing and Smart Cities Applications with TIM](https://blogs.cisco.com/sp/mwc-series-testing-5g-services-for-manufacturing-and-smart-cities-applications-with-tim) |
| 8 | 2019.02.21 | radware_blog | [Securing the Customer Experience for 5G and IoT](https://blog.radware.com/serviceprovider/mobilesecurity/2019/02/securing-the-customer-experience-for-5g-and-iot/) |
| 10 | 2019.02.21 | cisco_blogs | [Join Cisco at MWC19](https://blogs.cisco.com/sp/cisco-at-mwc19) |
| 22 | 2019.02.21 | cisco_blogs | [New Wireless Frontiers for the Enterprise: 5G, Wi-Fi 6, and CBRS](https://blogs.cisco.com/news/new-wireless-frontiers) |
| 21 | 2019.02.20 | ncsc | [Security, complexity and Huawei; protecting the UK's telecoms networks](https://www.ncsc.gov.uk/blog-post/security-complexity-and-huawei-protecting-uks-telecoms-networks) |
| 9 | 2019.02.20 | cisco_blogs | [New Perspectives on Software-Defined WAN](https://blogs.cisco.com/enterprise/new-perspectives-on-software-defined-wan) |
| 18 | 2019.02.19 | cisco_blogs | [5G Gets Top Billing, But Don’t Forget Wi-Fi](https://blogs.cisco.com/sp/5g-gets-top-billing-but-dont-forget-wi-fi) |
| 9 | 2019.02.14 | youtube | [AMD Radeon VII Benchmarks!!! Google Password Checkup Review. Facebook Alternative!!!](https://www.youtube.com/watch?v=xra1OZPim68) |
| 6 | 2019.02.12 | radware_blog | [Don’t Be A “Dumb” Carrier](https://blog.radware.com/serviceprovider/mobilesecurity/2019/02/dont-be-a-dumb-carrier/) |
| 6 | 2019.02.12 | fairwaves | [XTRX platform is chosen by Airspan for AutoAir: 5G Testbed for Connected and Autonomous Vehicles](https://fairwaves.co/blog/xtrx-airspan-autoair-5g/) |
| 40 | 2019.02.11 | enterprisetech_networks | [5G Readiness Lags — Here’s What to Do Now](https://www.enterpriseai.news/2019/02/11/5g-readiness-lags-heres-what-to-do-now/) |
| 40 | 2019.02.11 | enterprisetech_networks | [5G Readiness Lags — Here’s What to Do Now](https://www.enterprisetech.com/2019/02/11/5g-readiness-lags-heres-what-to-do-now/) |
| 5 | 2019.02.01 | fortinet | [Fortinet at Mobile World Congress 2019](https://www.fortinet.com/blog/business-and-technology/fortinet-at-mobile-world-congress-2019.html) |
| 21 | 2019.01.16 | fortinet | [The Security Implications for 5G and IoT](https://www.fortinet.com/blog/industry-trends/the-security-implications-for-5g-and-iot.html) |
| 12 | 2019.01.09 | cisco_blogs | [Light Reading Webinar: 5G xHaul Transport Solution – Key for new 5G Services](https://blogs.cisco.com/sp/light-reading-webinar-5g-xhaul-transport-solution-key-for-new-5g-services) |
| 8 | 2019.01.04 | cisco_blogs | [Can the Tactile/Haptic Internet Take AR/VR to New Heights?](https://blogs.cisco.com/sp/can-the-tactile-haptic-internet-take-ar-vr-to-new-heights) |
| 6 | 2018.12.24 | _2daygeek | [Easy Way to Format USB Disk Drive in Linux Command Line](https://www.2daygeek.com/format-usb-drive-disk-stick-in-linux/) |
| 38 | 2018.12.20 | cisco_blogs | [Transforming Enterprise Applications with 25G Ethernet SMF](https://blogs.cisco.com/sp/transforming-enterprise-applications-with-25g-ethernet-smf) |
| 8 | 2018.12.14 | cisco_blogs | [How Verizon Earned Top Partner Honors in 2018](https://blogs.cisco.com/sp/how-verizon-earned-top-partner-honors-in-2018) |
| 5 | 2018.12.11 | cisco_blogs | [Vodafone-Netherlands Ziggo takes RAN Automation to the Next Level of Excellence](https://blogs.cisco.com/sp/vodafone-netherlands-ziggo-ran-automation) |
| 5 | 2018.12.11 | cisco_blogs | [Adopting Smart Operations to Scale in a 5G World](https://blogs.cisco.com/services/adopting-smart-operations-to-scale-in-a-5g-world) |
| 19 | 2018.12.06 | cisco_blogs | [5G IP Transport – A Strategic Opportunity for Service Providers](https://blogs.cisco.com/sp/5g-ip-transport-a-strategic-opportunity-for-service-providers) |
| 26 | 2018.12.04 | cisco_blogs | [Managing 5G at the Data Center Level: First Steps](https://blogs.cisco.com/sp/managing-5g-at-the-data-center-level-first-steps) |
| 11 | 2018.11.26 | securityledger_iot | [Podcast Episode 122: will 5G increase Internet of Things Risk?](https://securityledger.com/2018/11/podcast-episode-122-will-5g-increase-internet-of-things-risk/) |
| 14 | 2018.11.26 | arbornetworks_blog_insight | [Virtualization Needs Visibility](https://www.netscout.com/blog/virtualization-needs-visibility) |
| 7 | 2018.11.19 | arbornetworks_blog_insight | [Why 5G is Supercharging the SD-WAN Opportunity for Service Providers](https://www.netscout.com/blog/why-5g-supercharging-sd-wan-opportunity-service-providers) |
| 7 | 2018.11.19 | arbornetworks_blog_insight | [Why 5G is Supercharging the SD-WAN Opportunity for Service Providers](https://www.netscout.com/news/blog/why-5g-supercharging-sd-wan-opportunity-service-providers) |
| 7 | 2018.11.16 | arxiv | [[1811.06922] The 5G-AKA Authentication Protocol Privacy](https://arxiv.org/abs/1811.06922) |
| 5 | 2018.11.14 | labs_ripe | [IGF 2018 Liveblog](https://labs.ripe.net/Members/gergana_petrova/igf-2018-liveblog) |
| 6 | 2018.11.09 | arxiv | [[1811.03741] Mutual Heterogeneous Signcryption Schemes for 5G Network Slicings](https://arxiv.org/abs/1811.03741) |
| 7 | 2018.11.06 | arxiv | [[1811.02293] Defeating the Downgrade Attack on Identity Privacy in 5G](https://arxiv.org/abs/1811.02293) |
| 7 | 2018.11.03 | venus_seebug | [2018 京东 HITB 安全峰会议题 PPT 公布](https://paper.seebug.org/735/) |
| 13 | 2018.10.22 | cisco_blogs | [Cisco at the India Mobile Congress 2018](https://blogs.cisco.com/sp/cisco-at-the-india-mobile-congress-2018) |
| 40 | 2018.10.19 | 4hou_wireless | [5G规范安全性和协议漏洞分析(下篇)](http://www.4hou.com/wireless/13827.html) |
| 67 | 2018.10.18 | 4hou_wireless | [5G规范安全性和协议漏洞分析(上篇)](http://www.4hou.com/wireless/13826.html) |
| 7 | 2018.10.17 | cisco_blogs | [Cisco and Partners Present a Clock Synchronization for Small Cell DOCSIS Backhaul](https://blogs.cisco.com/sp/small-cell-docsis-backhaul) |
| 7 | 2018.10.10 | arbornetworks_blog_insight | [The Expansion of 5G Will Necessitate Service Assurance](https://www.netscout.com/news/blog/5G-expansion-will-need-service-assurance?language_content_entity=en) |
| 12 | 2018.10.03 | linuxgizmos | [AT&T releases white box spec for its Linux-based 5G routers](http://linuxgizmos.com/att-releases-white-box-spec-for-its-linux-based-5g-routers/) |
| 15 | 2018.09.19 | cisco_blogs | [Outstanding Outcomes at Mobile World Congress- Americas 2018](https://blogs.cisco.com/sp/mwca-post-show-recap) |
| 7 | 2018.09.18 | arxiv | [[1809.06925] Security and Protocol Exploit Analysis of the 5G Specifications](https://arxiv.org/abs/1809.06925) |
| 6 | 2018.09.17 | cisco_blogs | [Cisco at Network Virtualization & SDN Asia 2018](https://blogs.cisco.com/sp/cisco-at-network-virtualization-sdn-asia-2018) |
| 8 | 2018.09.14 | myriadrf | [OTA: CrowdCell Hackathon, LimeSDR Projects, Alphabet’s Loon, and More](https://myriadrf.org/blog/ota-crowdcell-hackathon-limesdr-projects-alphabets-loon-and-more/) |
| 5 | 2018.09.13 | arxiv | [[1809.04966] Real-Time Lightweight Chaotic Encryption for 5G IoT Enabled Lip-Reading Driven Secure Hearing-Aid](https://arxiv.org/abs/1809.04966) |
| 35 | 2018.09.07 | allaboutcircuits | [Does a Smart City Need to be 5G? Three Cities Implementing 5G Today](https://www.allaboutcircuits.com/news/does-a-smart-city-need-to-be-5g-3-cities-implementing-5g-today/) |
| 29 | 2018.09.05 | cisco_blogs | [Leading in 5G: We really are taking 5G to Orkney and more with 5G RuralFirst! (Part 2)](https://blogs.cisco.com/sp/taking-5g-to-orkney-and-more-5gruralfirst) |
| 11 | 2018.08.28 | radware_blog | [IoT, 5G Networks and Cybersecurity: A New Atmosphere for Mobile Network Attacks](https://blog.radware.com/security/2018/08/mobile-network-attacks/) |
| 12 | 2018.08.28 | cisco_blogs | [Traffic Is Building – Here Comes 5G](https://blogs.cisco.com/sp/traffic-is-building) |
| 16 | 2018.08.27 | cisco_blogs | [Cisco at Mobile World Congress Americas – 2018](https://blogs.cisco.com/sp/cisco-at-mwca2018) |
| 10 | 2018.08.17 | arbornetworks_blog_insight | [Virtualization Picks Up the Pace for 5G Crawl, Walk, and Run Deployments](https://www.netscout.com/news/blog/virtualization-picks-pace-5g-crawl-walk-and-run-deployments?language_content_entity=en) |
| 13 | 2018.07.19 | pediy_new_digest | [[翻译]基于MSIL字节码注入操作.NET程序](https://bbs.pediy.com/thread-230012.htm) |
| 8 | 2018.07.17 | radware_blog | [The Evolving Network Security Environment – Can You Protect Your Customers in a 5G Universe?](https://blog.radware.com/security/2018/07/evolving-network-security-environment-5g/) |
| 14 | 2018.07.12 | maketecheasier | [When Do You Think 5G Will Be Readily Available?](https://www.maketecheasier.com/5g-readily-available/) |
| 22 | 2018.07.02 | cisco_blogs | [The Five Focus Areas for 5G Security Innovation and Thought Leadership](https://blogs.cisco.com/sp/the-five-focus-areas-for-5g-security-innovation-and-thought-leadership) |
| 11 | 2018.06.29 | cisco_blogs | [Network Services: Bringing it all Together](https://blogs.cisco.com/sp/network-services-bringing-it-all-together) |
| 24 | 2018.06.28 | cisco_blogs | [Unleash the power of 5G](https://blogs.cisco.com/sp/unleash-the-power-of-5g) |
| 7 | 2018.06.27 | arxiv | [[1806.10360] A Formal Analysis of 5G Authentication](https://arxiv.org/abs/1806.10360) |
| 14 | 2018.06.22 | myriadrf | [OTA: One-Box Cellular, Finalised 5G, Altair-Powered SDR, and More](https://myriadrf.org/blog/ota-one-box-cellular-finalised-5g-altair-powered-sdr-and-more/) |
| 5 | 2018.06.18 | arbornetworks_blog_insight | [Revamping HTTP and DNS for a Brave New 5G World](https://www.netscout.com/news/blog/revamping-http-and-dns-brave-new-5g-world) |
| 5 | 2018.06.18 | arbornetworks_blog_insight | [Revamping HTTP and DNS for a Brave New 5G World](https://www.netscout.com/news/blog/revamping-http-and-dns-brave-new-5g-world?language_content_entity=en) |
| 7 | 2018.06.13 | cisco_blogs | [ACG Research says “Cisco Continues Market Share Leadership in Mobility”](https://blogs.cisco.com/sp/ciscomktleaderinmobility) |
| 16 | 2018.06.11 | trendmicro_security | [Attack Vectors in Orbit: The Need for IoT and Satellite Security in the Age of 5G](https://blog.trendmicro.com/trendlabs-security-intelligence/attack-vectors-in-orbit-need-for-satellite-security-in-5g-iot/) |
| 5 | 2018.06.11 | cisco_blogs | [The Cable Story, Part 3: How to Monetize the Pipe](https://blogs.cisco.com/sp/cablestory3_monetizepipe) |
| 6 | 2018.06.09 | arxiv | [[1806.03406] ReHand: Secure Region-based Fast Handover with User Anonymity for Small Cell Networks in 5G](https://arxiv.org/abs/1806.03406) |
| 15 | 2018.06.08 | cisco_blogs | [5G Security Innovation with Cisco](https://blogs.cisco.com/sp/5g-security-innovation-with-cisco) |
| 8 | 2018.06.08 | cisco_blogs | [Service Provider Cheat Sheet: Sessions at Cisco Live Orlando](https://blogs.cisco.com/services/service-provider-cheat-sheet-sessions-at-cisco-live-orlando) |
| 21 | 2018.06.07 | cisco_blogs | [5G Experience at Cisco Live Orlando, Florida](https://blogs.cisco.com/sp/5gexpclus) |
| 12 | 2018.06.07 | fortinet | [Could 5G Mutate the Threat Landscape?](https://www.fortinet.com/blog/industry-trends/could-5g-mutate-the-threat-landscape-.html) |
| 5 | 2018.06.06 | linuxgizmos | [Intel and AMD reveal new designs at Computex](http://linuxgizmos.com/intel-and-amd-reveal-new-designs-at-computex/) |
| 23 | 2018.06.05 | cisco_blogs | [Impact of 5G on Industries](https://blogs.cisco.com/sp/impact-of-5g-on-industries) |
| 15 | 2018.05.31 | allaboutcircuits | [The RF Platformization for the 5G and IoT Designs](https://www.allaboutcircuits.com/news/RF-platformization-5G-IoT-designs/) |
| 13 | 2018.05.31 | trendmicro_security | [Emerging 5G Technology Could Compromise SIM Card-Dependent IoT Devices on Massive Scale](https://blog.trendmicro.com/trendlabs-security-intelligence/emerging-5g-technology-could-compromise-sim-card-dependent-iot-devices/) |
| 5 | 2018.05.25 | myriadrf | [OTA: LimeSDR Shipping, 6G Cellular, New Osmocom, and More](https://myriadrf.org/blog/ota-limesdr-shipping-6g-cellular-new-osmocom-and-more/) |
| 5 | 2018.05.23 | arbornetworks_blog_insight | [Moving Data Center Capabilities to the Edge of the Network](https://www.netscout.com/news/blog/moving-data-center-capabilities-edge-network) |
| 5 | 2018.05.23 | arbornetworks_blog_insight | [Moving Data Center Capabilities to the Edge of the Network](https://www.netscout.com/news/blog/moving-data-center-capabilities-edge-network?language_content_entity=en) |
| 8 | 2018.05.18 | enterprisetech_networks | [5G Seen as Key to IoT](https://www.enterprisetech.com/2018/05/18/5g-seen-as-key-to-iot/) |
| 42 | 2018.05.16 | maketecheasier | [5G Is on the Horizon. How’s It Shaping Up?](https://www.maketecheasier.com/5g-is-on-the-horizon/) |
| 7 | 2018.05.11 | myriadrf | [OTA: Python SNAs and VNAs, High-Frequency Trading, Linux Containers, and More](https://myriadrf.org/blog/ota-python-snas-and-vnas-high-frequency-trading-linux-containers-and-more/) |
| 8 | 2018.05.08 | cisco_blogs | [Cisco Mobile Packet Core – Automating Mobile Data Into The 5G Future](https://blogs.cisco.com/sp/cisco-mobile-packet-core-automating-mobile-data-into-the-5g-future) |
| 5 | 2018.05.01 | infosecurityeurope_blog | [Threats to the IoT won’t change without privacy by design](https://blogs.infosecurityeurope.com/threats-to-the-iot-wont-change-without-privacy-by-design/) |
| 23 | 2018.04.19 | radware_blog | [5G Security Challenges and Ways to Overcome Them](https://blog.radware.com/security/2018/04/overcoming-5g-security-challenges/) |
| 6 | 2018.04.07 | arxiv | [[1804.02496] A Performance Analysis Model of TCP over Multiple Heterogeneous Paths for 5G Mobile Services](https://arxiv.org/abs/1804.02496) |
| 7 | 2018.04.03 | ixiacom_blog | [Understanding the Self-Driving Car Revolution](https://www.ixiacom.com/company/blog/understanding-self-driving-car-revolution) |
| 14 | 2018.03.23 | maketecheasier | [A Smartphone Battery Lasting a Month? 5G Could Make It So](https://www.maketecheasier.com/5g-smartphone-battery-lasting-a-month/) |
| 19 | 2018.03.16 | electronicsweekly_viewpoints | [Comment: US and China lead Europe in the 5G race](https://www.electronicsweekly.com/news/comment-us-china-lead-europe-5g-race-2018-03/) |
| 5 | 2018.03.07 | dyn | [MWC 2018: Oracle Dyn Blog](https://dyn.com/blog/mwc-2018-oracle-dyn-blog/) |
| 17 | 2018.03.02 | myriadrf | [OTA: LimeSDR in Space, 4G on the Moon, and More](https://myriadrf.org/blog/ota-limesdr-space-4g-moon/) |
| 6 | 2018.02.27 | f5_blog | [Don’t take your eye off GTP en route to 5G](https://f5.com/about-us/blog/articles/dont-take-your-eye-off-gtp-en-route-to-5g-30149) |
