├── CROSS-SITE-ATTACK.pptx ├── CSRF 攻击-苏醒的巨人.pptx ├── Hidden Battlefield_ Flash-Based Web Attacks.pptx ├── How can we protect ourselves in the dark forest of blockchain.pptx ├── JavaScript 安全从浏览器到服务端.ppt ├── Knownsec_RD_Checklist_v2.2.zip ├── Knownsec_RD_Checklist_v3.0.zip ├── README.md ├── SNS 攻击与防御_2010.pptx ├── SNS 攻击与防御_2011.pptx ├── Undead Armies of Blockchain.pdf ├── Web前端黑客技术揭秘_公开章节 ├── Web前端黑客技术揭秘(Web2Hack.org)_(a)序1.pdf ├── Web前端黑客技术揭秘(Web2Hack.org)_(b)序2.pdf ├── Web前端黑客技术揭秘(Web2Hack.org)_(c)前言.pdf ├── Web前端黑客技术揭秘(Web2Hack.org)_(d)致谢.pdf ├── Web前端黑客技术揭秘(Web2Hack.org)_(e)目录.pdf ├── Web前端黑客技术揭秘(Web2Hack.org)_(f)第一章 Web安全的关键点.pdf ├── Web前端黑客技术揭秘(Web2Hack.org)_(g)2.5.4 Cookie安全.pdf ├── Web前端黑客技术揭秘(Web2Hack.org)_(h)6.4 Flash XSS挖掘.pdf ├── Web前端黑客技术揭秘(Web2Hack.org)_(i)7.6.5 跨子域:document.domain技巧.pdf ├── Web前端黑客技术揭秘(Web2Hack.org)_10.1.2 迟到的CSP策略.pdf └── Web前端黑客技术揭秘(Web2Hack.org)__(j)第1,2,6章.pdf ├── XSS Virus 探究.ppt ├── XSS_Hack-Steal_PWD_of_Browsers.pdf ├── 全球地下黑客的帝国:网络空间IoT战场_PRIVATE.pptx ├── 区块链亡灵军团.pdf ├── 发现网络空间里的“暗物质”情报.pptx ├── 程序员与黑客.ppt ├── 程序员与黑客2.pptx ├── 网络空间工控设备的发现与入侵.ppt ├── 聊聊Web3黑暗森林,用户如何自我保护.pptx └── 隐蔽的战场—Flash Web攻击.pptx /CROSS-SITE-ATTACK.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/CROSS-SITE-ATTACK.pptx -------------------------------------------------------------------------------- /CSRF 攻击-苏醒的巨人.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/CSRF 攻击-苏醒的巨人.pptx -------------------------------------------------------------------------------- /Hidden Battlefield_ Flash-Based Web Attacks.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/Hidden Battlefield_ Flash-Based Web Attacks.pptx -------------------------------------------------------------------------------- /How can we protect ourselves in the dark forest of blockchain.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/How can we protect ourselves in the dark forest of blockchain.pptx -------------------------------------------------------------------------------- /JavaScript 安全从浏览器到服务端.ppt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/JavaScript 安全从浏览器到服务端.ppt -------------------------------------------------------------------------------- /Knownsec_RD_Checklist_v2.2.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/Knownsec_RD_Checklist_v2.2.zip -------------------------------------------------------------------------------- /Knownsec_RD_Checklist_v3.0.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/Knownsec_RD_Checklist_v3.0.zip -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | Papers 2 | ====== 3 | 4 | My open papers. Enjoy:smiley: 5 | 6 | 1. Blockchain dark forest selfguard handbook https://github.com/slowmist/Blockchain-dark-forest-selfguard-handbook 7 | 2. Web 前端黑客技术揭秘 https://web2hack.org 8 | 3. My blog: https://evilcos.me, it is history. 9 | 10 | Be a nice hacker. 11 | 12 | Twitter: [@evilcos](https://twitter.com/evilcos)
13 | Email: evilcos@gmail.com 14 | -------------------------------------------------------------------------------- /SNS 攻击与防御_2010.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/SNS 攻击与防御_2010.pptx -------------------------------------------------------------------------------- /SNS 攻击与防御_2011.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/SNS 攻击与防御_2011.pptx -------------------------------------------------------------------------------- /Undead Armies of Blockchain.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/Undead Armies of Blockchain.pdf -------------------------------------------------------------------------------- /Web前端黑客技术揭秘_公开章节/Web前端黑客技术揭秘(Web2Hack.org)_(a)序1.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/Web前端黑客技术揭秘_公开章节/Web前端黑客技术揭秘(Web2Hack.org)_(a)序1.pdf -------------------------------------------------------------------------------- /Web前端黑客技术揭秘_公开章节/Web前端黑客技术揭秘(Web2Hack.org)_(b)序2.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/Web前端黑客技术揭秘_公开章节/Web前端黑客技术揭秘(Web2Hack.org)_(b)序2.pdf -------------------------------------------------------------------------------- /Web前端黑客技术揭秘_公开章节/Web前端黑客技术揭秘(Web2Hack.org)_(c)前言.