- Rizin, fork of radare2: https://github.com/rizinorg/rizin
- metasploit-framework: https://github.com/rapid7/metasploit-framework
- yara: https://github.com/VirusTotal/yara
- ClamAV (to compare our work): https://github.com/Cisco-Talos/clamav
diffto compare hashes saved in files- Load Library: a loader to run Windows defender on Linux https://github.com/taviso/loadlibrary/. It requires
cabextractto get latest engine of Windows Defender. I have modified version of it here https://nest.parrotsec.org/dmknght/windefender-loader which allow scan whole directory. However, it doesn't work with latest version of the engine. So i'll copy the code i added to new version of loadlibrary. - Cigarrates and Tom Ellis's songs.
In this short tutorial we will go over how to reproduce the crash from CVE-2020-8597. This is a stack-based buffer overflow in the pppd binary.
We will use our own pppd binary compiled from source, using the latest version: 2.4.8.
To accomplish this goal, we will need two Virtual Machines connected by a virtual serial port. I typically use VirtualBox since it is open source, but the same sort of configuration should work on other hypervisors.
I spun up two VMs:
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # 综合测试 | |
| ## 秋水逸冰 | |
| wget -qO- bench.sh | bash | |
| ## 老鬼 | |
| wget -qO- --no-check-certificate https://raw.githubusercontent.com/oooldking/script/master/superbench.sh | bash | |
| ## Zbench | |
| ###中文版 | |
| wget -N --no-check-certificate https://raw.githubusercontent.com/FunctionClub/ZBench/master/ZBench-CN.sh && bash ZBench-CN.sh | |
| ###英文版 | |
| wget -N --no-check-certificate https://raw.githubusercontent.com/FunctionClub/ZBench/master/ZBench.sh && bash ZBench.sh |