| 6 | 2018.02.26 | arbornetworks_blog_insight | [How Big Data Can Improve Network and Application Intelligence with 5G](https://www.netscout.com/news/article/big-data-intelligence-5g) |
| 10 | 2018.02.26 | arbornetworks_blog_insight | [Evolution of HTTP and DNS for 5G](https://www.netscout.com/news/article/http-and-dns-5g-world?language_content_entity=en) |
| 9 | 2018.02.24 | securityonline | [United States urges Australia: Huawei equipment is not trusted for the construction of 5G networks](https://securityonline.info/united-states-urges-australia-huawei-equipment-is-not-trusted-for-the-construction-of-5g-networks/) |
| 6 | 2018.02.23 | f5_blog | [Unlocking smart core network slicing for IoT and MVNOs](https://f5.com/about-us/blog/articles/unlocking-smart-core-network-slicing-for-iot-and-mvnos-30133) |
| 7 | 2018.02.22 | electronicsweekly_viewpoints | [Comment: Perhaps 5G should be built by governments](https://www.electronicsweekly.com/news/products/rf-microwave-optoelectronics/comment-perhaps-5g-built-governments-2018-02/) |
| 6 | 2018.02.21 | ixiacom_blog | [Go Big with 5G at Mobile World Congress 2018](https://www.ixiacom.com/company/blog/go-big-5g-mobile-world-congress-2018) |
| 5 | 2018.02.19 | nextplatform | [Pushed To The Edge](https://www.nextplatform.com/2018/02/19/pushed-to-the-edge/) |
| 15 | 2018.02.19 | fortinet | [Fortinet Doubles Down on Mobile Core Security and Managed Security Services at Mobile World Congress](https://www.fortinet.com/blog/business-and-technology/fortinet-doubles-down-on-mobile-core-security-and-managed-security-services-at-mobile-world-congress.html) |
| 5 | 2018.02.16 | myriadrf | [OTA: LimeSDR GPIO, Mini Give-away, SpaceX Sats and More](https://myriadrf.org/blog/ota-limesdr-gpio-mini-give-away-spacex-sats/) |
| 8 | 2018.02.08 | insinuator | [TelcoSecDay 2018 – CFP and First talks](https://insinuator.net/2018/02/telcosecday-2018-cfp-and-first-talks/) |
| 5 | 2018.02.05 | arxiv | [[1802.01719] Cross-Layer Authentication Protocol Design for Ultra-Dense 5G HetNets](https://arxiv.org/abs/1802.01719) |
| 11 | 2018.01.30 | maketecheasier | [Trump Administration Plan to Host Government-Run 5G Network Met with Resistance](https://www.maketecheasier.com/trump-host-government-run-5g/) |
| 28 | 2018.01.17 | ixiacom_blog | [Path To 5G](https://www.ixiacom.com/company/blog/path-5g) |
| 5 | 2017.12.22 | myriadrf | [OTA: RAN Competition, ScratchRadio Updates, a Ham Watch, and More](https://myriadrf.org/blog/ota-ran-competition-scratchradio-updates-ham-watch/) |
| 22 | 2017.12.11 | ixiacom_blog | [Are you ready to accelerate the deployment of 5G in EU confidently?](https://www.ixiacom.com/company/blog/are-you-ready-accelerate-deployment-5g-eu-confidently) |
| 16 | 2017.12.08 | myriadrf | [OTA: LimeSDR Minis, Active Cooling, Sunny Interference, and More](https://myriadrf.org/blog/ota-limesdr-minis-active-cooling-sunny-interference/) |
| 12 | 2017.12.06 | arbornetworks_blog_insight | [Carriers can transform enterprise infrastructure with 5G](https://www.netscout.com/news/blog/carriers-transform-infrastructure-5g) |
| 12 | 2017.12.06 | arbornetworks_blog_insight | [Carriers can transform enterprise infrastructure with 5G](https://www.netscout.com/news/blog/carriers-transform-infrastructure-5g?language_content_entity=en) |
| 8 | 2017.10.09 | ptsecurity_news | [Positive Technologies launches 4G and 5G security assessment service](https://www.ptsecurity.com/ww-en/about/news/286211/) |
| 10 | 2017.10.03 | arbornetworks_blog_insight | [Connected Cars Offer Massive IoT Opportunity](https://www.netscout.com/news/article/connected-cars-iot-5g) |
| 10 | 2017.10.03 | arbornetworks_blog_insight | [Connected Cars Offer Massive IoT Opportunity](https://www.netscout.com/news/article/connected-cars-iot-5g?language_content_entity=en) |
| 10 | 2017.10.02 | rambus_blog | [Living on the edge with 5G and fog computing](https://www.rambus.com/blogs/living-on-the-edge-with-5g-and-fog-computing/) |
| 22 | 2017.08.31 | rambus_blog | [5G connections to hit 1.4 billion by 2025](https://www.rambus.com/blogs/5g-connections-to-hit-1-4-billion-by-2025/) |
| 13 | 2017.08.29 | arbornetworks_blog_insight | [How IoT and Big Video Make the Case for 5G Investments](https://www.netscout.com/news/article/iot-big-video) |
| 13 | 2017.08.29 | arbornetworks_blog_insight | [How IoT and Big Video Make the Case for 5G Investments](https://www.netscout.com/news/article/iot-big-video?language_content_entity=en) |
| 5 | 2017.08.22 | rambus_blog | [Wireless VR to strain data networks](https://www.rambus.com/blogs/wireless-vr-to-strain-data-networks/) |
| 6 | 2017.08.14 | arxiv | [[1708.04027] Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes](https://arxiv.org/abs/1708.04027) |
| 11 | 2017.08.10 | ixiacom_blog | [Like Winter, 5G is Coming](https://www.ixiacom.com/company/blog/winter-5g-coming) |
| 6 | 2017.07.26 | ixiacom_blog | [GTP Session: The ABCs of Network Visibility](https://www.ixiacom.com/company/blog/gtp-session-abcs-network-visibility) |
| 5 | 2017.07.21 | myriadrf | [OTA: LimeNET Success, LimeSDR Guides, Bluetooth Mesh, and More](https://myriadrf.org/blog/ota-limenet-success-limesdr-guides-bluetooth-mesh/) |
| 13 | 2017.07.12 | 0x48 | [对虚拟机进行磁盘扩容🐥](http://0x48.pw/2017/07/12/0x34/) |
| 5 | 2017.07.10 | arxiv | [[1708.04571] A Machine Learning Based Intrusion Detection System for Software Defined 5G Network](https://arxiv.org/abs/1708.04571) |
| 29 | 2017.07.06 | labs_ripe | [5G and Internet Technology - a Work in Progress](https://labs.ripe.net/Members/mirjam/5g-and-internet-technology-a-work-in-progress) |
| 14 | 2017.07.04 | maketecheasier | [How to Find the Best WiFi Channel for 5Ghz Frequency](https://www.maketecheasier.com/best-wifi-channel-for-5ghz-frequency/) |
| 44 | 2017.06.30 | ixiacom_blog | [Ten Myths About 5G - Debunked](https://www.ixiacom.com/company/blog/ten-myths-about-5g-debunked) |
| 31 | 2017.06.16 | ietf_blog | [5G and Internet Technology](https://www.ietf.org/blog/2017/06/5g-and-internet-technology/) |
| 13 | 2017.06.12 | ietf_blog | [Working Together with 3GPP on 5G](https://www.ietf.org/blog/2017/06/working-together-with-3gpp-on-5g/) |
| 6 | 2017.06.01 | pediy_new_digest | [[翻译]虚拟机逃逸——QEMU的案例分析(三)](https://bbs.pediy.com/thread-218045.htm) |
| 5 | 2017.05.11 | 4hou_technology | [华硕路由器被发现多个CVE漏洞(CVE-2017-5891,CVE-2017-5892)](http://www.4hou.com/technology/4710.html) |
| 7 | 2017.03.28 | arxiv | [[1703.09501] AES and SNOW 3G are Feasible Choices for a 5G Phone from Energy Perspective](https://arxiv.org/abs/1703.09501) |
| 7 | 2017.03.14 | radware_blog | [Mobile World Congress – Is It Over Yet?](https://blog.radware.com/security/2017/03/mobile-world-congress/) |
| 8 | 2017.03.10 | ixiacom_blog | [5G-The Wireless Revolution](https://www.ixiacom.com/company/blog/5g-wireless-revolution) |
| 6 | 2017.03.03 | faire_ca_soi_meme | [Une journée au MWC17](http://faire-ca-soi-meme.fr/avis/2017/03/03/une-journee-au-mwc17/) |
| 8 | 2017.01.03 | insinuator | [TelcoSecDay 2017 – 2nd Round of Talks](https://insinuator.net/2017/01/telcosecday-2017-2nd-round-of-talks/) |
| 10 | 2016.12.08 | f5_whitepapers | [The Internet of Things: Security and Business Impacts on Service Providers](https://f5.com/resources/white-papers/the-internet-of-things-security-and-business-impacts-on-service-providers-23635) |
| 10 | 2016.11.03 | troyhunt | [Ubiquiti all the things: how I finally fixed my dodgy wifi](https://www.troyhunt.com/ubiquiti-all-the-things-how-i-finally-fixed-my-dodgy-wifi/) |
| 11 | 2016.10.06 | radware_blog | [APAC Carriers need time to prepare all the changes required for 5G](https://blog.radware.com/security/2016/10/apac-carriers-prepare-changes-required-for-5g/) |
| 12 | 2016.09.29 | radware_blog | [5G Mobile Security Challenge](https://blog.radware.com/security/2016/09/5g-mobile-security-challenge/) |
| 20 | 2016.03.22 | 360_anquanke_learning | [5G网络面临的机遇与挑战](https://www.anquanke.com/post/id/83668/) |
| 19 | 2016.03.17 | mcafee_securingtomorrow_labs | [5G Networks Pose Cyber Risks, Opportunities](https://securingtomorrow.mcafee.com/mcafee-labs/5g-networks-pose-cyber-risks-opportunities/) |
| 16 | 2016.02.27 | maketecheasier | [5G Networks Are Being Tested. What Do You Need to Know About Them?](https://www.maketecheasier.com/5g-networks/) |
| 19 | 2016.02.23 | telefonica | [More than smartphones: 5G as a driver for industrial and societal changes](https://www.telefonica.com/en/web/responsible-business/article/-/blogs/more-than-smartphones-5g-as-a-driver-for-industrial-and-societal-changes) |
| 19 | 2016.02.23 | telefonica | [More than smartphones: 5G as a driver for industrial and societal changes](https://www.telefonica.com/en/c/blogs/find_entry?p_l_id=1261536&noSuchEntryRedirect=https%3A%2F%2Fwww.telefonica.com%2Fen%2Fweb%2Fresponsible-business%2Fblog%2Fall%2F-%2Fasset_publisher%2FrSIjYI6PG92f%2Fblog%2Fmore-than-smartphones-5g-as-a-driver-for-industrial-and-societal-changes%3FinheritRedirect%3Dfalse%26redirect%3Dhttps%253A%252F%252Fwww.telefonica.com%252Fen%252Fweb%252Fresponsible-business%252Fblog%252Fall%253Fp_p_id%253D101_INSTANCE_rSIjYI6PG92f%2526p_p_lifecycle%253D0%2526p_p_state%253Dnormal%2526p_p_mode%253Dview%2526p_p_col_id%253Dcolumn-3%2526p_p_col_pos%253D2%2526p_p_col_count%253D3%2526_101_INSTANCE_rSIjYI6PG92f_advancedSearch%253Dfalse%2526_101_INSTANCE_rSIjYI6PG92f_keywords%253D%2526_101_INSTANCE_rSIjYI6PG92f_delta%253D10%2526p_r_p_564233524_resetCur%253Dfalse%2526_101_INSTANCE_rSIjYI6PG92f_cur%253D3%2526_101_INSTANCE_rSIjYI6PG92f_andOperator%253Dtrue&entryId=22803137) |
| 19 | 2016.02.23 | telefonica | [More than smartphones: 5G as a driver for industrial and societal changes](https://www.telefonica.com/en/c/blogs/find_entry?p_l_id=1261536&noSuchEntryRedirect=https%3A%2F%2Fwww.telefonica.com%2Fen%2Fweb%2Fresponsible-business%2Fblog%2Fall%2F-%2Fasset_publisher%2FrSIjYI6PG92f%2Fblog%2Fmore-than-smartphones-5g-as-a-driver-for-industrial-and-societal-changes%3FinheritRedirect%3Dfalse%26redirect%3Dhttps%253A%252F%252Fwww.telefonica.com%252Fen%252Fweb%252Fresponsible-business%252Fblog%252Fall%253Fp_p_id%253D101_INSTANCE_rSIjYI6PG92f%2526p_p_lifecycle%253D0%2526p_p_state%253Dnormal%2526p_p_mode%253Dview%2526p_p_col_id%253Dcolumn-3%2526p_p_col_pos%253D1%2526p_p_col_count%253D2%2526_101_INSTANCE_rSIjYI6PG92f_cur%253D4%2526_101_INSTANCE_rSIjYI6PG92f_keywords%253D%2526_101_INSTANCE_rSIjYI6PG92f_advancedSearch%253Dfalse%2526_101_INSTANCE_rSIjYI6PG92f_delta%253D10%2526p_r_p_564233524_resetCur%253Dfalse%2526_101_INSTANCE_rSIjYI6PG92f_andOperator%253Dtrue&entryId=22803137) |
| 6 | 2016.02.22 | f5_blog | [Service Providers and F5's New VIPRION B4450](https://f5.com/about-us/blog/articles/service-providers-and-f5s-new-viprion-b4450-17843) |
| 9 | 2016.02.22 | f5_blog | [The perfect storm: Security at massive scale to support the IoT & 4G/5G networks](https://f5.com/about-us/blog/articles/the-perfect-storm-security-at-massive-scale-to-support-the-iot-4g-5g-networks) |
| 5 | 2015.09.22 | maketecheasier | [What LVM Is and How to Set It Up in Ubuntu](https://www.maketecheasier.com/lvm-set-up-ubuntu/) |
| 5 | 2015.07.24 | kaspersky_blog | [LTE-U: on the way to 5G](https://www.kaspersky.com/blog/lte-unlicensed-explanation/9402/) |
| 22 | 2015.05.25 | kaspersky_blog | [5G: why do we need it?](https://www.kaspersky.com/blog/why-we-need-5g-mobile-networks/8782/) |
| 11 | 2015.02.27 | maketecheasier | [5G Mobile Internet: The Pros and Cons](https://www.maketecheasier.com/5g-mobile-internet-pros-and-cons/) |
| 5 | 2015.02.26 | labs_ripe | [Today's Mobile Internet](https://labs.ripe.net/Members/gih/todays-mobile-internet) |
| 9 | 2014.03.26 | linuxjournal | [LVM, Demystified](https://www.linuxjournal.com/content/lvm-demystified) |
| 5 | 2013.10.15 | cheney | [How does the go build command work ?](https://dave.cheney.net/2013/10/15/how-does-the-go-build-command-work) |
| 8 | 2013.10.02 | _91ri | [15个实用的Linux find命令示例](http://www.91ri.org/7309.html) |
| 36 | 2011.02.10 | cleanbytes | [Is Google.com hacked ? Google Images redirecting to malware(fake antivirus)](http://cleanbytes.net/is-google-com-hacked-google-images-redirecting-to-malwarefake-antivirus) |
| 34 | 2006.09.20 | daringfireball | [Regarding the Features and Capabilities of the Various Fifth Generation iPods](https://daringfireball.net/2006/09/fifth_generation_ipod_features) |


================================================
FILE: posts/cc/AFLfuzzer_post_sort_by_cc_cnt.md
================================================
AFLfuzzer

None

| 时间 | CC数目 | URL | 标题 |
| ---- | ----- | --- | --- |
| 162 | 2017.07.10 | reverse_archives | [How to compile AFL's LLVM mode in OS X](https://reverse.put.as/2017/07/10/compiling-afl-osx-llvm-mode/) |
| 145 | 2016.04.19 | n0where_vulnerability_analysis_tools | [American Fuzzy Lop Utilities: afl-utils](https://n0where.net/american-fuzzy-lop-utilities-afl-utils) |
| 119 | 2018.01.05 | venus_seebug | [AFL(American Fuzzy Lop)实现细节与文件变异](https://paper.seebug.org/496/) |
| 106 | 2019.03.08 | topsec_adlab | [AFL漏洞挖掘技术漫谈(一):用AFL开始你的第一次Fuzzing](http://blog.topsec.com.cn/2019/03/afl%e6%bc%8f%e6%b4%9e%e6%8c%96%e6%8e%98%e6%8a%80%e6%9c%af%e6%bc%ab%e8%b0%88%ef%bc%88%e4%b8%80%ef%bc%89%ef%bc%9a%e7%94%a8afl%e5%bc%80%e5%a7%8b%e4%bd%a0%e7%9a%84%e7%ac%ac%e4%b8%80%e6%ac%a1fuzzing/) |
| 87 | 2019.03.08 | topsec_adlab | [AFL漏洞挖掘技术漫谈(二):Fuzz结果分析和代码覆盖率](http://blog.topsec.com.cn/2019/03/3755/) |
| 87 | 2019.03.08 | topsec_adlab | [AFL漏洞挖掘技术漫谈(二):Fuzz结果分析和代码覆盖率](http://blog.topsec.com.cn/archives/3755) |
| 85 | 2017.01.23 | aurainfosec | [Hunting For Bugs With AFL 101 - A PRIMER](http://research.aurainfosec.io/hunting-for-bugs-101/) |
| 72 | 2017.09.22 | sec_consult_blog | [Hack the Hacker – Fuzzing Mimikatz On Windows With WinAFL & Heatmaps (0day)](https://sec-consult.com/en/blog/2017/09/hack-the-hacker-fuzzing-mimikatz-on-windows-with-winafl-heatmaps-0day/) |
| 70 | 2019.03.11 | venus_seebug | [AFL 漏洞挖掘技术漫谈(二):Fuzz 结果分析和代码覆盖率](https://paper.seebug.org/842/) |
| 70 | 2019.03.20 | freebuf | [AFL漏洞挖掘技术漫谈(二):Fuzz结果分析和代码覆盖率](https://www.freebuf.com/articles/system/197678.html) |
| 67 | 2016.07.21 | moyix_blog | [Fuzzing with AFL is an Art](http://moyix.blogspot.com/2016/07/fuzzing-with-afl-is-an-art.html) |
| 64 | 2016.08.21 | geeknik | [Fuzzing Perl: A Tale of Two American Fuzzy Lops](http://www.geeknik.net/71nvhf1fp) |
| 64 | 2015.07.21 | fastly | [How to fuzz a server with American Fuzzy Lop](https://www.fastly.com/blog/how-fuzz-server-american-fuzzy-lop) |
