Mostly at work or have accumulated in some new and summary, exchange and sharing of knowledge required, some articles may be very long, will be updated into a series, this series of two ways to share
First, on the basis of advanced automated threat:
- "Deploy their own malicious code using the Python open source tools automate"
- "Sandbox secondary development."
- "Honeypot secondary development."
- "Those things threat intelligence" involves emergency response knowledge
Two, CTF accomplishment in mind:
- "Pwn to develop mind Basics"
- "Reverse develop mind Basics"
- "Misc Tools theory"
Third, the study of those things:
- "Research x86 those days."
- "Research linux 0.11 in those days."
- "Windows kernel programming to bring the story."