Follow-up will be more on the series of articles

Mostly at work or have accumulated in some new and summary, exchange and sharing of knowledge required, some articles may be very long, will be updated into a series, this series of two ways to share

First, on the basis of advanced automated threat:

  1. "Deploy their own malicious code using the Python open source tools automate"
  2. "Sandbox secondary development."
  3. "Honeypot secondary development."
  4. "Those things threat intelligence" involves emergency response knowledge

Two, CTF accomplishment in mind:

  1. "Pwn to develop mind Basics"
  2. "Reverse develop mind Basics"
  3. "Misc Tools theory"

Third, the study of those things:

  1. "Research x86 those days."
  2. "Research linux 0.11 in those days."
  3. "Windows kernel programming to bring the story."

Guess you like

Origin blog.51cto.com/13352079/2415580