个人收藏使用,侵删

https://starlabs.sg/blog/2022/05/new-wine-in-old-bottle-microsoft-sharepoint-post-auth-deserialization-rce-cve-2022-29108/

https://labs.nettitude.com/blog/cve-2022-23270-windows-server-vpn-remote-kernel-use-after-free-vulnerability/

https://blog.viettelcybersecurity.com/cve-2022-22005-microsoft-sharepoint-rce

https://xakep-ru

https://movaxbx.ru/tag/exploit/

https://infosecwriteups.com/utctf-2022-writeup-de956bfe0bf3

https://securityaffairs.co/wordpress/category/apt

https://thehackernews.com/search/label/Vulnerability

https://www.zerodayinitiative.com/blog

https://www.crowdstrike.com/blog/cve-2022-0185-kubernetes-container-escape-using-linux-kernel-exploit/

https://blog.aquasec.com/cve-2022-0185-linux-kernel-container-escape-in-kubernetes

https://www.truesec.com/hub/blog/from-stranger-to-da-using-petitpotam-to-ntlm-relay-to-active-directory

https://www.exandroid.dev/2021/06/23/ad-cs-relay-attack-practical-guide/

https://posts.specterops.io/certified-pre-owned-d95910965cd2

https://isc.sans.edu/forums/diary/Active+Directory+Certificate+Services+ADCS+PKI+domain+admin+vulnerability/27668/

http://news.shamcode.ru/blog/nomi-sec--poc-in-github-1/