| 60 | 2017.06.22 | f_secure_labsblog | [Super Awesome Fuzzing, Part One](https://labsblog.f-secure.com/2017/06/22/super-awesome-fuzzing-part-one/) |
| 60 | 2019.04.05 | aliyun_xz | [AFL源码分析笔记(一)](https://xz.aliyun.com/t/4628) |
| 58 | 2017.07.04 | 4hou_tools | [炒鸡棒的模糊测试技术](http://www.4hou.com/mobile/6015.html) |
| 57 | 2018.01.31 | tunnelshade | [Internals of AFL fuzzer - Compile Time Instrumentation](https://tunnelshade.in/blog/2018/01/afl-internals-compile-time-instrumentation/) |
| 55 | 2019.04.02 | freebuf | [AFLSmart工具简单分析及使用介绍](https://www.freebuf.com/sectool/199010.html) |
| 53 | 2018.02.07 | hyperiongray | [Fuzzing Linux GUI/GTK Programs With American Fuzzy Lop (AFL) For Fun And Pr... You Get the Idea.  Part One.](https://blog.hyperiongray.com/fuzzing-gtk-programs-with-american-fuzzy-lop-afl/) |
| 53 | 2018.09.26 | aliyun_xz | [提高AFL qemu模式性能](https://xz.aliyun.com/t/2805) |
| 53 | 2016.09.26 | jowto | [智能模糊测试工具 Winafl 的使用与分析](http://blog.jowto.com/?p=150) |
| 50 | 2017.01.06 | 4hou_technology | [智能模糊测试工具 Winafl 的使用与分析](http://www.4hou.com/technology/2800.html) |
| 49 | 2017.03.17 | vegardno | [Fuzzing the OpenSSH daemon using AFL](http://www.vegardno.net/2017/03/fuzzing-openssh-daemon-using-afl.html) |
| 49 | 2016.08.15 | lafintel | [Circumventing Fuzzing Roadblocks  with Compiler Transformations](https://lafintel.wordpress.com/2016/08/15/circumventing-fuzzing-roadblocks-with-compiler-transformations/) |
| 48 | 2019.03.12 | aliyun_xz | [初探Fuzz-AFL](https://xz.aliyun.com/t/4314) |
| 45 | 2017.11.01 | njvoss299 | [afl-unicorn: Part 2 — Fuzzing the ‘Unfuzzable’](https://medium.com/p/bea8de3540a5) |
| 43 | 2017.06.20 | sensepost_2017 | [Fuzzing Apache httpd server with American Fuzzy Lop + persistent mode](https://sensepost.com/blog/2017/fuzzing-apache-httpd-server-with-american-fuzzy-lop-%2B-persistent-mode/) |
| 41 | 2016.11.28 | doar_e | [Token Capture via an Llvm-based Analysis Pass](http://doar-e.github.io/blog/2016/11/27/clang-and-passes/) |
| 41 | 2017.03.20 | thecyberrecce | [Software Exploit Development – Fuzzing with AFL](http://thecyberrecce.net/2017/03/20/software-exploit-development-fuzzing-with-afl/) |
| 40 | 2017.03.12 | ele7enxxh | [在Linux上使用AFL对Stagefright进行模糊测试](http://ele7enxxh.com/Use-AFL-For-Stagefright-Fuzzing-On-Linux.html) |
| 40 | 2017.10.31 | njvoss299 | [afl-unicorn: Fuzzing Arbitrary Binary Code](https://medium.com/p/563ca28936bf) |
| 40 | 2017.03.12 | pediy_new_digest | [[原创]在Linux上使用AFL对Stagefright进行模糊测试](https://bbs.pediy.com/thread-216319.htm) |
| 40 | 2017.03.13 | venus_seebug | [在Linux上使用AFL对Stagefright进行模糊测试](https://paper.seebug.org/245/) |
| 40 | 2016.08.10 | 360_anquanke_learning | [初探Windows Fuzzing神器----Winafl](https://www.anquanke.com/post/id/84363/) |
| 39 | 2016.07.09 | n0where_vulnerability_analysis_tools | [Fuzzing Windows Binaries: WinAFL](https://n0where.net/fuzzing-windows-binaries-winafl) |
| 39 | 2017.05.07 | animal0day | [Fuzzing Apache httpd server with American Fuzzy Lop + persistent mode](https://animal0day.blogspot.com/2017/05/fuzzing-apache-httpd-server-with.html) |
| 38 | 2018.03.07 | countuponsecurity | [Intro to American Fuzzy Lop – Fuzzing in 5 steps](https://countuponsecurity.com/2018/03/07/intro-to-american-fuzzy-lop-fuzzing-in-5-steps/) |
| 35 | 2018.09.29 | aliyun_xz | [利用Java Security Manager进行Java AFL Fuzz](https://xz.aliyun.com/t/2820) |
| 35 | 2019.02.02 | riusksk | [winafl中基于插桩的覆盖率反馈原理](http://riusksk.me/2019/02/02/winafl中基于插桩的覆盖率反馈原理/) |
| 34 | 2017.04.11 | 360_anquanke_learning | [OpenSSH模糊测试技巧之AFL的妙用(二)](https://www.anquanke.com/post/id/85862/) |
| 33 | 2018.12.26 | 4hou_vulnerable | [50天收获50个CVE:针对Adobe Reader的模糊测试](http://www.4hou.com/vulnerable/15310.html) |
| 33 | 2018.12.12 | checkpoint_research | [50 CVEs in 50 Days: Fuzzing Adobe Reader](https://research.checkpoint.com/50-adobe-cves-in-50-days/) |
| 33 | 2017.06.13 | knownsec | [初识 Fuzzing 工具 WinAFL](http://blog.knownsec.com/2017/06/%e5%88%9d%e8%af%86-fuzzing-%e5%b7%a5%e5%85%b7-winafl/) |
| 31 | 2019.02.27 | 4hou_web | [如何在安全研究中使用模糊测试](https://www.4hou.com/web/16392.html) |
| 31 | 2019.02.12 | ixiacom_blog | [How to Use Fuzzing in Security Research](https://www.ixiacom.com/company/blog/how-use-fuzzing-security-research) |
| 30 | 2018.02.06 | tunnelshade | [Internals of AFL fuzzer - QEMU Instrumentation](https://tunnelshade.in/blog/2018/02/afl-internals-qemu-instrumentation/) |
| 29 | 2018.04.24 | countuponsecurity | [Intro to American Fuzzy Lop – Fuzzing with ASAN and beyond](https://countuponsecurity.com/2018/04/24/intro-to-american-fuzzy-lop-fuzzing-with-asan-and-beyond/) |
| 29 | 2015.09.21 | gdssecurity | [Fuzzing the mbed TLS Library](https://blog.gdssecurity.com/labs/2015/9/21/fuzzing-the-mbed-tls-library.html) |
| 28 | 2015.04.07 | hboeck | [How Heartbleed could've been found](https://blog.hboeck.de/archives/868-How-Heartbleed-couldve-been-found.html) |
| 25 | 2017.09.22 | 360_anquanke_learning | [使用 WinAFL 对 MSXML6 库进行模糊测试](https://www.anquanke.com/post/id/86905/) |
| 24 | 2019.04.25 | kitploit_home | [drAFL - AFL + DynamoRIO = Fuzzing Binaries With No Source Code On Linux](https://www.kitploit.com/2019/04/drafl-afl-dynamorio-fuzzing-binaries.html) |
| 24 | 2015.04.30 | evilsocket | [Fuzzing With AFL-Fuzz, a Practical Example ( AFL vs Binutils )](https://www.evilsocket.net/2015/04/30/fuzzing-with-afl-fuzz-a-practical-example-afl-vs-binutils/) |
| 24 | 2017.04.01 | 360_anquanke_learning | [OpenSSH模糊测试技巧之AFL的妙用(一)](https://www.anquanke.com/post/id/85826/) |
| 23 | 2015.03.02 | danluu | [Combining AFL and QuickCheck for directed fuzzing](https://danluu.com/testing/) |
| 22 | 2017.04.18 | geeknik | [A quick and dirty guide to "Fuzzing with AFL for fun and maybe a little profit"](http://www.geeknik.net/4rzj8nz7n) |
| 21 | 2018.04.30 | freebuf | [一系列用于Fuzzing学习的资源汇总](http://www.freebuf.com/articles/rookie/169413.html) |
| 21 | 2017.06.21 | trustwave_SpiderLabs_Blog | [ModSecurity version 3: Fuzzing as part of the QA](https://www.trustwave.com/Resources/SpiderLabs-Blog/ModSecurity-version-3--Fuzzing-as-part-of-the-QA/) |
| 20 | 2017.02.21 | mov | [Bug hunting GDK-PixBuf](http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html) |
| 20 | 2018.05.29 | securityonline | [winafl: fuzzing tool for coverage-guided fuzzing](https://securityonline.info/winafl-fuzzing-tool-for-coverage-guided-fuzzing/) |
| 20 | 2018.10.26 | obscuritylabs | [Docker + AFL: Effective, scalable reproducible fuzzing](https://blog.obscuritylabs.com/docker-afl-effective-reproducable-fuzzing/) |
| 19 | 2015.11.16 | freebuf | [我是如何对dnsmasq使用afl-fuzz差点拯救互联网的?](http://www.freebuf.com/news/85762.html) |
| 19 | 2015.01.06 | _0x90909090 | [Is fuzzing obsolete? No, afl rocks!](http://0x90909090.blogspot.com/2015/01/is-fuzzing-obsolete-no-afl-rocks.html) |
| 18 | 2018.03.19 | moyix_blog | [Of Bugs and Baselines](http://moyix.blogspot.com/2018/03/of-bugs-and-baselines.html) |
| 18 | 2019.01.25 | nullprogram | [The Day I Fell in Love with Fuzzing](https://nullprogram.com/blog/2019/01/25/) |
| 18 | 2018.09.08 | aliyun_xz | [linux下fuzz初试](https://xz.aliyun.com/t/2714) |
| 18 | 2015.07.15 | skullsecurity | [How I nearly almost saved the Internet, starring afl-fuzz and dnsmasq](https://blog.skullsecurity.org/2015/how-i-nearly-almost-saved-the-internet-starring-afl-fuzz-and-dnsmasq) |
| 18 | 2018.07.20 | freebuf | [PTFuzzer:一个基于硬件加速的二进制程序Fuzz工具](http://www.freebuf.com/sectool/177578.html) |
| 18 | 2014.10.14 | lcamtuf | [None](http://lcamtuf.blogspot.com/2014/10/fuzzing-binaries-without-execve.html) |
| 17 | 2017.11.09 | aliyun_xz | [AFL-FUZZ 启用 llvm](https://xz.aliyun.com/t/1541) |
| 17 | 2017.09.19 | tarlogic | [Fuzzing Tales 0x01: Yadifa DNS](https://www.tarlogic.com/en/blog/fuzzing-tales-0x01-yadifa-dns/) |
| 16 | 2017.08.22 | fuzzstation | [Quick-start: Fuzzing with AFL](https://medium.com/p/ac7bb8fcae52) |
| 16 | 2017.03.13 | pediy_new_digest | [[翻译]资源:开源Fuzzers工具列表 (以及其它fuzzing工具)](https://bbs.pediy.com/thread-216352.htm) |
| 15 | 2015.04.13 | alexgaynor | [Introduction to Fuzzing in Python with AFL](https://alexgaynor.net/2015/apr/13/introduction-to-fuzzing-in-python-with-afl/) |
| 15 | 2016.09.14 | ele7enxxh | [使用afl-dyninst fuzz无源码的二进制程序](http://ele7enxxh.com/Use-AFL-dyninst-To-Fuzz-Blackbox-Binaries.html) |
| 15 | 2017.07.16 | animal0day | [From fuzzing Apache httpd server to CVE-2017-7668 and a $1500 bounty](https://animal0day.blogspot.com/2017/07/from-fuzzing-apache-httpd-server-to-cve.html) |
| 15 | 2018.05.10 | securelist | [OPC UA security analysis](https://securelist.com/opc-ua-security-analysis/85424/) |
| 14 | 2017.03.20 | softscheck_blog | [How we found a tcpdump vulnerability using cloud fuzzing](https://www.softscheck.com/en/identifying-security-vulnerabilities-with-cloud-fuzzing/) |
| 14 | 2019.01.03 | mijailovic | [SharpFuzz: Bringing the power of afl-fuzz to .NET platform](https://mijailovic.net/2019/01/03/sharpfuzz/) |
| 14 | 2019.01.23 | mwrinfosecurity_blog | [What the Fuzz](https://labs.mwrinfosecurity.com/blog/what-the-fuzz/) |
| 14 | 2016.02.22 | theobsidiantower | [AFL](https://theobsidiantower.com/2016/02/22/f7acc32272782740bfb25879781c5512c20a31fb.html) |
| 14 | 2018.10.12 | 360_anquanke_learning | [漏洞挖掘之乱拳打死老师傅——Fuzzer](https://www.anquanke.com/post/id/161719/) |
| 13 | 2017.10.19 | fortinet | [A 14-day Journey through Embedded Open Type Font Fuzzing](https://www.fortinet.com/blog/threat-research/a-14-day-journey-through-embedded-open-type-font-fuzzing.html) |
| 13 | 2017.10.19 | fortinet | [A 14-day Journey through Embedded Open Type Font Fuzzing](https://blog.fortinet.com/2017/10/19/a-14-day-journey-through-embedded-open-type-font-fuzzing) |
| 12 | 2017.08.09 | 4hou_technology | [我是如何通过fuzz apache httpd服务发现CVE-2017-7668](http://www.4hou.com/technology/6738.html) |
| 12 | 2017.08.09 | 360_anquanke_learning | [看我如何对Apache进行模糊测试并挖到了一个价值1500刀的漏洞](https://www.anquanke.com/post/id/86581/) |
| 12 | 2017.11.29 | securityinnovation_blog | [Understanding Security Challenges of Media Players](https://blog.securityinnovation.com/understanding-security-challenges-of-media-players) |
| 12 | 2019.04.06 | freebuf | [Pe-afl:一款支持对Windows二进制程序的afl fuzz工具](https://www.freebuf.com/sectool/199390.html) |
| 12 | 2016.10.23 | quarkslab_blog | [Internship offers at Quarkslab for the 2016-2017 season](https://blog.quarkslab.com/internship-offers-at-quarkslab-for-the-2016-2017-season.html) |
| 12 | 2018.09.06 | aliyun_xz | [[翻译] 使用AFL对CSGO进行模糊测试](https://xz.aliyun.com/t/2705) |
| 11 | 2019.01.14 | freebuf | [简单高效的模糊测试——Fuzzing](https://www.freebuf.com/news/193602.html) |
| 11 | 2019.02.13 | sectechno | [WinAFL – A fork of AFL for fuzzing Windows binaries](http://www.sectechno.com/winafl-a-fork-of-afl-for-fuzzing-windows-binaries/) |
| 11 | 2015.01.14 | _0x90909090 | [Let's have some fun with afl](http://0x90909090.blogspot.com/2015/01/lets-have-some-fun-with-afl.html) |
| 11 | 2017.09.07 | fuzzstation | [Breaking Ruby’s Unmarshal with AFL-Fuzz](https://medium.com/p/6b5f72b581d5) |
| 11 | 2017.08.05 | doar_e | [Binary Rewriting With Syzygy, Pt. I](http://doar-e.github.io/blog/2017/08/05/binary-rewriting-with-syzygy/) |
| 11 | 2015.05.20 | lcamtuf | [None](http://lcamtuf.blogspot.com/2015/05/lesser-known-features-of-afl-fuzz.html) |
| 10 | 2017.08.12 | heelan | [Fuzzing PHP’s unserialize Function](https://sean.heelan.io/2017/08/12/fuzzing-phps-unserialize-function/) |
| 10 | 2018.06.24 | vegardno | [Compiler fuzzing, part 1](http://www.vegardno.net/2018/06/compiler-fuzzing.html) |
| 10 | 2015.01.30 | summitroute | [Downclimb](https://summitroute.com/blog/2015/01/30/downclimb/) |
| 10 | 2018.10.05 | trailofbits | [How to Spot Good Fuzzing Research](https://blog.trailofbits.com/2018/10/05/how-to-spot-good-fuzzing-research/) |
| 9 | 2017.07.28 | thecyberrecce | [Exploit Development with AFL, PEDA and PwnTools](http://thecyberrecce.net/2017/07/28/exploit-development-with-afl-peda-and-pwntools/) |
| 9 | 2016.03.10 | allsoftwaresucks | [Fuzzing Vulkans, how do they work?](http://allsoftwaresucks.blogspot.com/2016/03/fuzzing-vulkans-how-do-they-work.html) |
| 9 | 2017.09.01 | fuzzstation | [Fuzz Testing: Choosing a Seed File for AFL](https://medium.com/p/fee4a09753c2) |
| 9 | 2014.08.08 | lcamtuf | [None](http://lcamtuf.blogspot.com/2014/08/binary-fuzzing-strategies-what-works.html) |
| 9 | 2016.06.13 | foxglovesecurity | [Finding pearls; fuzzing ClamAV](https://foxglovesecurity.com/2016/06/13/finding-pearls-fuzzing-clamav/) |
| 9 | 2015.10.27 | fuzzing_project | [Network fuzzing with american fuzzy lop](https://blog.fuzzing-project.org/27-Network-fuzzing-with-american-fuzzy-lop.html) |
| 9 | 2017.05.03 | freebuf | [云端模糊测试挖洞实例](http://www.freebuf.com/articles/system/133210.html) |
| 9 | 2017.07.14 | 360_anquanke_learning | [针对流媒体平台安全问题的详细分析](https://www.anquanke.com/post/id/86424/) |
| 8 | 2018.11.06 | insinuator | [Hack.lu 2018: Fuzzing Workshop by René Freingruber](https://insinuator.net/2018/11/hack-lu-2018-fuzzing-workshop-by-rene-freingruber/) |
| 8 | 2016.02.09 | lcamtuf | [None](http://lcamtuf.blogspot.com/2016/02/say-hello-to-afl-analyze.html) |
| 8 | 2018.01.22 | ostorlab | [Reinforcement Learning & Automated Testing - part 1](http://blog.ostorlab.co/2018/01/reinforcement-learning-automated.html) |
| 8 | 2011.02.10 | cleanbytes | [Is Google.com hacked ? Google Images redirecting to malware(fake antivirus)](http://cleanbytes.net/is-google-com-hacked-google-images-redirecting-to-malwarefake-antivirus) |
| 7 | 2017.08.19 | pediy_new_digest | [[翻译]一篇安全学习笔记](https://bbs.pediy.com/thread-220508.htm) |
| 7 | 2017.11.08 | arxiv | [[1711.02807] Faster Fuzzing: Reinitialization with Deep Neural Models](https://arxiv.org/abs/1711.02807) |
| 7 | 2019.03.31 | 4hou_web | [使用DeepState对API进行模糊测试(上)](https://www.4hou.com/web/16866.html) |
| 7 | 2014.11.30 | lcamtuf | [None](http://lcamtuf.blogspot.com/2014/11/afl-fuzz-nobody-expects-cdata-sections.html) |
| 7 | 2014.11.07 | lcamtuf | [None](http://lcamtuf.blogspot.com/2014/11/pulling-jpegs-out-of-thin-air.html) |
| 7 | 2019.01.22 | trailofbits | [Fuzzing an API with DeepState (Part 1)](https://blog.trailofbits.com/2019/01/22/fuzzing-an-api-with-deepstate-part-1/) |
| 7 | 2016.07.31 | summitroute | [Downclimb](https://summitroute.com/blog/2016/07/31/downclimb/) |
| 7 | 2015.09.14 | n0where_vulnerability_analysis_tools | [Security Oriented Fuzzer: American Fuzzy Lop](https://n0where.net/security-oriented-fuzzer-american-fuzzy-lop) |
| 7 | 2017.04.24 | 360_anquanke_learning | [看我如何使用Cloud Fuzzing挖到了一个tcpdump漏洞](https://www.anquanke.com/post/id/85944/) |
