漏洞与安全团队的PoC/Exploit和Web3相关漏洞分析
作者:Sec-Labs | 发布时间:
项目地址
https://github.com/numencyber/Vulnerability_PoC
一些有趣漏洞的PoC/Exploit
作者:Numen Cyber Labs的漏洞研究团队
- TCP/IP RCE漏洞(CVE-2022-34718)PoC重现及分析
https://medium.com/@numencyberlabs/analysis-and-summary-of-tcp-ip-protocol-remote-code-execution-vulnerability-cve-2022-34718-8fcc28538acf - CVE-2022-36537漏洞技术分析及Exploit
https://medium.com/@numencyberlabs/cve-2022-36537-vulnerability-technical-analysis-with-exp-667401766746 - CVE-2021-38003:从漏洞到Chrome Renderer RCE
https://medium.com/numen-cyber-labs/from-leaking-thehole-to-chrome-renderer-rce-183dcb6f3078 - CVE-2022-42889:Text4Shell漏洞技术分析
https://medium.com/@numencyberlabs/text4shell-or-act4shell-vulnerability-analysis-a860d141e3e5 - 零日漏洞:Chromium v8 js引擎问题 1303458-在x64指令优化漏洞中使用后释放漏洞分析
https://medium.com/bugbountywriteup/zero-day-vulnerability-chromium-v8-js-engine-issue-1303458-use-after-free-in-x64-instruction-e874419436a6
Web3相关漏洞分析
Numen Web3安全产品发现的漏洞
作者:Numen Cyber Labs的Web3安全团队
标签:思路分享, 学习笔记, POC脚本, web3