[Fuzzing] Fuzzing File Systems via Two-Dimensional Input Space Exploration – Summary:
https://r3xnation.wordpress.com/2019/07/06/fuzzing-file-systems-via-two-dimensional-input-space-exploration-summary/
[Android] How I Hacked the Microsoft Outlook Android App and Found CVE-2019-1105:
https://www.f5.com/labs/articles/threat-intelligence/how-i-hacked-the-microsoft-outlook-android-app-and-found-cve-2019-1105?sf214690162=1
・ outlook app 客户端中的存储型xss,以及其poc构造过程 – 靓仔
Analysis of a use-after-unmap vulnerability in Edge: CVE-2019-0609:
https://gts3.org/2019/cve-2019-0609.html
[Windows, Tools] Automated AD and Windows test lab deployments with Invoke-ADLabDeployer:
https://outflank.nl/blog/2018/03/30/automated-ad-and-windows-test-lab-deployments-with-invoke-adlabdeployer/
・ 利用 Invoke-ADLabDeployer PowerShell 脚本自动化部署一个 Windows AD 测试环境 – Jett
IronPython, darkly: how we uncovered an attack on government entities in Europe:
http://blog.ptsecurity.com/2019/07/ironpython-darkly-how-we-uncovered.html