| 7 | 2017.07.09 | checkpoint | [Hacked in Translation – “Director’s Cut” - Full Technical Details - Check Point Software Blog](https://blog.checkpoint.com/2017/07/08/hacked-translation-directors-cut-full-technical-details/) |
| 6 | 2017.01.06 | fuzzing_project | [Fuzzing Irssi with Perl Scripts](https://blog.fuzzing-project.org/55-Fuzzing-Irssi-with-Perl-Scripts.html) |
| 6 | 2017.11.23 | pediy_new_digest | [[翻译]类似AFL软件实现的属性测试技术](https://bbs.pediy.com/thread-222917.htm) |
| 6 | 2016.06.21 | nebelwelt_blog | [AsiaCCS and China](http://nebelwelt.net/blog/20160621-AsiaCCS.html) |
| 6 | 2015.02.03 | lcamtuf | [None](http://lcamtuf.blogspot.com/2015/02/afl-fuzz-black-box-binary-fuzzing-perf.html) |
| 6 | 2017.09.20 | freebuf | [我如何使用Cloud Fuzzing挖到了一个Tcpdump漏洞](http://www.freebuf.com/articles/network/147955.html) |
| 6 | 2015.11.21 | darknet | [american fuzzy lop – Security Oriented Fuzzing Tool](https://www.darknet.org.uk/2015/11/american-fuzzy-lop-security-oriented-fuzzing-tool/) |
| 6 | 2017.07.28 | comsecuris_blog | [Path of Least Resistance: Cellular Baseband to Application Processor Escalation on Mediatek Devices](https://comsecuris.com/blog/posts/path_of_least_resistance/) |
| 6 | 2015.06.11 | lcamtuf | [None](http://lcamtuf.blogspot.com/2015/06/new-in-afl-persistent-mode.html) |
| 6 | 2016.11.24 | 360_anquanke_learning | [Fuzzing Android:挖掘Android系统组件组件中的漏洞](https://www.anquanke.com/post/id/84979/) |
| 5 | 2016.12.15 | insinuator | [TR17 Training: Fuzzing with American Fuzzy Lop, Address Sanitizer and LibFuzzer](https://insinuator.net/2016/12/tr17-training-fuzzing-with-american-fuzzy-lop-address-sanitizer-and-libfuzzer/) |
| 5 | 2017.09.29 | fuzzstation | [Preparing an Application for AFL-Fuzz](https://medium.com/p/a2a838c949cb) |
| 5 | 2016.01.21 | securityblog_gr | [Security oriented open source fuzzer](http://securityblog.gr/3197/security-oriented-open-source-fuzzer/) |
| 5 | 2019.01.14 | securityonline | [Lucky CAT: A distributed fuzzing management framework](https://securityonline.info/lucky-cat/) |
| 5 | 2018.01.03 | blahcat | [Fuzzing arbitrary functions in ELF binaries](http://blahcat.github.io/2018/03/11/fuzzing-arbitrary-functions-in-elf-binaries/) |
| 5 | 2018.06.18 | compass_security | [Area41 2018 Wrap Up](https://blog.compass-security.com/2018/06/area41-2018-wrap-up/) |
| 5 | 2016.04.04 | youtube | [BSidesSF 2016 - Fuzz Smarter, Not Harder (An afl-fuzz Primer) (Craig Young)](https://www.youtube.com/watch?v=4IrYczT5YFs) |
| 5 | 2015.04.19 | summitroute | [Downclimb](https://summitroute.com/blog/2015/04/19/downclimb/) |
| 5 | 2015.04.14 | lcamtuf | [None](http://lcamtuf.blogspot.com/2015/04/finding-bugs-in-sqlite-easy-way.html) |
| 5 | 2017.04.22 | lcamtuf | [None](http://lcamtuf.blogspot.com/2017/04/afl-experiments-or-please-eat-your.html) |
| 5 | 2017.09.20 | arxiv | [[1709.07101] FairFuzz: Targeting Rare Branches to Rapidly Increase Greybox Fuzz Testing Coverage](https://arxiv.org/abs/1709.07101) |
| 5 | 2019.01.23 | 360_anquanke_learning | [利用Marvell Avastar Wi-Fi中的漏洞远程控制设备:从零知识入门到RCE漏洞挖掘利用(下)](https://www.anquanke.com/post/id/170078/) |
| 5 | 2017.11.23 | radiofreerobotron | [ROPEmporium: Pivot 32-bit CTF Walkthrough With Radare2](http://radiofreerobotron.net/blog/2017/11/23/ropemporium-pivot-ctf-walkthrough/) |
| 5 | 2018.01.01 | moveax | [Radare Basics](https://moveax.me/radare-basics/) |


================================================
FILE: posts/cc/AFLfuzzer_post_sort_by_time.md
================================================
AFLfuzzer

None

| 时间 | CC数目 | URL | 标题 |
| ---- | ----- | --- | --- |
| 24 | 2019.04.25 | kitploit_home | [drAFL - AFL + DynamoRIO = Fuzzing Binaries With No Source Code On Linux](https://www.kitploit.com/2019/04/drafl-afl-dynamorio-fuzzing-binaries.html) |
| 12 | 2019.04.06 | freebuf | [Pe-afl:一款支持对Windows二进制程序的afl fuzz工具](https://www.freebuf.com/sectool/199390.html) |
| 60 | 2019.04.05 | aliyun_xz | [AFL源码分析笔记(一)](https://xz.aliyun.com/t/4628) |
| 55 | 2019.04.02 | freebuf | [AFLSmart工具简单分析及使用介绍](https://www.freebuf.com/sectool/199010.html) |
| 7 | 2019.03.31 | 4hou_web | [使用DeepState对API进行模糊测试(上)](https://www.4hou.com/web/16866.html) |
| 70 | 2019.03.20 | freebuf | [AFL漏洞挖掘技术漫谈(二):Fuzz结果分析和代码覆盖率](https://www.freebuf.com/articles/system/197678.html) |
| 48 | 2019.03.12 | aliyun_xz | [初探Fuzz-AFL](https://xz.aliyun.com/t/4314) |
| 70 | 2019.03.11 | venus_seebug | [AFL 漏洞挖掘技术漫谈(二):Fuzz 结果分析和代码覆盖率](https://paper.seebug.org/842/) |
| 106 | 2019.03.08 | topsec_adlab | [AFL漏洞挖掘技术漫谈(一):用AFL开始你的第一次Fuzzing](http://blog.topsec.com.cn/2019/03/afl%e6%bc%8f%e6%b4%9e%e6%8c%96%e6%8e%98%e6%8a%80%e6%9c%af%e6%bc%ab%e8%b0%88%ef%bc%88%e4%b8%80%ef%bc%89%ef%bc%9a%e7%94%a8afl%e5%bc%80%e5%a7%8b%e4%bd%a0%e7%9a%84%e7%ac%ac%e4%b8%80%e6%ac%a1fuzzing/) |
| 87 | 2019.03.08 | topsec_adlab | [AFL漏洞挖掘技术漫谈(二):Fuzz结果分析和代码覆盖率](http://blog.topsec.com.cn/2019/03/3755/) |
| 87 | 2019.03.08 | topsec_adlab | [AFL漏洞挖掘技术漫谈(二):Fuzz结果分析和代码覆盖率](http://blog.topsec.com.cn/archives/3755) |
| 31 | 2019.02.27 | 4hou_web | [如何在安全研究中使用模糊测试](https://www.4hou.com/web/16392.html) |
| 11 | 2019.02.13 | sectechno | [WinAFL – A fork of AFL for fuzzing Windows binaries](http://www.sectechno.com/winafl-a-fork-of-afl-for-fuzzing-windows-binaries/) |
| 31 | 2019.02.12 | ixiacom_blog | [How to Use Fuzzing in Security Research](https://www.ixiacom.com/company/blog/how-use-fuzzing-security-research) |
| 35 | 2019.02.02 | riusksk | [winafl中基于插桩的覆盖率反馈原理](http://riusksk.me/2019/02/02/winafl中基于插桩的覆盖率反馈原理/) |
| 18 | 2019.01.25 | nullprogram | [The Day I Fell in Love with Fuzzing](https://nullprogram.com/blog/2019/01/25/) |
| 5 | 2019.01.23 | 360_anquanke_learning | [利用Marvell Avastar Wi-Fi中的漏洞远程控制设备:从零知识入门到RCE漏洞挖掘利用(下)](https://www.anquanke.com/post/id/170078/) |
| 14 | 2019.01.23 | mwrinfosecurity_blog | [What the Fuzz](https://labs.mwrinfosecurity.com/blog/what-the-fuzz/) |
| 7 | 2019.01.22 | trailofbits | [Fuzzing an API with DeepState (Part 1)](https://blog.trailofbits.com/2019/01/22/fuzzing-an-api-with-deepstate-part-1/) |
| 11 | 2019.01.14 | freebuf | [简单高效的模糊测试——Fuzzing](https://www.freebuf.com/news/193602.html) |
| 5 | 2019.01.14 | securityonline | [Lucky CAT: A distributed fuzzing management framework](https://securityonline.info/lucky-cat/) |
| 14 | 2019.01.03 | mijailovic | [SharpFuzz: Bringing the power of afl-fuzz to .NET platform](https://mijailovic.net/2019/01/03/sharpfuzz/) |
| 33 | 2018.12.26 | 4hou_vulnerable | [50天收获50个CVE:针对Adobe Reader的模糊测试](http://www.4hou.com/vulnerable/15310.html) |
| 33 | 2018.12.12 | checkpoint_research | [50 CVEs in 50 Days: Fuzzing Adobe Reader](https://research.checkpoint.com/50-adobe-cves-in-50-days/) |
| 8 | 2018.11.06 | insinuator | [Hack.lu 2018: Fuzzing Workshop by René Freingruber](https://insinuator.net/2018/11/hack-lu-2018-fuzzing-workshop-by-rene-freingruber/) |
| 20 | 2018.10.26 | obscuritylabs | [Docker + AFL: Effective, scalable reproducible fuzzing](https://blog.obscuritylabs.com/docker-afl-effective-reproducable-fuzzing/) |
| 14 | 2018.10.12 | 360_anquanke_learning | [漏洞挖掘之乱拳打死老师傅——Fuzzer](https://www.anquanke.com/post/id/161719/) |
| 10 | 2018.10.05 | trailofbits | [How to Spot Good Fuzzing Research](https://blog.trailofbits.com/2018/10/05/how-to-spot-good-fuzzing-research/) |
| 35 | 2018.09.29 | aliyun_xz | [利用Java Security Manager进行Java AFL Fuzz](https://xz.aliyun.com/t/2820) |
| 53 | 2018.09.26 | aliyun_xz | [提高AFL qemu模式性能](https://xz.aliyun.com/t/2805) |
| 18 | 2018.09.08 | aliyun_xz | [linux下fuzz初试](https://xz.aliyun.com/t/2714) |
| 12 | 2018.09.06 | aliyun_xz | [[翻译] 使用AFL对CSGO进行模糊测试](https://xz.aliyun.com/t/2705) |
| 18 | 2018.07.20 | freebuf | [PTFuzzer:一个基于硬件加速的二进制程序Fuzz工具](http://www.freebuf.com/sectool/177578.html) |
| 10 | 2018.06.24 | vegardno | [Compiler fuzzing, part 1](http://www.vegardno.net/2018/06/compiler-fuzzing.html) |
| 5 | 2018.06.18 | compass_security | [Area41 2018 Wrap Up](https://blog.compass-security.com/2018/06/area41-2018-wrap-up/) |
| 20 | 2018.05.29 | securityonline | [winafl: fuzzing tool for coverage-guided fuzzing](https://securityonline.info/winafl-fuzzing-tool-for-coverage-guided-fuzzing/) |
| 15 | 2018.05.10 | securelist | [OPC UA security analysis](https://securelist.com/opc-ua-security-analysis/85424/) |
| 21 | 2018.04.30 | freebuf | [一系列用于Fuzzing学习的资源汇总](http://www.freebuf.com/articles/rookie/169413.html) |
| 29 | 2018.04.24 | countuponsecurity | [Intro to American Fuzzy Lop – Fuzzing with ASAN and beyond](https://countuponsecurity.com/2018/04/24/intro-to-american-fuzzy-lop-fuzzing-with-asan-and-beyond/) |
| 18 | 2018.03.19 | moyix_blog | [Of Bugs and Baselines](http://moyix.blogspot.com/2018/03/of-bugs-and-baselines.html) |
| 38 | 2018.03.07 | countuponsecurity | [Intro to American Fuzzy Lop – Fuzzing in 5 steps](https://countuponsecurity.com/2018/03/07/intro-to-american-fuzzy-lop-fuzzing-in-5-steps/) |
| 53 | 2018.02.07 | hyperiongray | [Fuzzing Linux GUI/GTK Programs With American Fuzzy Lop (AFL) For Fun And Pr... You Get the Idea.  Part One.](https://blog.hyperiongray.com/fuzzing-gtk-programs-with-american-fuzzy-lop-afl/) |
| 30 | 2018.02.06 | tunnelshade | [Internals of AFL fuzzer - QEMU Instrumentation](https://tunnelshade.in/blog/2018/02/afl-internals-qemu-instrumentation/) |
| 57 | 2018.01.31 | tunnelshade | [Internals of AFL fuzzer - Compile Time Instrumentation](https://tunnelshade.in/blog/2018/01/afl-internals-compile-time-instrumentation/) |
| 8 | 2018.01.22 | ostorlab | [Reinforcement Learning & Automated Testing - part 1](http://blog.ostorlab.co/2018/01/reinforcement-learning-automated.html) |
| 119 | 2018.01.05 | venus_seebug | [AFL(American Fuzzy Lop)实现细节与文件变异](https://paper.seebug.org/496/) |
| 5 | 2018.01.03 | blahcat | [Fuzzing arbitrary functions in ELF binaries](http://blahcat.github.io/2018/03/11/fuzzing-arbitrary-functions-in-elf-binaries/) |
| 5 | 2018.01.01 | moveax | [Radare Basics](https://moveax.me/radare-basics/) |
| 12 | 2017.11.29 | securityinnovation_blog | [Understanding Security Challenges of Media Players](https://blog.securityinnovation.com/understanding-security-challenges-of-media-players) |
| 5 | 2017.11.23 | radiofreerobotron | [ROPEmporium: Pivot 32-bit CTF Walkthrough With Radare2](http://radiofreerobotron.net/blog/2017/11/23/ropemporium-pivot-ctf-walkthrough/) |
| 6 | 2017.11.23 | pediy_new_digest | [[翻译]类似AFL软件实现的属性测试技术](https://bbs.pediy.com/thread-222917.htm) |
| 17 | 2017.11.09 | aliyun_xz | [AFL-FUZZ 启用 llvm](https://xz.aliyun.com/t/1541) |
| 7 | 2017.11.08 | arxiv | [[1711.02807] Faster Fuzzing: Reinitialization with Deep Neural Models](https://arxiv.org/abs/1711.02807) |
| 45 | 2017.11.01 | njvoss299 | [afl-unicorn: Part 2 — Fuzzing the ‘Unfuzzable’](https://medium.com/p/bea8de3540a5) |
| 40 | 2017.10.31 | njvoss299 | [afl-unicorn: Fuzzing Arbitrary Binary Code](https://medium.com/p/563ca28936bf) |
| 13 | 2017
Download .txt
gitextract_aeqbslcx/

├── .directory
├── README.md
├── posts/
│   ├── .directory
│   ├── cc/
│   │   ├── 0Day_post_sort_by_cc_cnt.md
│   │   ├── 0Day_post_sort_by_time.md
│   │   ├── 1Day_post_sort_by_cc_cnt.md
│   │   ├── 1Day_post_sort_by_time.md
│   │   ├── 4G_post_sort_by_cc_cnt.md
│   │   ├── 4G_post_sort_by_time.md
│   │   ├── 5G_post_sort_by_cc_cnt.md
│   │   ├── 5G_post_sort_by_time.md
│   │   ├── AFLfuzzer_post_sort_by_cc_cnt.md
│   │   ├── AFLfuzzer_post_sort_by_time.md
│   │   ├── AMSI_post_sort_by_cc_cnt.md
│   │   ├── AMSI_post_sort_by_time.md
│   │   ├── APT_OceanLotus_post_sort_by_cc_cnt.md
│   │   ├── APT_OceanLotus_post_sort_by_time.md
│   │   ├── ASPack_post_sort_by_cc_cnt.md
│   │   ├── ASPack_post_sort_by_time.md
│   │   ├── AST_post_sort_by_cc_cnt.md
│   │   ├── AST_post_sort_by_time.md
│   │   ├── Aes_post_sort_by_cc_cnt.md
│   │   ├── Aes_post_sort_by_time.md
│   │   ├── Ai_post_sort_by_cc_cnt.md
│   │   ├── Ai_post_sort_by_time.md
│   │   ├── Aircrack_post_sort_by_cc_cnt.md
│   │   ├── Aircrack_post_sort_by_time.md
│   │   ├── Algorithm_post_sort_by_cc_cnt.md
│   │   ├── Algorithm_post_sort_by_time.md
│   │   ├── Androguard_post_sort_by_cc_cnt.md
│   │   ├── Androguard_post_sort_by_time.md
│   │   ├── Android_post_sort_by_cc_cnt.md
│   │   ├── Android_post_sort_by_time.md
│   │   ├── Anti-AV_post_sort_by_cc_cnt.md
│   │   ├── Anti-AV_post_sort_by_time.md
│   │   ├── Anti-Analysis_post_sort_by_cc_cnt.md
│   │   ├── Anti-Analysis_post_sort_by_time.md
│   │   ├── Anti-Debug_post_sort_by_cc_cnt.md
│   │   ├── Anti-Debug_post_sort_by_time.md
│   │   ├── Anti-Disassemble_post_sort_by_cc_cnt.md
│   │   ├── Anti-Disassemble_post_sort_by_time.md
│   │   ├── Anti-Forensic_post_sort_by_cc_cnt.md
│   │   ├── Anti-Forensic_post_sort_by_time.md
│   │   ├── Anti-VM_post_sort_by_cc_cnt.md
│   │   ├── Anti-VM_post_sort_by_time.md
│   │   ├── Apktool_post_sort_by_cc_cnt.md
│   │   ├── Apktool_post_sort_by_time.md
│   │   ├── Aslr_post_sort_by_cc_cnt.md
│   │   ├── Aslr_post_sort_by_time.md
│   │   ├── Auto-Start_post_sort_by_cc_cnt.md
│   │   ├── Auto-Start_post_sort_by_time.md
│   │   ├── Aws_post_sort_by_cc_cnt.md
│   │   ├── Aws_post_sort_by_time.md
│   │   ├── Backdoor_post_sort_by_cc_cnt.md
│   │   ├── Backdoor_post_sort_by_time.md
│   │   ├── BillGates_post_sort_by_cc_cnt.md
│   │   ├── BillGates_post_sort_by_time.md
│   │   ├── BinDiff_post_sort_by_cc_cnt.md
│   │   ├── BinDiff_post_sort_by_time.md
│   │   ├── BinWalk_post_sort_by_cc_cnt.md
│   │   ├── BinWalk_post_sort_by_time.md
│   │   ├── BinaryNinja_post_sort_by_cc_cnt.md
│   │   ├── BinaryNinja_post_sort_by_time.md
│   │   ├── Bios_post_sort_by_cc_cnt.md
│   │   ├── Bios_post_sort_by_time.md
│   │   ├── Bitcoin_post_sort_by_cc_cnt.md
│   │   ├── Bitcoin_post_sort_by_time.md
│   │   ├── Blacklisting_post_sort_by_cc_cnt.md
│   │   ├── Blacklisting_post_sort_by_time.md
│   │   ├── Blockchain_post_sort_by_cc_cnt.md
│   │   ├── Blockchain_post_sort_by_time.md
│   │   ├── BloodHound_post_sort_by_cc_cnt.md
│   │   ├── BloodHound_post_sort_by_time.md
│   │   ├── BlueTeam_post_sort_by_cc_cnt.md
│   │   ├── BlueTeam_post_sort_by_time.md
│   │   ├── Bootkit_post_sort_by_cc_cnt.md
│   │   ├── Bootkit_post_sort_by_time.md
│   │   ├── Bootloader_post_sort_by_cc_cnt.md
│   │   ├── Bootloader_post_sort_by_time.md
│   │   ├── Botnet_post_sort_by_cc_cnt.md
│   │   ├── Botnet_post_sort_by_time.md
│   │   ├── Burp_post_sort_by_cc_cnt.md
│   │   ├── Burp_post_sort_by_time.md
│   │   ├── CISSP_post_sort_by_cc_cnt.md
│   │   ├── CISSP_post_sort_by_time.md
│   │   ├── CKnife_post_sort_by_cc_cnt.md
│   │   ├── CKnife_post_sort_by_time.md
│   │   ├── CRLF_post_sort_by_cc_cnt.md
