Android killer
Preface:Inmyrecentwork,IhavebeeninvolvedinAPPtestingandwouldliketosharesomepersonal...

Android 9.0 → First enabled
DescriptionDuetothecharacteristicsofourcontainerproducts,weneedtoruntheapplicationcomp...

Analysis
Version<!--https://mvnrepository.com/artifact/org.beanshell/bsh(beanshell1)--><depend...

Analysis report on the active million-level virus 'DropperNecro'
Chapter1:BackgroundNowadays,moreandmoreAPPsareintegratingthird-partycompanySDKstoimplem...
Analysis report of a wild encounter with a stealthy Raccoon Stealer v2 sample
PrefaceRaccoonStealerv2isaninformationstealersoldonundergroundhackerforums,operatedthro...
Analysis of Windows spyware, will you still easily download Windows crack software?
I.EventSummaryRecently,duringtheWindowsterminalthreathunting,aWindowsspywarewascaptured...
Analysis of two zombie network Mirai samples
OnJune26,2019,thehoneypotsystemmonitoredtwoMiraiIoTwormactivities.SinceNovember23,20...
Analysis of the "powerghost" virus
IntroductionAsearlyasaroundMay21,wehavediscoveredthe"powerghost"virusandcondu...

Analysis of the reflective class loading of high-version JDK in practical network defense and attack
IntroductionStartingfromJDK9,theJavaPlatformModuleSystem(JPMS)wasintroduced,fordetailed...

Analysis of the principle of Fastjson deserialization vulnerability
0x01IntroductionRecently,IhavelearnedabouttheFastjsondeserializationvulnerability.Afterwa...