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/Web前端黑客技术揭秘_公开章节/Web前端黑客技术揭秘(Web2Hack.org)_(c)前言.pdf -------------------------------------------------------------------------------- /Web前端黑客技术揭秘_公开章节/Web前端黑客技术揭秘(Web2Hack.org)_(d)致谢.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/Web前端黑客技术揭秘_公开章节/Web前端黑客技术揭秘(Web2Hack.org)_(d)致谢.pdf -------------------------------------------------------------------------------- /Web前端黑客技术揭秘_公开章节/Web前端黑客技术揭秘(Web2Hack.org)_(e)目录.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/Web前端黑客技术揭秘_公开章节/Web前端黑客技术揭秘(Web2Hack.org)_(e)目录.pdf -------------------------------------------------------------------------------- /Web前端黑客技术揭秘_公开章节/Web前端黑客技术揭秘(Web2Hack.org)_(f)第一章 Web安全的关键点.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/Web前端黑客技术揭秘_公开章节/Web前端黑客技术揭秘(Web2Hack.org)_(f)第一章 Web安全的关键点.pdf -------------------------------------------------------------------------------- /Web前端黑客技术揭秘_公开章节/Web前端黑客技术揭秘(Web2Hack.org)_(g)2.5.4 Cookie安全.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/Web前端黑客技术揭秘_公开章节/Web前端黑客技术揭秘(Web2Hack.org)_(g)2.5.4 Cookie安全.pdf -------------------------------------------------------------------------------- /Web前端黑客技术揭秘_公开章节/Web前端黑客技术揭秘(Web2Hack.org)_(h)6.4 Flash XSS挖掘.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/Web前端黑客技术揭秘_公开章节/Web前端黑客技术揭秘(Web2Hack.org)_(h)6.4 Flash XSS挖掘.pdf -------------------------------------------------------------------------------- /Web前端黑客技术揭秘_公开章节/Web前端黑客技术揭秘(Web2Hack.org)_(i)7.6.5 跨子域:document.domain技巧.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/Web前端黑客技术揭秘_公开章节/Web前端黑客技术揭秘(Web2Hack.org)_(i)7.6.5 跨子域:document.domain技巧.pdf -------------------------------------------------------------------------------- /Web前端黑客技术揭秘_公开章节/Web前端黑客技术揭秘(Web2Hack.org)_10.1.2 迟到的CSP策略.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/Web前端黑客技术揭秘_公开章节/Web前端黑客技术揭秘(Web2Hack.org)_10.1.2 迟到的CSP策略.pdf -------------------------------------------------------------------------------- /Web前端黑客技术揭秘_公开章节/Web前端黑客技术揭秘(Web2Hack.org)__(j)第1,2,6章.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/Web前端黑客技术揭秘_公开章节/Web前端黑客技术揭秘(Web2Hack.org)__(j)第1,2,6章.pdf -------------------------------------------------------------------------------- /XSS Virus 探究.ppt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/XSS Virus 探究.ppt -------------------------------------------------------------------------------- /XSS_Hack-Steal_PWD_of_Browsers.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/XSS_Hack-Steal_PWD_of_Browsers.pdf -------------------------------------------------------------------------------- /全球地下黑客的帝国:网络空间IoT战场_PRIVATE.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/全球地下黑客的帝国:网络空间IoT战场_PRIVATE.pptx -------------------------------------------------------------------------------- /区块链亡灵军团.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/区块链亡灵军团.pdf -------------------------------------------------------------------------------- /发现网络空间里的“暗物质”情报.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/发现网络空间里的“暗物质”情报.pptx -------------------------------------------------------------------------------- /程序员与黑客.ppt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/程序员与黑客.ppt -------------------------------------------------------------------------------- /程序员与黑客2.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/程序员与黑客2.pptx -------------------------------------------------------------------------------- /网络空间工控设备的发现与入侵.ppt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/网络空间工控设备的发现与入侵.ppt -------------------------------------------------------------------------------- /聊聊Web3黑暗森林,用户如何自我保护.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/聊聊Web3黑暗森林,用户如何自我保护.pptx -------------------------------------------------------------------------------- /隐蔽的战场—Flash Web攻击.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/evilcos/papers/736443fc3d6a4c94cbb6557ccfa7e8b5be045c28/隐蔽的战场—Flash Web攻击.pptx --------------------------------------------------------------------------------