│   │   ├── CRLF_post_sort_by_time.md
│   │   ├── CVE_post_sort_by_cc_cnt.md
│   │   ├── CVE_post_sort_by_time.md
│   │   ├── Capstone_post_sort_by_cc_cnt.md
│   │   ├── Capstone_post_sort_by_time.md
│   │   ├── CheatEngine_post_sort_by_cc_cnt.md
│   │   ├── CheatEngine_post_sort_by_time.md
│   │   ├── CnC_post_sort_by_cc_cnt.md
│   │   ├── CnC_post_sort_by_time.md
│   │   ├── CobaltStrike_post_sort_by_cc_cnt.md
│   │   ├── CobaltStrike_post_sort_by_time.md
│   │   ├── CodeInjection_post_sort_by_cc_cnt.md
│   │   ├── CodeInjection_post_sort_by_time.md
│   │   ├── ContentInjection_post_sort_by_cc_cnt.md
│   │   ├── ContentInjection_post_sort_by_time.md
│   │   ├── ControlFlowFlattening_post_sort_by_cc_cnt.md
│   │   ├── ControlFlowFlattening_post_sort_by_time.md
│   │   ├── Crack_post_sort_by_cc_cnt.md
│   │   ├── Crack_post_sort_by_time.md
│   │   ├── Cryptography_post_sort_by_cc_cnt.md
│   │   ├── Cryptography_post_sort_by_time.md
│   │   ├── Csp_post_sort_by_cc_cnt.md
│   │   ├── Csp_post_sort_by_time.md
│   │   ├── Csrf_post_sort_by_cc_cnt.md
│   │   ├── Csrf_post_sort_by_time.md
│   │   ├── Ctf_post_sort_by_cc_cnt.md
│   │   ├── Ctf_post_sort_by_time.md
│   │   ├── CuckooDroid_post_sort_by_cc_cnt.md
│   │   ├── CuckooDroid_post_sort_by_time.md
│   │   ├── Cuckoo_post_sort_by_cc_cnt.md
│   │   ├── Cuckoo_post_sort_by_time.md
│   │   ├── D-Link_post_sort_by_cc_cnt.md
│   │   ├── D-Link_post_sort_by_time.md
│   │   ├── DDoS_post_sort_by_cc_cnt.md
│   │   ├── DDoS_post_sort_by_time.md
│   │   ├── DES_post_sort_by_cc_cnt.md
│   │   ├── DES_post_sort_by_time.md
│   │   ├── DLLInjection_post_sort_by_cc_cnt.md
│   │   ├── DLLInjection_post_sort_by_time.md
│   │   ├── DNSMap_post_sort_by_cc_cnt.md
│   │   ├── DNSMap_post_sort_by_time.md
│   │   ├── DOTA2_post_sort_by_cc_cnt.md
│   │   ├── DOTA2_post_sort_by_time.md
│   │   ├── Dalvik_post_sort_by_cc_cnt.md
│   │   ├── Dalvik_post_sort_by_time.md
│   │   ├── DarkWeb_post_sort_by_cc_cnt.md
│   │   ├── DarkWeb_post_sort_by_time.md
│   │   ├── DataBreach_post_sort_by_cc_cnt.md
│   │   ├── DataBreach_post_sort_by_time.md
│   │   ├── DataExfiltration_post_sort_by_cc_cnt.md
│   │   ├── DataExfiltration_post_sort_by_time.md
│   │   ├── Dbi_post_sort_by_cc_cnt.md
│   │   ├── Dbi_post_sort_by_time.md
│   │   ├── Dcom_post_sort_by_cc_cnt.md
│   │   ├── Dcom_post_sort_by_time.md
│   │   ├── DeVirtualization_post_sort_by_cc_cnt.md
│   │   ├── DeVirtualization_post_sort_by_time.md
│   │   ├── Decompiler_post_sort_by_cc_cnt.md
│   │   ├── Decompiler_post_sort_by_time.md
│   │   ├── Decrypt_post_sort_by_cc_cnt.md
│   │   ├── Decrypt_post_sort_by_time.md
│   │   ├── Deobfuscation_post_sort_by_cc_cnt.md
│   │   ├── Deobfuscation_post_sort_by_time.md
│   │   ├── DevOps_post_sort_by_cc_cnt.md
│   │   ├── DevOps_post_sort_by_time.md
│   │   ├── Dex2Jar_post_sort_by_cc_cnt.md
│   │   ├── Dex2Jar_post_sort_by_time.md
│   │   ├── DirectX_post_sort_by_cc_cnt.md
│   │   ├── DirectX_post_sort_by_time.md
│   │   ├── Disassembler_post_sort_by_cc_cnt.md
│   │   ├── Disassembler_post_sort_by_time.md
│   │   ├── Docker_post_sort_by_cc_cnt.md
│   │   ├── Docker_post_sort_by_time.md
│   │   ├── Downloader_post_sort_by_cc_cnt.md
│   │   ├── Downloader_post_sort_by_time.md
│   │   ├── Drone_post_sort_by_cc_cnt.md
│   │   ├── Drone_post_sort_by_time.md
│   │   ├── Dropper_post_sort_by_cc_cnt.md
│   │   ├── Dropper_post_sort_by_time.md
│   │   ├── DynamoRIO_post_sort_by_cc_cnt.md
│   │   ├── DynamoRIO_post_sort_by_time.md
│   │   ├── EDR_post_sort_by_cc_cnt.md
│   │   ├── EDR_post_sort_by_time.md
│   │   ├── Emotet_post_sort_by_cc_cnt.md
│   │   ├── Emotet_post_sort_by_time.md
│   │   ├── Empire_post_sort_by_cc_cnt.md
│   │   ├── Empire_post_sort_by_time.md
│   │   ├── Encrypt_post_sort_by_cc_cnt.md
│   │   ├── Encrypt_post_sort_by_time.md
│   │   ├── EnigmaProtect_post_sort_by_cc_cnt.md
│   │   ├── EnigmaProtect_post_sort_by_time.md
│   │   ├── Escape_post_sort_by_cc_cnt.md
│   │   ├── Escape_post_sort_by_time.md
│   │   ├── Fileless_post_sort_by_cc_cnt.md
│   │   ├── Fileless_post_sort_by_time.md
│   │   ├── FinFisher_post_sort_by_cc_cnt.md
│   │   ├── FinFisher_post_sort_by_time.md
│   │   ├── Fingerprinting_post_sort_by_cc_cnt.md
│   │   ├── Fingerprinting_post_sort_by_time.md
│   │   ├── Finspy_post_sort_by_cc_cnt.md
│   │   ├── Finspy_post_sort_by_time.md
│   │   ├── FireWall_post_sort_by_cc_cnt.md
│   │   ├── FireWall_post_sort_by_time.md
│   │   ├── Firmware_post_sort_by_cc_cnt.md
│   │   ├── Firmware_post_sort_by_time.md
│   │   ├── Forensic_post_sort_by_cc_cnt.md
│   │   ├── Forensic_post_sort_by_time.md
│   │   ├── Frida_post_sort_by_cc_cnt.md
│   │   ├── Frida_post_sort_by_time.md
│   │   ├── Fuzzing_post_sort_by_cc_cnt.md
│   │   ├── Fuzzing_post_sort_by_time.md
│   │   ├── Gdb_post_sort_by_cc_cnt.md
│   │   ├── Gdb_post_sort_by_time.md
│   │   ├── Getshell_post_sort_by_cc_cnt.md
│   │   ├── Getshell_post_sort_by_time.md
│   │   ├── Gfw_post_sort_by_cc_cnt.md
│   │   ├── Gfw_post_sort_by_time.md
│   │   ├── Ghidra_post_sort_by_cc_cnt.md
│   │   ├── Ghidra_post_sort_by_time.md
│   │   ├── HashCat_post_sort_by_cc_cnt.md
│   │   ├── HashCat_post_sort_by_time.md
│   │   ├── Heartbleed_post_sort_by_cc_cnt.md
│   │   ├── Heartbleed_post_sort_by_time.md
│   │   ├── Hids_post_sort_by_cc_cnt.md
│   │   ├── Hids_post_sort_by_time.md
│   │   ├── Hijack_post_sort_by_cc_cnt.md
│   │   ├── Hijack_post_sort_by_time.md
│   │   ├── Homographs_post_sort_by_cc_cnt.md
│   │   ├── Homographs_post_sort_by_time.md
│   │   ├── HoneyPot_post_sort_by_cc_cnt.md
│   │   ├── HoneyPot_post_sort_by_time.md
│   │   ├── Hooking_post_sort_by_cc_cnt.md
│   │   ├── Hooking_post_sort_by_time.md
│   │   ├── Hopper_post_sort_by_cc_cnt.md
│   │   ├── Hopper_post_sort_by_time.md
│   │   ├── Huawei_post_sort_by_cc_cnt.md
│   │   ├── Huawei_post_sort_by_time.md
│   │   ├── IDAPython_post_sort_by_cc_cnt.md
│   │   ├── IDAPython_post_sort_by_time.md
│   │   ├── IDN_post_sort_by_cc_cnt.md
│   │   ├── IDN_post_sort_by_time.md
│   │   ├── Ida_post_sort_by_cc_cnt.md
│   │   ├── Ida_post_sort_by_time.md
│   │   ├── Ids_post_sort_by_cc_cnt.md
│   │   ├── Ids_post_sort_by_time.md
│   │   ├── ImmunityDebugger_post_sort_by_cc_cnt.md
│   │   ├── ImmunityDebugger_post_sort_by_time.md
│   │   ├── IncidentResponse_post_sort_by_cc_cnt.md
│   │   ├── IncidentResponse_post_sort_by_time.md
│   │   ├── IntelPT_post_sort_by_cc_cnt.md
│   │   ├── IntelPT_post_sort_by_time.md
│   │   ├── IntelPin_post_sort_by_cc_cnt.md
│   │   ├── IntelPin_post_sort_by_time.md
│   │   ├── IntermediateLanguage_post_sort_by_cc_cnt.md
│   │   ├── IntermediateLanguage_post_sort_by_time.md
│   │   ├── IoC_post_sort_by_cc_cnt.md
│   │   ├── IoC_post_sort_by_time.md
│   │   ├── IoT_post_sort_by_cc_cnt.md
│   │   ├── IoT_post_sort_by_time.md
│   │   ├── Jailbreak_post_sort_by_cc_cnt.md
│   │   ├── Jailbreak_post_sort_by_time.md
│   │   ├── JavaDecompiler_post_sort_by_cc_cnt.md
│   │   ├── JavaDecompiler_post_sort_by_time.md
│   │   ├── Kali_post_sort_by_cc_cnt.md
│   │   ├── Kali_post_sort_by_time.md
│   │   ├── Kaslr_post_sort_by_cc_cnt.md
│   │   ├── Kaslr_post_sort_by_time.md
│   │   ├── Keylogging_post_sort_by_cc_cnt.md
│   │   ├── Keylogging_post_sort_by_time.md
│   │   ├── Kvm_post_sort_by_cc_cnt.md
│   │   ├── Kvm_post_sort_by_time.md
│   │   ├── LSP_post_sort_by_cc_cnt.md
│   │   ├── LSP_post_sort_by_time.md
│   │   ├── Labeless_post_sort_by_cc_cnt.md
│   │   ├── Labeless_post_sort_by_time.md
│   │   ├── Lantern_post_sort_by_cc_cnt.md
│   │   ├── Lantern_post_sort_by_time.md
│   │   ├── LateralMovement_post_sort_by_cc_cnt.md
│   │   ├── LateralMovement_post_sort_by_time.md
│   │   ├── Llvm_post_sort_by_cc_cnt.md
│   │   ├── Llvm_post_sort_by_time.md
│   │   ├── MemoryInjection_post_sort_by_cc_cnt.md
│   │   ├── MemoryInjection_post_sort_by_time.md
│   │   ├── Metasploit_post_sort_by_cc_cnt.md
│   │   ├── Metasploit_post_sort_by_time.md
│   │   ├── MiTB_post_sort_by_cc_cnt.md
│   │   ├── MiTB_post_sort_by_time.md
│   │   ├── Miasm_post_sort_by_cc_cnt.md
│   │   ├── Miasm_post_sort_by_time.md
│   │   ├── Microcode_post_sort_by_cc_cnt.md
│   │   ├── Microcode_post_sort_by_time.md
│   │   ├── Mimikatz_post_sort_by_cc_cnt.md
│   │   ├── Mimikatz_post_sort_by_time.md
│   │   ├── Mirai_post_sort_by_cc_cnt.md
│   │   ├── Mirai_post_sort_by_time.md
│   │   ├── Misp_post_sort_by_cc_cnt.md
│   │   ├── Misp_post_sort_by_time.md
│   │   ├── MitmProxy_post_sort_by_cc_cnt.md
│   │   ├── MitmProxy_post_sort_by_time.md
│   │   ├── Mitm_post_sort_by_cc_cnt.md
│   │   ├── Mitm_post_sort_by_time.md
│   │   ├── MitreATT&CK_post_sort_by_cc_cnt.md
│   │   ├── MitreATT&CK_post_sort_by_time.md
│   │   ├── Mona_post_sort_by_cc_cnt.md
│   │   ├── Mona_post_sort_by_time.md
│   │   ├── NMap_post_sort_by_cc_cnt.md
│   │   ├── NMap_post_sort_by_time.md
│   │   ├── OSCP_post_sort_by_cc_cnt.md
│   │   ├── OSCP_post_sort_by_time.md
│   │   ├── Obfuscation_post_sort_by_cc_cnt.md
│   │   ├── Obfuscation_post_sort_by_time.md
│   │   ├── ObjDump_post_sort_by_cc_cnt.md
│   │   ├── ObjDump_post_sort_by_time.md
│   │   ├── OfficeMacro_post_sort_by_cc_cnt.md
│   │   ├── OfficeMacro_post_sort_by_time.md
│   │   ├── OllyDbg_post_sort_by_cc_cnt.md
│   │   ├── OllyDbg_post_sort_by_time.md
│   │   ├── OnionScan_post_sort_by_cc_cnt.md
│   │   ├── OnionScan_post_sort_by_time.md
│   │   ├── OpaquePredicates_post_sort_by_cc_cnt.md
│   │   ├── OpaquePredicates_post_sort_by_time.md
│   │   ├── Osint_post_sort_by_cc_cnt.md
│   │   ├── Osint_post_sort_by_time.md
│   │   ├── Owasp_post_sort_by_cc_cnt.md
│   │   ├── Owasp_post_sort_by_time.md
│   │   ├── Packer_post_sort_by_cc_cnt.md
│   │   ├── Packer_post_sort_by_time.md
│   │   ├── Payload_post_sort_by_cc_cnt.md
│   │   ├── Payload_post_sort_by_time.md
│   │   ├── PenetrationTesting_post_sort_by_cc_cnt.md
│   │   ├── PenetrationTesting_post_sort_by_time.md
│   │   ├── Persistence_post_sort_by_cc_cnt.md
│   │   ├── Persistence_post_sort_by_time.md
│   │   ├── Phishing_post_sort_by_cc_cnt.md
│   │   ├── Phishing_post_sort_by_time.md
│   │   ├── PoC_post_sort_by_cc_cnt.md
│   │   ├── PoC_post_sort_by_time.md
│   │   ├── Poisoning_post_sort_by_cc_cnt.md
│   │   ├── Poisoning_post_sort_by_time.md
│   │   ├── Post-Exploitation_post_sort_by_cc_cnt.md
│   │   ├── Post-Exploitation_post_sort_by_time.md
│   │   ├── PowerSploit_post_sort_by_cc_cnt.md
│   │   ├── PowerSploit_post_sort_by_time.md
│   │   ├── Powershell_post_sort_by_cc_cnt.md
│   │   ├── Powershell_post_sort_by_time.md
│   │   ├── ProcDump_post_sort_by_cc_cnt.md
│   │   ├── ProcDump_post_sort_by_time.md
│   │   ├── ProcMon_post_sort_by_cc_cnt.md
│   │   ├── ProcMon_post_sort_by_time.md
│   │   ├── ProcessInjection_post_sort_by_cc_cnt.md
│   │   ├── ProcessInjection_post_sort_by_time.md
│   │   ├── Pwn2Own_post_sort_by_cc_cnt.md
│   │   ├── Pwn2Own_post_sort_by_time.md
│   │   ├── PwnAdventure3_post_sort_by_cc_cnt.md
│   │   ├── PwnAdventure3_post_sort_by_time.md
│   │   ├── Qemu_post_sort_by_cc_cnt.md
│   │   ├── Qemu_post_sort_by_time.md
│   │   ├── Radare2_post_sort_by_cc_cnt.md
│   │   ├── Radare2_post_sort_by_time.md
│   │   ├── Ransomware_post_sort_by_cc_cnt.md
│   │   ├── Ransomware_post_sort_by_time.md
│   │   ├── RaspberryPi_post_sort_by_cc_cnt.md
│   │   ├── RaspberryPi_post_sort_by_time.md
│   │   ├── Rat_post_sort_by_cc_cnt.md
│   │   ├── Rat_post_sort_by_time.md
│   │   ├── Rdp_post_sort_by_cc_cnt.md
│   │   ├── Rdp_post_sort_by_time.md
│   │   ├── Reconnaissance_post_sort_by_cc_cnt.md
│   │   ├── Reconnaissance_post_sort_by_time.md
│   │   ├── RedTeam_post_sort_by_cc_cnt.md
│   │   ├── RedTeam_post_sort_by_time.md
│   │   ├── Rekall_post_sort_by_cc_cnt.md
│   │   ├── Rekall_post_sort_by_time.md
│   │   ├── Retdec_post_sort_by_cc_cnt.md
│   │   ├── Retdec_post_sort_by_time.md
│   │   ├── ReverseEngineering_post_sort_by_cc_cnt.md
│   │   ├── ReverseEngineering_post_sort_by_time.md
│   │   ├── ReverseProxy_post_sort_by_cc_cnt.md
│   │   ├── ReverseProxy_post_sort_by_time.md
│   │   ├── ReverseShell_post_sort_by_cc_cnt.md
│   │   ├── ReverseShell_post_sort_by_time.md
│   │   ├── RootKit_post_sort_by_cc_cnt.md
│   │   ├── RootKit_post_sort_by_time.md
│   │   ├── Router_post_sort_by_cc_cnt.md
│   │   ├── Router_post_sort_by_time.md
│   │   ├── Rsa_post_sort_by_cc_cnt.md
│   │   ├── Rsa_post_sort_by_time.md
│   │   ├── Russia_post_sort_by_cc_cnt.md
│   │   ├── Russia_post_sort_by_time.md
│   │   ├── SQLInjection_post_sort_by_cc_cnt.md
│   │   ├── SQLInjection_post_sort_by_time.md
│   │   ├── Safengine_post_sort_by_cc_cnt.md
│   │   ├── Safengine_post_sort_by_time.md
│   │   ├── SandBox_post_sort_by_cc_cnt.md
│   │   ├── SandBox_post_sort_by_time.md
│   │   ├── ScyllaHide_post_sort_by_cc_cnt.md
│   │   ├── ScyllaHide_post_sort_by_time.md
│   │   ├── Shadowbroker_post_sort_by_cc_cnt.md
│   │   ├── Shadowbroker_post_sort_by_time.md
│   │   ├── Shadowsocks_post_sort_by_cc_cnt.md
│   │   ├── Shadowsocks_post_sort_by_time.md
│   │   ├── Shellcode_post_sort_by_cc_cnt.md
│   │   ├── Shellcode_post_sort_by_time.md
│   │   ├── Shodan_post_sort_by_cc_cnt.md
│   │   ├── Shodan_post_sort_by_time.md
│   │   ├── Smali_post_sort_by_cc_cnt.md
│   │   ├── Smali_post_sort_by_time.md
│   │   ├── SmartContract_post_sort_by_cc_cnt.md
│   │   ├── SmartContract_post_sort_by_time.md
│   │   ├── Smb_post_sort_by_cc_cnt.md
│   │   ├── Smb_post_sort_by_time.md
│   │   ├── Sniffing_post_sort_by_cc_cnt.md
│   │   ├── Sniffing_post_sort_by_time.md
│   │   ├── Snort_post_sort_by_cc_cnt.md
│   │   ├── Snort_post_sort_by_time.md
│   │   ├── SourceCodeAuditing_post_sort_by_cc_cnt.md
│   │   ├── SourceCodeAuditing_post_sort_by_time.md
│   │   ├── SpearPhishing_post_sort_by_cc_cnt.md
│   │   ├── SpearPhishing_post_sort_by_time.md
│   │   ├── Spoof_post_sort_by_cc_cnt.md
│   │   ├── Spoof_post_sort_by_time.md
│   │   ├── SqlMap_post_sort_by_cc_cnt.md
│   │   ├── SqlMap_post_sort_by_time.md
│   │   ├── Ssl_post_sort_by_cc_cnt.md
│   │   ├── Ssl_post_sort_by_time.md
│   │   ├── Steganography_post_sort_by_cc_cnt.md
│   │   ├── Steganography_post_sort_by_time.md
│   │   ├── Stuxnet_post_sort_by_cc_cnt.md
│   │   ├── Stuxnet_post_sort_by_time.md
│   │   ├── Subdomain_post_sort_by_cc_cnt.md
│   │   ├── Subdomain_post_sort_by_time.md
│   │   ├── SymbolicExecution_post_sort_by_cc_cnt.md
│   │   ├── SymbolicExecution_post_sort_by_time.md
│   │   ├── Sysmon_post_sort_by_cc_cnt.md
│   │   ├── Sysmon_post_sort_by_time.md
│   │   ├── TP-Link_post_sort_by_cc_cnt.md
│   │   ├── TP-Link_post_sort_by_time.md
│   │   ├── TeamViewer_post_sort_by_cc_cnt.md
│   │   ├── TeamViewer_post_sort_by_time.md
│   │   ├── TheHive_post_sort_by_cc_cnt.md
│   │   ├── TheHive_post_sort_by_time.md
│   │   ├── Themida_post_sort_by_cc_cnt.md
│   │   ├── Themida_post_sort_by_time.md
│   │   ├── ThreatHunting_post_sort_by_cc_cnt.md
│   │   ├── ThreatHunting_post_sort_by_time.md
│   │   ├── ThreatIntelligence_post_sort_by_cc_cnt.md
│   │   ├── ThreatIntelligence_post_sort_by_time.md
│   │   ├── TitanEngine_post_sort_by_cc_cnt.md
│   │   ├── TitanEngine_post_sort_by_time.md
│   │   ├── TitanHide_post_sort_by_cc_cnt.md
│   │   ├── TitanHide_post_sort_by_time.md
│   │   ├── Tls_post_sort_by_cc_cnt.md
│   │   ├── Tls_post_sort_by_time.md
│   │   ├── Tor_post_sort_by_cc_cnt.md
│   │   ├── Tor_post_sort_by_time.md
│   │   ├── Trickbot_post_sort_by_cc_cnt.md
│   │   ├── Trickbot_post_sort_by_time.md
│   │   ├── Trojan_post_sort_by_cc_cnt.md
│   │   ├── Trojan_post_sort_by_time.md
│   │   ├── Tunnelling_post_sort_by_cc_cnt.md
│   │   ├── Tunnelling_post_sort_by_time.md
│   │   ├── UACBypass_post_sort_by_cc_cnt.md
│   │   ├── UACBypass_post_sort_by_time.md
│   │   ├── Uac_post_sort_by_cc_cnt.md
│   │   ├── Uac_post_sort_by_time.md
│   │   ├── Unicorn_post_sort_by_cc_cnt.md
│   │   ├── Unicorn_post_sort_by_time.md
│   │   ├── Uroburos_post_sort_by_cc_cnt.md
│   │   ├── Uroburos_post_sort_by_time.md
│   │   ├── VEH_post_sort_by_cc_cnt.md
│   │   ├── VEH_post_sort_by_time.md
│   │   ├── VM-Escape_post_sort_by_cc_cnt.md
│   │   ├── VM-Escape_post_sort_by_time.md
│   │   ├── VMProtect_post_sort_by_cc_cnt.md
│   │   ├── VMProtect_post_sort_by_time.md
│   │   ├── VMware_post_sort_by_cc_cnt.md
│   │   ├── VMware_post_sort_by_time.md
│   │   ├── Vbs_post_sort_by_cc_cnt.md
│   │   ├── Vbs_post_sort_by_time.md
│   │   ├── Virtualization_post_sort_by_cc_cnt.md
│   │   ├── Virtualization_post_sort_by_time.md
│   │   ├── Vm_post_sort_by_cc_cnt.md
│   │   ├── Vm_post_sort_by_time.md
│   │   ├── Volatility_post_sort_by_cc_cnt.md
│   │   ├── Volatility_post_sort_by_time.md
│   │   ├── Vpn_post_sort_by_cc_cnt.md
│   │   ├── Vpn_post_sort_by_time.md
│   │   ├── WannaCry_post_sort_by_cc_cnt.md
│   │   ├── WannaCry_post_sort_by_time.md
│   │   ├── WateringHole_post_sort_by_cc_cnt.md
│   │   ├── WateringHole_post_sort_by_time.md
│   │   ├── WeChat_post_sort_by_cc_cnt.md
│   │   ├── WeChat_post_sort_by_time.md
│   │   ├── Whitelisting_post_sort_by_cc_cnt.md
│   │   ├── Whitelisting_post_sort_by_time.md
│   │   ├── WinAFL_post_sort_by_cc_cnt.md
│   │   ├── WinAFL_post_sort_by_time.md
│   │   ├── WinLicense_post_sort_by_cc_cnt.md
│   │   ├── WinLicense_post_sort_by_time.md
│   │   ├── Windbg_post_sort_by_cc_cnt.md
│   │   ├── Windbg_post_sort_by_time.md
│   │   ├── Wireshark_post_sort_by_cc_cnt.md
│   │   ├── Wireshark_post_sort_by_time.md
│   │   ├── Wmi_post_sort_by_cc_cnt.md
│   │   ├── Wmi_post_sort_by_time.md
│   │   ├── X64Dbg_post_sort_by_cc_cnt.md
│   │   ├── X64Dbg_post_sort_by_time.md
│   │   ├── XCode_post_sort_by_cc_cnt.md
│   │   ├── XCode_post_sort_by_time.md
│   │   ├── XIGNCODE3_post_sort_by_cc_cnt.md
│   │   ├── XIGNCODE3_post_sort_by_time.md
│   │   ├── Xposed_post_sort_by_cc_cnt.md
│   │   ├── Xposed_post_sort_by_time.md
│   │   ├── Xxe_post_sort_by_cc_cnt.md
│   │   ├── Xxe_post_sort_by_time.md
│   │   ├── Yara_post_sort_by_cc_cnt.md
│   │   ├── Yara_post_sort_by_time.md
│   │   ├── ZeusVM_post_sort_by_cc_cnt.md
│   │   ├── ZeusVM_post_sort_by_time.md
│   │   ├── baksmali_post_sort_by_cc_cnt.md
│   │   ├── baksmali_post_sort_by_time.md
│   │   ├── de4dot_post_sort_by_cc_cnt.md
│   │   ├── de4dot_post_sort_by_time.md
│   │   ├── dnSpy_post_sort_by_cc_cnt.md
│   │   ├── dnSpy_post_sort_by_time.md
│   │   ├── iOS_post_sort_by_cc_cnt.md
│   │   ├── iOS_post_sort_by_time.md
│   │   ├── nProtect_post_sort_by_cc_cnt.md
│   │   ├── nProtect_post_sort_by_time.md
│   │   ├── ollvm_post_sort_by_cc_cnt.md
│   │   ├── ollvm_post_sort_by_time.md
│   │   ├── reconng_post_sort_by_cc_cnt.md
│   │   ├── reconng_post_sort_by_time.md
│   │   ├── suricata_post_sort_by_cc_cnt.md
│   │   ├── suricata_post_sort_by_time.md
│   │   ├── virtualbox_post_sort_by_cc_cnt.md
│   │   ├── virtualbox_post_sort_by_time.md
│   │   ├── 隐写术_post_sort_by_cc_cnt.md
│   │   ├── 隐写术_post_sort_by_time.md
│   │   ├── 黑产_post_sort_by_cc_cnt.md
│   │   └── 黑产_post_sort_by_time.md
│   └── cc_sum.md
└── tools/
    ├── tool_collection_list.md
    └── tool_list.md
Copy disabled (too large) Download .json
Condensed preview — 532 files, each showing path, character count, and a content snippet. Download the .json file for the full structured content (50,364K chars).
[
  {
    "path": ".directory",
    "chars": 59,
    "preview": "[Dolphin]\nTimestamp=2019,5,16,8,45,51\nVersion=4\nViewMode=1\n"
  },
  {
    "path": "README.md",
    "chars": 97,
    "preview": "# 网安图书馆\n\n## 简要说明\n- 从近2000个网络安全相关的资讯、博客站点中爬取的文章,并对文章内容进行索引等操作\n  - 搜索:\n\n## 子项目\n- 后端: \n- 前端:\n\n## 示例\n"
  },
  {
    "path": "posts/.directory",
    "chars": 59,
    "preview": "[Dolphin]\nTimestamp=2019,5,16,8,46,40\nVersion=4\nViewMode=1\n"
  },
  {
    "path": "posts/cc/0Day_post_sort_by_cc_cnt.md",
    "chars": 36656,
    "preview": "0Day\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 59 | 2014.10.08 | _91ri | [“Xsser mRAT”首个X国高级IOS木马]("
  },
  {
    "path": "posts/cc/0Day_post_sort_by_time.md",
    "chars": 36656,
    "preview": "0Day\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 5 | 2019.05.02 | kitploit_exploit | [Windows PowerSh"
  },
  {
    "path": "posts/cc/1Day_post_sort_by_cc_cnt.md",
    "chars": 342,
    "preview": "1Day\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 6 | 2016.06.28 | cr4 | [Exploring and exploiting Len"
  },
  {
    "path": "posts/cc/1Day_post_sort_by_time.md",
    "chars": 342,
    "preview": "1Day\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 6 | 2019.04.04 | nsfocus_blog | [跟时间赛跑——1Day、NDay漏洞防"
  },
  {
    "path": "posts/cc/4G_post_sort_by_cc_cnt.md",
    "chars": 16223,
    "preview": "4G\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 132 | 2019.01.03 | linuxgizmos | [Catalog of 122 open-"
  },
  {
    "path": "posts/cc/4G_post_sort_by_time.md",
    "chars": 16223,
    "preview": "4G\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 6 | 2019.04.18 | linuxgizmos | [Open-spec touch panel "
  },
  {
    "path": "posts/cc/5G_post_sort_by_cc_cnt.md",
    "chars": 32162,
    "preview": "5G\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 67 | 2018.10.18 | 4hou_wireless | [5G规范安全性和协议漏洞分析(上篇)]"
  },
  {
    "path": "posts/cc/5G_post_sort_by_time.md",
    "chars": 32162,
    "preview": "5G\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 30 | 2019.05.09 | cisco_blogs | [And That’s a Wrap – B"
  },
  {
    "path": "posts/cc/AFLfuzzer_post_sort_by_cc_cnt.md",
    "chars": 19911,
    "preview": "AFLfuzzer\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 162 | 2017.07.10 | reverse_archives | [How to c"
  },
  {
    "path": "posts/cc/AFLfuzzer_post_sort_by_time.md",
    "chars": 19911,
    "preview": "AFLfuzzer\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 24 | 2019.04.25 | kitploit_home | [drAFL - AFL "
  },
  {
    "path": "posts/cc/AMSI_post_sort_by_cc_cnt.md",
    "chars": 10025,
    "preview": "AMSI\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 125 | 2018.06.26 | 4hou_technology | [探索PowerShell A"
  },
  {
    "path": "posts/cc/AMSI_post_sort_by_time.md",
    "chars": 10025,
    "preview": "AMSI\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 32 | 2019.04.29 | 4hou_technology | [如何绕过AMSI for VB"
  },
  {
    "path": "posts/cc/APT_OceanLotus_post_sort_by_cc_cnt.md",
    "chars": 7730,
    "preview": "APT_OceanLotus\nAPT-C-00, APT32, 海莲花, CobaltKitty, SeaLotus\n海莲花, 长期针对中国及其他东亚国家(地区)政府、科研机构、海运企业等领域进行攻击的APT组织\n\n| 时间 | CC数目 "
  },
  {
    "path": "posts/cc/APT_OceanLotus_post_sort_by_time.md",
    "chars": 7730,
    "preview": "APT_OceanLotus\nAPT-C-00, APT32, 海莲花, CobaltKitty, SeaLotus\n海莲花, 长期针对中国及其他东亚国家(地区)政府、科研机构、海运企业等领域进行攻击的APT组织\n\n| 时间 | CC数目 "
  },
  {
    "path": "posts/cc/ASPack_post_sort_by_cc_cnt.md",
    "chars": 2313,
    "preview": "ASPack\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 426 | 2009.06.08 | pediy_new_digest | [[原创]AsPack2"
  },
  {
    "path": "posts/cc/ASPack_post_sort_by_time.md",
    "chars": 2313,
    "preview": "ASPack\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 12 | 2018.12.31 | pediy_new_digest | [[原创]VxPack 开"
  },
  {
    "path": "posts/cc/AST_post_sort_by_cc_cnt.md",
    "chars": 35308,
    "preview": "AST\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 250 | 2017.10.14 | lihaoyi | [FastParse 1.0: Past, Pr"
  },
  {
    "path": "posts/cc/AST_post_sort_by_time.md",
    "chars": 35308,
    "preview": "AST\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 10 | 2019.05.08 | 4hou_vulnerable | [如何在v8引擎中找到未被发现的攻"
  },
  {
    "path": "posts/cc/Aes_post_sort_by_cc_cnt.md",
    "chars": 126270,
    "preview": "Aes\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 142 | 2015.11.23 | linuxjournal | [Cipher Security: H"
  },
  {
    "path": "posts/cc/Aes_post_sort_by_time.md",
    "chars": 126270,
    "preview": "Aes\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 6 | 2019.05.10 | xpnsec_blog | [Exploring Mimikatz - "
  },
  {
    "path": "posts/cc/Ai_post_sort_by_cc_cnt.md",
    "chars": 244688,
    "preview": "Ai\nMachineLearning, DeepLearning\n人工智能/机器学习/深度学习\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 92 | 2017.01.18"
  },
  {
    "path": "posts/cc/Ai_post_sort_by_time.md",
    "chars": 244688,
    "preview": "Ai\nMachineLearning, DeepLearning\n人工智能/机器学习/深度学习\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 11 | 2019.05.09"
  },
  {
    "path": "posts/cc/Aircrack_post_sort_by_cc_cnt.md",
    "chars": 12376,
    "preview": "Aircrack\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 122 | 2014.03.28 | z4ziggy | [Building aircrack-"
  },
  {
    "path": "posts/cc/Aircrack_post_sort_by_time.md",
    "chars": 12376,
    "preview": "Aircrack\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 5 | 2019.02.12 | infosecinstitute | [Popular Too"
  },
  {
    "path": "posts/cc/Algorithm_post_sort_by_cc_cnt.md",
    "chars": 359953,
    "preview": "Algorithm\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 150 | 2018.08.14 | citizenlab_research_free_exp"
  },
  {
    "path": "posts/cc/Algorithm_post_sort_by_time.md",
    "chars": 359953,
    "preview": "Algorithm\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 7 | 2019.05.10 | acolyer | [Distributed consens"
  },
  {
    "path": "posts/cc/Androguard_post_sort_by_cc_cnt.md",
    "chars": 2569,
    "preview": "Androguard\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 23 | 2018.04.30 | infosecinstitute | [Android "
  },
  {
    "path": "posts/cc/Androguard_post_sort_by_time.md",
    "chars": 2569,
    "preview": "Androguard\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 8 | 2019.01.28 | securityonline | [androguard "
  },
  {
    "path": "posts/cc/Android_post_sort_by_cc_cnt.md",
    "chars": 989929,
    "preview": "Android\n\n跟Android安全相关的各种\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 528 | 2016.01.21 | vxsecurity | [[ Tec"
  },
  {
    "path": "posts/cc/Android_post_sort_by_time.md",
    "chars": 989929,
    "preview": "Android\n\n跟Android安全相关的各种\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 99 | 2019.05.11 | freebuf | [Anubis An"
  },
  {
    "path": "posts/cc/Anti-AV_post_sort_by_cc_cnt.md",
    "chars": 2626,
    "preview": "Anti-AV\n免杀\n免杀\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 37 | 2017.05.22 | pediy_new_digest | [[原创]免杀技术有一套"
  },
  {
    "path": "posts/cc/Anti-AV_post_sort_by_time.md",
    "chars": 2626,
    "preview": "Anti-AV\n免杀\n免杀\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 5 | 2018.11.14 | freebuf | [浅谈大型互联网企业入侵检测及防护策略](h"
  },
  {
    "path": "posts/cc/Anti-Analysis_post_sort_by_cc_cnt.md",
    "chars": 3440,
    "preview": "Anti-Analysis\n\n反分析手段\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 15 | 2015.05.04 | talosintelligence_blog |"
  },
  {
    "path": "posts/cc/Anti-Analysis_post_sort_by_time.md",
    "chars": 3440,
    "preview": "Anti-Analysis\n\n反分析手段\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 6 | 2019.01.11 | youtube | [Unpacking the "
  },
  {
    "path": "posts/cc/Anti-Debug_post_sort_by_cc_cnt.md",
    "chars": 16071,
    "preview": "Anti-Debug\n反调试\n反调试\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 92 | 2018.08.22 | topsec_adlab | [Windows下反("
  },
  {
    "path": "posts/cc/Anti-Debug_post_sort_by_time.md",
    "chars": 16071,
    "preview": "Anti-Debug\n反调试\n反调试\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 17 | 2019.04.18 | 360_anquanke_learning | [W"
  },
  {
    "path": "posts/cc/Anti-Disassemble_post_sort_by_cc_cnt.md",
    "chars": 5286,
    "preview": "Anti-Disassemble\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 45 | 2011.11.26 | pediy_new_digest | [[原"
  },
  {
    "path": "posts/cc/Anti-Disassemble_post_sort_by_time.md",
    "chars": 5286,
    "preview": "Anti-Disassemble\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 5 | 2018.08.22 | topsec_adlab | [Windows"
  },
  {
    "path": "posts/cc/Anti-Forensic_post_sort_by_cc_cnt.md",
    "chars": 1973,
    "preview": "Anti-Forensic\n\n反取证\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 13 | 2015.07.02 | hexacorn | [Links to post "
  },
  {
    "path": "posts/cc/Anti-Forensic_post_sort_by_time.md",
    "chars": 1973,
    "preview": "Anti-Forensic\n\n反取证\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 6 | 2018.01.16 | boredhackerblog | [Digital "
  },
  {
    "path": "posts/cc/Anti-VM_post_sort_by_cc_cnt.md",
    "chars": 2213,
    "preview": "Anti-VM\nAnti-Sandbox\n反虚拟机\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 23 | 2018.04.05 | pediy_new_digest | "
  },
  {
    "path": "posts/cc/Anti-VM_post_sort_by_time.md",
    "chars": 2213,
    "preview": "Anti-VM\nAnti-Sandbox\n反虚拟机\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 20 | 2018.08.18 | pediy_new_digest | "
  },
  {
    "path": "posts/cc/Apktool_post_sort_by_cc_cnt.md",
    "chars": 15509,
    "preview": "Apktool\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 46 | 2018.04.11 | infosecinstitute | [Android Pen"
  },
  {
    "path": "posts/cc/Apktool_post_sort_by_time.md",
    "chars": 15509,
    "preview": "Apktool\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 7 | 2019.03.03 | connortumbleson | [Apktool v2.4."
  },
  {
    "path": "posts/cc/Aslr_post_sort_by_cc_cnt.md",
    "chars": 37906,
    "preview": "Aslr\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 55 | 2016.01.03 | pediy_new_digest | [[翻译]《深入解析windo"
  },
  {
    "path": "posts/cc/Aslr_post_sort_by_time.md",
    "chars": 37906,
    "preview": "Aslr\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 5 | 2019.04.30 | aliyun_xz | [ROIS *CTF2019 Writeup]"
  },
  {
    "path": "posts/cc/Auto-Start_post_sort_by_cc_cnt.md",
    "chars": 44702,
    "preview": "Auto-Start\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 143 | 2012.08.16 | pediy_new_digest | [[原创]And"
  },
  {
    "path": "posts/cc/Auto-Start_post_sort_by_time.md",
    "chars": 44702,
    "preview": "Auto-Start\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 10 | 2019.05.07 | sans_org_digital_forensics_b"
  },
  {
    "path": "posts/cc/Aws_post_sort_by_cc_cnt.md",
    "chars": 276787,
    "preview": "Aws\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 192 | 2019.04.16 | apriorit_blogs | [3 Steps to Deplo"
  },
  {
    "path": "posts/cc/Aws_post_sort_by_time.md",
    "chars": 276787,
    "preview": "Aws\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 5 | 2019.05.10 | rapid7 | [Boost 2019 Customer Confer"
  },
  {
    "path": "posts/cc/Backdoor_post_sort_by_cc_cnt.md",
    "chars": 222748,
    "preview": "Backdoor\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 161 | 2015.07.05 | cr4 | [Building reliable SMM "
  },
  {
    "path": "posts/cc/Backdoor_post_sort_by_time.md",
    "chars": 222748,
    "preview": "Backdoor\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 9 | 2019.05.09 | 4hou_typ | [buhtrap后门和勒索软件通过广告平"
  },
  {
    "path": "posts/cc/BillGates_post_sort_by_cc_cnt.md",
    "chars": 2029,
    "preview": "BillGates\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 18 | 2017.12.03 | bartblaze | [Notes on Linux/B"
  },
  {
    "path": "posts/cc/BillGates_post_sort_by_time.md",
    "chars": 2029,
    "preview": "BillGates\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 5 | 2019.01.13 | freebuf | [挖洞经验 - 看我如何发现谷歌电子表格"
  },
  {
    "path": "posts/cc/BinDiff_post_sort_by_cc_cnt.md",
    "chars": 2625,
    "preview": "BinDiff\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 31 | 2018.05.25 | tradahacking | [So sánh binary "
  },
  {
    "path": "posts/cc/BinDiff_post_sort_by_time.md",
    "chars": 2625,
    "preview": "BinDiff\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 6 | 2019.04.25 | 4hou_tools | [Karta:一款新的二进制文件分析和"
  },
  {
    "path": "posts/cc/BinWalk_post_sort_by_cc_cnt.md",
    "chars": 8177,
    "preview": "BinWalk\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 44 | 2013.10.28 | freebuf | [Binwalk:后门(固件)分析利器]("
  },
  {
    "path": "posts/cc/BinWalk_post_sort_by_time.md",
    "chars": 8177,
    "preview": "BinWalk\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 27 | 2019.05.03 | pentestpartners | [How To Do Fi"
  },
  {
    "path": "posts/cc/BinaryNinja_post_sort_by_cc_cnt.md",
    "chars": 1809,
    "preview": "BinaryNinja\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 20 | 2018.04.04 | trailofbits | [Vulnerabilit"
  },
  {
    "path": "posts/cc/BinaryNinja_post_sort_by_time.md",
    "chars": 1809,
    "preview": "BinaryNinja\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 5 | 2019.04.09 | nickcano | [Demystifying Epi"
  },
  {
    "path": "posts/cc/Bios_post_sort_by_cc_cnt.md",
    "chars": 50829,
    "preview": "Bios\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 989 | 2009.06.28 | marcan | [Enabling Intel VT on th"
  },
  {
    "path": "posts/cc/Bios_post_sort_by_time.md",
    "chars": 50829,
    "preview": "Bios\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 13 | 2019.05.10 | hakin9_blog | [Setting up a multi-"
  },
  {
    "path": "posts/cc/Bitcoin_post_sort_by_cc_cnt.md",
    "chars": 258084,
    "preview": "Bitcoin\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 137 | 2018.06.18 | id_ransomware | [Scarab-Bomber"
  },
  {
    "path": "posts/cc/Bitcoin_post_sort_by_time.md",
    "chars": 258084,
    "preview": "Bitcoin\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 5 | 2019.05.12 | muellerberndt | [Blockchain? Bah"
  },
  {
    "path": "posts/cc/Blacklisting_post_sort_by_cc_cnt.md",
    "chars": 69021,
    "preview": "Blacklisting\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 52 | 2017.01.24 | realpython | [Token-Based "
  },
  {
    "path": "posts/cc/Blacklisting_post_sort_by_time.md",
    "chars": 69021,
    "preview": "Blacklisting\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 17 | 2019.05.09 | intezer_blog_new | [Techni"
  },
  {
    "path": "posts/cc/Blockchain_post_sort_by_cc_cnt.md",
    "chars": 122698,
    "preview": "Blockchain\n\n区块链\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 243 | 2018.03.01 | pediy_new_digest | [[翻译]国外20"
  },
  {
    "path": "posts/cc/Blockchain_post_sort_by_time.md",
    "chars": 122698,
    "preview": "Blockchain\n\n区块链\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 17 | 2019.05.12 | muellerberndt | [Blockchain? "
  },
  {
    "path": "posts/cc/BloodHound_post_sort_by_cc_cnt.md",
    "chars": 9808,
    "preview": "BloodHound\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 72 | 2017.09.29 | tevora | [Lay of the Land wi"
  },
  {
    "path": "posts/cc/BloodHound_post_sort_by_time.md",
    "chars": 9808,
    "preview": "BloodHound\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 6 | 2019.04.30 | insinuator | [#TR19 Active Di"
  },
  {
    "path": "posts/cc/BlueTeam_post_sort_by_cc_cnt.md",
    "chars": 9556,
    "preview": "BlueTeam\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 26 | 2018.10.30 | infosecinstitute | [How Red Te"
  },
  {
    "path": "posts/cc/BlueTeam_post_sort_by_time.md",
    "chars": 9556,
    "preview": "BlueTeam\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 11 | 2019.04.01 | aliyun_xz | [RemTeam攻击技巧和安全防御]"
  },
  {
    "path": "posts/cc/Bootkit_post_sort_by_cc_cnt.md",
    "chars": 11645,
    "preview": "Bootkit\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 76 | 2010.01.08 | nobunkum | [Bootkits – a new st"
  },
  {
    "path": "posts/cc/Bootkit_post_sort_by_time.md",
    "chars": 11645,
    "preview": "Bootkit\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 11 | 2019.04.19 | kitploit_home | [EfiGuard - Dis"
  },
  {
    "path": "posts/cc/Bootloader_post_sort_by_cc_cnt.md",
    "chars": 26416,
    "preview": "Bootloader\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 121 | 2017.05.23 | securityresear | [initroot:"
  },
  {
    "path": "posts/cc/Bootloader_post_sort_by_time.md",
    "chars": 26416,
    "preview": "Bootloader\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 7 | 2019.05.03 | pentestpartners | [How To Do "
  },
  {
    "path": "posts/cc/Botnet_post_sort_by_cc_cnt.md",
    "chars": 264168,
    "preview": "Botnet\n\n僵尸网络\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 187 | 2017.01.17 | 360_anquanke_learning | [2016僵尸"
  },
  {
    "path": "posts/cc/Botnet_post_sort_by_time.md",
    "chars": 264168,
    "preview": "Botnet\n\n僵尸网络\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 15 | 2019.05.08 | 360_anquanke_learning | [以P2P的方式"
  },
  {
    "path": "posts/cc/Burp_post_sort_by_cc_cnt.md",
    "chars": 107418,
    "preview": "Burp\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 354 | 2017.04.21 | aliyun_xz | [Burp Suite收集到的录像、文档以"
  },
  {
    "path": "posts/cc/Burp_post_sort_by_time.md",
    "chars": 107418,
    "preview": "Burp\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 22 | 2019.05.11 | infosecaddicts | [Burp Suite](http"
  },
  {
    "path": "posts/cc/CISSP_post_sort_by_cc_cnt.md",
    "chars": 10790,
    "preview": "CISSP\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 50 | 2018.07.05 | netwrix_security | [10 Best Study"
  },
  {
    "path": "posts/cc/CISSP_post_sort_by_time.md",
    "chars": 10790,
    "preview": "CISSP\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 28 | 2019.04.05 | securityartwork | [CISSP certific"
  },
  {
    "path": "posts/cc/CKnife_post_sort_by_cc_cnt.md",
    "chars": 1316,
    "preview": "CKnife\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 38 | 2016.07.20 | 360_anquanke_learning | [​分析Ckni"
  },
  {
    "path": "posts/cc/CKnife_post_sort_by_time.md",
    "chars": 1316,
    "preview": "CKnife\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 8 | 2017.08.30 | freebuf | [Cknife的PHP功能部分修正,解决SHE"
  },
  {
    "path": "posts/cc/CRLF_post_sort_by_cc_cnt.md",
    "chars": 4144,
    "preview": "CRLF\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 38 | 2017.11.08 | 360_anquanke_learning | [看我如何在比特币钱"
  },
  {
    "path": "posts/cc/CRLF_post_sort_by_time.md",
    "chars": 4144,
    "preview": "CRLF\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 8 | 2019.04.23 | 360_anquanke_learning | [对过WAF的一些认知"
  },
  {
    "path": "posts/cc/CVE_post_sort_by_cc_cnt.md",
    "chars": 656666,
    "preview": "CVE\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 1052 | 2017.12.28 | 360_anquanke_learning | [苹果平台2017"
  },
  {
    "path": "posts/cc/CVE_post_sort_by_time.md",
    "chars": 656666,
    "preview": "CVE\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 14 | 2019.05.13 | kitploit_home | [Sn1per v7.0 - Auto"
  },
  {
    "path": "posts/cc/Capstone_post_sort_by_cc_cnt.md",
    "chars": 4274,
    "preview": "Capstone\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 51 | 2017.04.25 | pediy_new_digest | [[分享]Androi"
  },
  {
    "path": "posts/cc/Capstone_post_sort_by_time.md",
    "chars": 4274,
    "preview": "Capstone\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 8 | 2018.10.24 | kitploit_home | [Sandsifter - T"
  },
  {
    "path": "posts/cc/CheatEngine_post_sort_by_cc_cnt.md",
    "chars": 1470,
    "preview": "CheatEngine\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 17 | 2006.12.08 | pediy_new_digest | [None](h"
  },
  {
    "path": "posts/cc/CheatEngine_post_sort_by_time.md",
    "chars": 1470,
    "preview": "CheatEngine\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 7 | 2019.03.12 | youtube | [Game Hacking Tuto"
  },
  {
    "path": "posts/cc/CnC_post_sort_by_cc_cnt.md",
    "chars": 628834,
    "preview": "CnC\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 320 | 2016.01.08 | bigendiansmalls | [Smashing the z/"
  },
  {
    "path": "posts/cc/CnC_post_sort_by_time.md",
    "chars": 628834,
    "preview": "CnC\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 56 | 2019.05.10 | talosintelligence_blog | [Threat Ro"
  },
  {
    "path": "posts/cc/CobaltStrike_post_sort_by_cc_cnt.md",
    "chars": 24948,
    "preview": "CobaltStrike\n\n以metasploit为基础的GUI的框架式渗透工具\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 49 | 2017.10.03 | coba"
  },
  {
    "path": "posts/cc/CobaltStrike_post_sort_by_time.md",
    "chars": 24948,
    "preview": "CobaltStrike\n\n以metasploit为基础的GUI的框架式渗透工具\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 5 | 2019.05.04 | freeb"
  },
  {
    "path": "posts/cc/CodeInjection_post_sort_by_cc_cnt.md",
    "chars": 12771,
    "preview": "CodeInjection\n代码注入\n代码注入\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 27 | 2018.02.23 | 360_anquanke_learning"
  },
  {
    "path": "posts/cc/CodeInjection_post_sort_by_time.md",
    "chars": 12771,
    "preview": "CodeInjection\n代码注入\n代码注入\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 16 | 2019.03.04 | kitploit_home | [Phan"
  },
  {
    "path": "posts/cc/ContentInjection_post_sort_by_cc_cnt.md",
    "chars": 784,
    "preview": "ContentInjection\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 18 | 2010.09.28 | trustwave_SpiderLabs_B"
  },
  {
    "path": "posts/cc/ContentInjection_post_sort_by_time.md",
    "chars": 784,
    "preview": "ContentInjection\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 5 | 2018.11.06 | scotthelme | [Edge remo"
  },
  {
    "path": "posts/cc/ControlFlowFlattening_post_sort_by_cc_cnt.md",
    "chars": 1183,
    "preview": "ControlFlowFlattening\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 16 | 2017.01.22 | venus_seebug | [利"
  },
  {
    "path": "posts/cc/ControlFlowFlattening_post_sort_by_time.md",
    "chars": 1183,
    "preview": "ControlFlowFlattening\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 10 | 2019.02.25 | carbonblack | [De"
  },
  {
    "path": "posts/cc/Crack_post_sort_by_cc_cnt.md",
    "chars": 247887,
    "preview": "Crack\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 191 | 2013.02.21 | pediy_new_digest | [None](https:"
  },
  {
    "path": "posts/cc/Crack_post_sort_by_time.md",
    "chars": 247887,
    "preview": "Crack\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 6 | 2019.05.07 | cisco_blogs | [Malicious Forces Cr"
  },
  {
    "path": "posts/cc/Cryptography_post_sort_by_cc_cnt.md",
    "chars": 173707,
    "preview": "Cryptography\n\n密码学,加密解密,各种算法之类\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 74 | 2016.05.16 | cr_yp_to | [201"
  },
  {
    "path": "posts/cc/Cryptography_post_sort_by_time.md",
    "chars": 173707,
    "preview": "Cryptography\n\n密码学,加密解密,各种算法之类\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 5 | 2019.05.10 | silentsignal_blo"
  },
  {
    "path": "posts/cc/Csp_post_sort_by_cc_cnt.md",
    "chars": 60318,
    "preview": "Csp\nContentSecurityPolicy\nContent Security Policy, 内容安全策略\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 161 |"
  },
  {
    "path": "posts/cc/Csp_post_sort_by_time.md",
    "chars": 60318,
    "preview": "Csp\nContentSecurityPolicy\nContent Security Policy, 内容安全策略\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 55 | "
  },
  {
    "path": "posts/cc/Csrf_post_sort_by_cc_cnt.md",
    "chars": 71924,
    "preview": "Csrf\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 195 | 2017.07.04 | avala | [Addressing Security Regr"
  },
  {
    "path": "posts/cc/Csrf_post_sort_by_time.md",
    "chars": 71924,
    "preview": "Csrf\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 15 | 2019.04.29 | kitploit_exploit | [Pimcore Unseri"
  },
  {
    "path": "posts/cc/Ctf_post_sort_by_cc_cnt.md",
    "chars": 124457,
    "preview": "Ctf\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 115 | 2018.08.01 | rpis | [None](https://blog.rpis.ec"
  },
  {
    "path": "posts/cc/Ctf_post_sort_by_time.md",
    "chars": 124457,
    "preview": "Ctf\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 8 | 2019.05.11 | aliyun_xz | [堆中global_max_fast相关利用]("
  },
  {
    "path": "posts/cc/CuckooDroid_post_sort_by_cc_cnt.md",
    "chars": 597,
    "preview": "CuckooDroid\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 6 | 2017.08.14 | n0where_digital_forensics_to"
  },
  {
    "path": "posts/cc/CuckooDroid_post_sort_by_time.md",
    "chars": 597,
    "preview": "CuckooDroid\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 6 | 2017.08.14 | n0where_digital_forensics_to"
  },
  {
    "path": "posts/cc/Cuckoo_post_sort_by_cc_cnt.md",
    "chars": 15907,
    "preview": "Cuckoo\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 67 | 2016.07.11 | freebuf | [自动化恶意软件分析系统Cuckoo安装、配"
  },
  {
    "path": "posts/cc/Cuckoo_post_sort_by_time.md",
    "chars": 15907,
    "preview": "Cuckoo\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 9 | 2019.04.16 | eforensicsmag | [How to Integrate"
  },
  {
    "path": "posts/cc/D-Link_post_sort_by_cc_cnt.md",
    "chars": 22744,
    "preview": "D-Link\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 116 | 2017.09.08 | pierrekim | [Pwning the Dlink 8"
  },
  {
    "path": "posts/cc/D-Link_post_sort_by_time.md",
    "chars": 22744,
    "preview": "D-Link\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 7 | 2019.05.08 | kitploit_exploit | [D-Link DWL-26"
  },
  {
    "path": "posts/cc/DDoS_post_sort_by_cc_cnt.md",
    "chars": 275005,
    "preview": "DDoS\n分布式拒绝服务攻击\n分布式拒绝服务攻击\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 105 | 2017.04.21 | nsfocus_blog | [201"
  },
  {
    "path": "posts/cc/DDoS_post_sort_by_time.md",
    "chars": 275005,
    "preview": "DDoS\n分布式拒绝服务攻击\n分布式拒绝服务攻击\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 16 | 2019.05.04 | 4hou_vulnerable | [A"
  },
  {
    "path": "posts/cc/DES_post_sort_by_cc_cnt.md",
    "chars": 220879,
    "preview": "DES\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 220 | 2010.07.19 | nbs_system | [Howto IDS/IPS](https"
  },
  {
    "path": "posts/cc/DES_post_sort_by_time.md",
    "chars": 220879,
    "preview": "DES\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 20 | 2019.05.10 | 360_anquanke_learning | [IDAPython实"
  },
  {
    "path": "posts/cc/DLLInjection_post_sort_by_cc_cnt.md",
    "chars": 13934,
    "preview": "DLLInjection\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 36 | 2017.08.13 | pediy_new_digest | [[翻译]多种"
  },
  {
    "path": "posts/cc/DLLInjection_post_sort_by_time.md",
    "chars": 13934,
    "preview": "DLLInjection\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 6 | 2019.03.20 | specterops | [Merlin v0.7.0"
  },
  {
    "path": "posts/cc/DNSMap_post_sort_by_cc_cnt.md",
    "chars": 940,
    "preview": "DNSMap\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 26 | 2012.05.25 | n0where_information_gathering | "
  },
  {
    "path": "posts/cc/DNSMap_post_sort_by_time.md",
    "chars": 940,
    "preview": "DNSMap\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 9 | 2015.09.09 | darknet | [dnsmap 0.22 Released –"
  },
  {
    "path": "posts/cc/DOTA2_post_sort_by_cc_cnt.md",
    "chars": 259,
    "preview": "DOTA2\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 25 | 2017.02.28 | qq_gslab_wg | [DOTA2 NtHack外挂分析报告"
  },
  {
    "path": "posts/cc/DOTA2_post_sort_by_time.md",
    "chars": 259,
    "preview": "DOTA2\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 23 | 2017.03.15 | qq_gslab_wg | [VAC系统分析 – DOTA2篇]("
  },
  {
    "path": "posts/cc/Dalvik_post_sort_by_cc_cnt.md",
    "chars": 12054,
    "preview": "Dalvik\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 52 | 2016.09.29 | venus_seebug | [对抗静态分析——dex不落地加载"
  },
  {
    "path": "posts/cc/Dalvik_post_sort_by_time.md",
    "chars": 12054,
    "preview": "Dalvik\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 7 | 2019.04.29 | pnfsoftware | [Debugging Android "
  },
  {
    "path": "posts/cc/DarkWeb_post_sort_by_cc_cnt.md",
    "chars": 145959,
    "preview": "DarkWeb\n暗网\n暗网\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 123 | 2016.06.27 | freebuf | [FreeBuf Insight:探访「"
  },
  {
    "path": "posts/cc/DarkWeb_post_sort_by_time.md",
    "chars": 145959,
    "preview": "DarkWeb\n暗网\n暗网\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 8 | 2019.05.10 | infosecaddicts | [Security Onion"
  },
  {
    "path": "posts/cc/DataBreach_post_sort_by_cc_cnt.md",
    "chars": 1047666,
    "preview": "DataBreach\n数据泄露\n数据泄露\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 248 | 2019.01.15 | hackmageddon_cyber_atta"
  },
  {
    "path": "posts/cc/DataBreach_post_sort_by_time.md",
    "chars": 1047666,
    "preview": "DataBreach\n数据泄露\n数据泄露\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 12 | 2019.05.13 | kitploit_home | [iCULeak"
  },
  {
    "path": "posts/cc/DataExfiltration_post_sort_by_cc_cnt.md",
    "chars": 4802,
    "preview": "DataExfiltration\n\n数据渗透\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 19 | 2018.05.09 | mindpointgroup_blog | "
  },
  {
    "path": "posts/cc/DataExfiltration_post_sort_by_time.md",
    "chars": 4802,
    "preview": "DataExfiltration\n\n数据渗透\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 7 | 2019.04.21 | hackingarticles | [Cove"
  },
  {
    "path": "posts/cc/Dbi_post_sort_by_cc_cnt.md",
    "chars": 7240,
    "preview": "Dbi\nDynamicBinaryInspection\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 66 | 2018.07.25 | deniable | ["
  },
  {
    "path": "posts/cc/Dbi_post_sort_by_time.md",
    "chars": 7240,
    "preview": "Dbi\nDynamicBinaryInspection\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 9 | 2018.09.09 | securityonlin"
  },
  {
    "path": "posts/cc/Dcom_post_sort_by_cc_cnt.md",
    "chars": 14201,
    "preview": "Dcom\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 58 | 2015.09.10 | rapid7 | [A debugging session in t"
  },
  {
    "path": "posts/cc/Dcom_post_sort_by_time.md",
    "chars": 14201,
    "preview": "Dcom\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 9 | 2019.05.09 | cybereason_blog | [Excel4.0 Macros "
  },
  {
    "path": "posts/cc/DeVirtualization_post_sort_by_cc_cnt.md",
    "chars": 2351,
    "preview": "DeVirtualization\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 155 | 2018.02.21 | msreverseengineering_"
  },
  {
    "path": "posts/cc/DeVirtualization_post_sort_by_time.md",
    "chars": 2351,
    "preview": "DeVirtualization\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 5 | 2018.11.28 | youtube | [2018 LLVM De"
  },
  {
    "path": "posts/cc/Decompiler_post_sort_by_cc_cnt.md",
    "chars": 64551,
    "preview": "Decompiler\n\n反编译器\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 91 | 2007.04.08 | pediy_new_digest | [[翻译]逆向编译"
  },
  {
    "path": "posts/cc/Decompiler_post_sort_by_time.md",
    "chars": 64551,
    "preview": "Decompiler\n\n反编译器\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 6 | 2019.04.22 | sans_org_digital_forensics_bl"
  },
  {
    "path": "posts/cc/Decrypt_post_sort_by_cc_cnt.md",
    "chars": 459758,
    "preview": "Decrypt\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 291 | 2017.06.26 | pediy_new_digest | [[翻译]勒索软件编年"
  },
  {
    "path": "posts/cc/Decrypt_post_sort_by_time.md",
    "chars": 459758,
    "preview": "Decrypt\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 7 | 2019.05.10 | bestsecuritysearch | [Remove .fo"
  },
  {
    "path": "posts/cc/Deobfuscation_post_sort_by_cc_cnt.md",
    "chars": 29172,
    "preview": "Deobfuscation\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 34 | 2017.07.11 | _0xec | [Deobfuscating Pj"
  },
  {
    "path": "posts/cc/Deobfuscation_post_sort_by_time.md",
    "chars": 29172,
    "preview": "Deobfuscation\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 9 | 2019.04.30 | bromium | [Emotet: Catch M"
  },
  {
    "path": "posts/cc/DevOps_post_sort_by_cc_cnt.md",
    "chars": 89016,
    "preview": "DevOps\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 85 | 2016.01.20 | poweradmin | [51 DevOps Influenc"
  },
  {
    "path": "posts/cc/DevOps_post_sort_by_time.md",
    "chars": 89016,
    "preview": "DevOps\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 6 | 2019.05.06 | freecodecamp | [650 Free Online P"
  },
  {
    "path": "posts/cc/Dex2Jar_post_sort_by_cc_cnt.md",
    "chars": 6529,
    "preview": "Dex2Jar\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 27 | 2018.04.11 | infosecinstitute | [Android Pen"
  },
  {
    "path": "posts/cc/Dex2Jar_post_sort_by_time.md",
    "chars": 6529,
    "preview": "Dex2Jar\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 5 | 2019.02.28 | venus_seebug | [ES 文件浏览器安全漏洞分析(C"
  },
  {
    "path": "posts/cc/DirectX_post_sort_by_cc_cnt.md",
    "chars": 3544,
    "preview": "DirectX\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 35 | 2005.12.25 | pediy_new_digest | [解决自校验 + 注册爆"
  },
  {
    "path": "posts/cc/DirectX_post_sort_by_time.md",
    "chars": 3544,
    "preview": "DirectX\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 5 | 2019.04.02 | robservatory | [Two year old cru"
  },
  {
    "path": "posts/cc/Disassembler_post_sort_by_cc_cnt.md",
    "chars": 47246,
    "preview": "Disassembler\n反编译器\n反编译器\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 478 | 2017.07.11 | _0xec | [Deobfuscatin"
  },
  {
    "path": "posts/cc/Disassembler_post_sort_by_time.md",
    "chars": 47246,
    "preview": "Disassembler\n反编译器\n反编译器\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 8 | 2019.04.16 | sans_org_digital_forens"
  },
  {
    "path": "posts/cc/Docker_post_sort_by_cc_cnt.md",
    "chars": 221998,
    "preview": "Docker\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 191 | 2019.03.08 | freecodecamp | [Docker simplifi"
  },
  {
    "path": "posts/cc/Docker_post_sort_by_time.md",
    "chars": 221998,
    "preview": "Docker\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 8 | 2019.05.10 | linuxjournal | [Alpine Linux Dock"
  },
  {
    "path": "posts/cc/Downloader_post_sort_by_cc_cnt.md",
    "chars": 79117,
    "preview": "Downloader\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 53 | 2018.04.24 | welivesecurity | [Zebrocy us"
  },
  {
    "path": "posts/cc/Downloader_post_sort_by_time.md",
    "chars": 79117,
    "preview": "Downloader\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 7 | 2019.05.02 | talosintelligence_blog | [Qak"
  },
  {
    "path": "posts/cc/Drone_post_sort_by_cc_cnt.md",
    "chars": 41316,
    "preview": "Drone\n\n无人机\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 89 | 2015.11.12 | linoxide | [How to Setup Drone - a"
  },
  {
    "path": "posts/cc/Drone_post_sort_by_time.md",
    "chars": 41316,
    "preview": "Drone\n\n无人机\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 6 | 2019.04.24 | sparkfun | [Project Canary: Atmosph"
  },
  {
    "path": "posts/cc/Dropper_post_sort_by_cc_cnt.md",
    "chars": 55196,
    "preview": "Dropper\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 233 | 2019.04.01 | carbonblack | [CB TAU Threat I"
  },
  {
    "path": "posts/cc/Dropper_post_sort_by_time.md",
    "chars": 55196,
    "preview": "Dropper\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 6 | 2019.05.10 | talosintelligence_blog | [Threat"
  },
  {
    "path": "posts/cc/DynamoRIO_post_sort_by_cc_cnt.md",
    "chars": 5258,
    "preview": "DynamoRIO\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 72 | 2018.07.25 | deniable | [Dynamic Binary In"
  },
  {
    "path": "posts/cc/DynamoRIO_post_sort_by_time.md",
    "chars": 5258,
    "preview": "DynamoRIO\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 10 | 2019.04.25 | kitploit_home | [drAFL - AFL "
  },
  {
    "path": "posts/cc/EDR_post_sort_by_cc_cnt.md",
    "chars": 32767,
    "preview": "EDR\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 57 | 2017.11.15 | freebuf | [WitAwards 2017“年度创新产品”参评"
  },
  {
    "path": "posts/cc/EDR_post_sort_by_time.md",
    "chars": 32767,
    "preview": "EDR\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 5 | 2019.04.23 | comae_msuiche | [How to Solve the Bl"
  },
  {
    "path": "posts/cc/Emotet_post_sort_by_cc_cnt.md",
    "chars": 24479,
    "preview": "Emotet\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 237 | 2019.04.01 | carbonblack | [CB TAU Threat In"
  },
  {
    "path": "posts/cc/Emotet_post_sort_by_time.md",
    "chars": 24479,
    "preview": "Emotet\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 5 | 2019.05.10 | talosintelligence_blog | [Threat "
  },
  {
    "path": "posts/cc/Empire_post_sort_by_cc_cnt.md",
    "chars": 34473,
    "preview": "Empire\nRIG-E\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 57 | 2017.04.19 | blackhillsinfosec_blog | [E"
  },
  {
    "path": "posts/cc/Empire_post_sort_by_time.md",
    "chars": 34473,
    "preview": "Empire\nRIG-E\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 12 | 2019.05.08 | securelist | [FIN7.5: the i"
  },
  {
    "path": "posts/cc/Encrypt_post_sort_by_cc_cnt.md",
    "chars": 1286723,
    "preview": "Encrypt\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 270 | 2017.10.30 | iceswordlab | [Chrome OS基于EXT4"
  },
  {
    "path": "posts/cc/Encrypt_post_sort_by_time.md",
    "chars": 1286723,
    "preview": "Encrypt\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 7 | 2019.05.10 | f_secure_home_security | [5 ways"
  },
  {
    "path": "posts/cc/EnigmaProtect_post_sort_by_cc_cnt.md",
    "chars": 640,
    "preview": "EnigmaProtect\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 18 | 2006.04.15 | pediy_new_digest | [特定码――"
  },
  {
    "path": "posts/cc/EnigmaProtect_post_sort_by_time.md",
    "chars": 640,
    "preview": "EnigmaProtect\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 6 | 2016.06.22 | hexacorn | [Certain Window"
  },
  {
    "path": "posts/cc/Escape_post_sort_by_cc_cnt.md",
    "chars": 72713,
    "preview": "Escape\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 225 | 2016.01.24 | _360_blogs | [Android逃逸技术汇编](ht"
  },
  {
    "path": "posts/cc/Escape_post_sort_by_time.md",
    "chars": 72713,
    "preview": "Escape\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 5 | 2019.05.11 | wallarm | [Latest Bypassing Techn"
  },
  {
    "path": "posts/cc/Fileless_post_sort_by_cc_cnt.md",
    "chars": 22231,
    "preview": "Fileless\n\n无文件, 实现各种功能, 一般是驻留\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 53 | 2018.09.27 | microsoft_cloudb"
  },
  {
    "path": "posts/cc/Fileless_post_sort_by_time.md",
    "chars": 22231,
    "preview": "Fileless\n\n无文件, 实现各种功能, 一般是驻留\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 11 | 2019.04.30 | malwarebytes_blo"
  },
  {
    "path": "posts/cc/FinFisher_post_sort_by_cc_cnt.md",
    "chars": 5284,
    "preview": "FinFisher\n\n间谍软件\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 113 | 2015.10.15 | citizenlab_research_targeted"
  },
  {
    "path": "posts/cc/FinFisher_post_sort_by_time.md",
    "chars": 5284,
    "preview": "FinFisher\n\n间谍软件\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 6 | 2018.05.15 | virusbulletin_blog | [Turkish "
  },
  {
    "path": "posts/cc/Fingerprinting_post_sort_by_cc_cnt.md",
    "chars": 126302,
    "preview": "Fingerprinting\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 288 | 2017.12.04 | venus_seebug | [深度剖析:手机"
  },
  {
    "path": "posts/cc/Fingerprinting_post_sort_by_time.md",
    "chars": 126302,
    "preview": "Fingerprinting\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 6 | 2019.05.09 | googleblog_android_develo"
  },
  {
    "path": "posts/cc/Finspy_post_sort_by_cc_cnt.md",
    "chars": 5782,
    "preview": "Finspy\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 57 | 2013.03.13 | citizenlab_research_targeted_thr"
  },
  {
    "path": "posts/cc/Finspy_post_sort_by_time.md",
    "chars": 5782,
    "preview": "Finspy\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 44 | 2018.03.29 | pediy_new_digest | [[翻译]手把手静态分析F"
  },
  {
    "path": "posts/cc/FireWall_post_sort_by_cc_cnt.md",
    "chars": 274310,
    "preview": "FireWall\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 589 | 2017.07.31 | sec_un | [计算机信息系统安全专用产品销售许可证完"
  },
  {
    "path": "posts/cc/FireWall_post_sort_by_time.md",
    "chars": 274310,
    "preview": "FireWall\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 5 | 2019.05.08 | tecmint | [How to Upgrade from "
  },
  {
    "path": "posts/cc/Firmware_post_sort_by_cc_cnt.md",
    "chars": 195063,
    "preview": "Firmware\n固件\n固件\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 373 | 2018.10.03 | hardenedlinux | [用于企业系统管理员和蓝队"
  },
  {
    "path": "posts/cc/Firmware_post_sort_by_time.md",
    "chars": 195063,
    "preview": "Firmware\n固件\n固件\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 10 | 2019.05.08 | kitploit_exploit | [D-Link DWL"
  },
  {
    "path": "posts/cc/Forensic_post_sort_by_cc_cnt.md",
    "chars": 283613,
    "preview": "Forensic\n\n取证\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 194 | 2011.04.09 | journeyintoir | [None](http://j"
  },
  {
    "path": "posts/cc/Forensic_post_sort_by_time.md",
    "chars": 283613,
    "preview": "Forensic\n\n取证\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 6 | 2019.05.12 | freebuf | [关于Metasploit5中的后渗透模块的编"
  },
  {
    "path": "posts/cc/Frida_post_sort_by_cc_cnt.md",
    "chars": 22416,
    "preview": "Frida\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 118 | 2017.03.13 | codemetrix | [Hacking Android ap"
  },
  {
    "path": "posts/cc/Frida_post_sort_by_time.md",
    "chars": 22416,
    "preview": "Frida\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 35 | 2019.05.05 | 360_anquanke_learning | [FRIDA脚本系"
  },
  {
    "path": "posts/cc/Fuzzing_post_sort_by_cc_cnt.md",
    "chars": 162861,
    "preview": "Fuzzing\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 290 | 2019.01.23 | mwrinfosecurity_blog | [What t"
  },
  {
    "path": "posts/cc/Fuzzing_post_sort_by_time.md",
    "chars": 162861,
    "preview": "Fuzzing\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 15 | 2019.05.10 | aliyun_xz | [内核漏洞挖掘技术系列(4)——syz"
  },
  {
    "path": "posts/cc/Gdb_post_sort_by_cc_cnt.md",
    "chars": 110423,
    "preview": "Gdb\n\nNone\n\n| 时间 | CC数目 | URL | 标题 |\n| ---- | ----- | --- | --- |\n| 146 | 2016.08.09 | brendangregg | [gdb Debugging Full"
  }
]

// ... and 332 more files (download for full content)

About this extraction

This page contains the full source code of the WilsonHuha/cbr-doc GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 532 files (46.4 MB), approximately 12.2M tokens. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.

Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.

Copied to clipboard!