unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Bypassing Certificate Pinning on Flutter-based Android Apps. A new guide.
One of the preliminary activities when analyzing mobile application, more usually than not, is to b...
2024-5-7 19:22:0 | 阅读: 6 |
收藏
|
Minded Security Blog - blog.mindedsecurity.com
flutter
proxy
x509
jni
libflutter
Semgrep Rules for iOS Application Security (Swift)
Nowadays, millions of people rely on iOS mobile applications for almost everything. As a result iOS...
2024-4-17 19:16:0 | 阅读: 3 |
收藏
|
Minded Security Blog - blog.mindedsecurity.com
security
masvs
semgrep
analysis
usages
Testing the Security of Modbus Services
ICS and Building Management Systems (BMS...
2024-3-7 00:56:0 | 阅读: 15 |
收藏
|
Minded Security Blog - blog.mindedsecurity.com
modbus
msak
bhh
security
xd8
Semgrep Rules for Android Application Security
IntroductionThe number of Android applications has been growing rapidly in recent years. In...
2023-10-23 15:32:0 | 阅读: 11 |
收藏
|
Minded Security Blog - blog.mindedsecurity.com
security
semgrep
mstg
network
A Cool New Project: Semgrep Rules for Android Apps Security
In today's digital landscape, mobile application security has become an paramount concern. With the...
2023-6-21 23:4:0 | 阅读: 22 |
收藏
|
Minded Security Blog - blog.mindedsecurity.com
security
semgrep
github
developers
mstg
20 years of Software Security: threats and defense strategies evolution
Software security has come a long way in the past two decades. With the advent of new technologies...
2023-3-27 15:24:0 | 阅读: 6 |
收藏
|
Minded Security Blog - blog.mindedsecurity.com
security
software
developers
development
OWASP Global AppSec Dublin 2023: WorldWide and Threat Modeling
The OWASP Global AppSec Dublin 2023 conference was a truly inspiring event for anyone involved in a...
2023-2-24 17:51:0 | 阅读: 18 |
收藏
|
Minded Security Blog - blog.mindedsecurity.com
security
modeling
testability
worldwide
keynote
UN ECE 155 Threats in the real world: Wireless Networking Attacks and Mitigations. A case study
On March the 31st, I gave a quick talk on automotive security at VTM titled "UN ECE 155 Threats in...
2022-7-28 23:2:0 | 阅读: 14 |
收藏
|
blog.mindedsecurity.com
dab
security
automotive
rds
software
The Worst Log Injection. Ever. (Log4j [2.0.0-alpha,2.14.1] )
tag:blogger.com,1999:blog-7122745763234660283.comments2021-11-30T03:29:37.612-08:00IMQ Minded Securi...
2021-12-14 23:11:38 | 阅读: 14 |
收藏
|
blog.mindedsecurity.com
612
00imq
security
The Worst Log Injection. Ever. (Log4j [2.0.0-alpha,2.14.1] )
There has been such a hype about the Log4j issue and since IMQ Minded Security mission has always b...
2021-12-14 13:47:0 | 阅读: 7 |
收藏
|
blog.mindedsecurity.com
log4j
attacker
malicious
software
outbound
A Journey Into the Beauty of DNSRebinding - Part 2
tag:blogger.com,1999:blog-7122745763234660283.comments2020-09-16T08:29:03.937-07:00IMQ Minded Securi...
2021-08-31 17:17:00 | 阅读: 52 |
收藏
|
blog.mindedsecurity.com
16t08
minded
blogminded
A Journey Into the Beauty of DNSRebinding - Part 2
In the first part, after a fast overview on the DNS Rebinding technique, we considered a practical e...
2021-8-31 08:17:0 | 阅读: 8 |
收藏
|
blog.mindedsecurity.com
5278
43434343
124000
132000
firmware
Mobile Screenshot Prevention Cheatsheet - Testing and Fixing
tag:blogger.com,1999:blog-7122745763234660283.comments2021-05-26T17:04:35.387-07:00IMQ Minded Securi...
2021-05-27 22:54:00 | 阅读: 133 |
收藏
|
blog.mindedsecurity.com
blogminded
387
00imq
Mobile Screenshot Prevention Cheatsheet - Testing and Fixing
The following article will explain how to test mobile applications against any implemented s...
2021-5-27 13:54:0 | 阅读: 15 |
收藏
|
blog.mindedsecurity.com
appstate
oncreate
A Journey Into the Beauty of DNSRebinding - Part 1
tag:blogger.com,1999:blog-7122745763234660283.comments2021-02-24T00:27:42.143-08:00Minded Security B...
2021-02-26 19:17:00 | 阅读: 149 |
收藏
|
blog.mindedsecurity.com
security
24t00
A Journey Into the Beauty of DNSRebinding - Part 1
AuthorsGiovanni GuidoAlessandro BraccioAbstractIn this first blog post about DNS rebinding topic,...
2021-2-26 10:17:0 | 阅读: 15 |
收藏
|
blog.mindedsecurity.com
upnp
attacker
urn
network
Demystifying Web Cache Threats
tag:blogger.com,1999:blog-7122745763234660283.comments2021-01-12T22:39:00.907-08:00Minded Security B...
2021-01-26 20:12:00 | 阅读: 123 |
收藏
|
blog.mindedsecurity.com
12t22
security
Demystifying Web Cache Threats
Authors Alessandro Brucato Giorgio RandoIntroduction Did you know the word “Cache” comes...
2021-1-26 11:12:0 | 阅读: 12 |
收藏
|
blog.mindedsecurity.com
caching
proxy
poisoning
malicious
victim
WAF Journey - Fixing Telerik UI Remote Code Execution via Arbitrary File Upload
tag:blogger.com,1999:blog-7122745763234660283.comments2020-11-16T03:13:26.573-08:00Minded Security B...
2020-11-16 23:16:00 | 阅读: 159 |
收藏
|
blog.mindedsecurity.com
00minded
security
blogminded
WAF Journey - Fixing Telerik UI Remote Code Execution via Arbitrary File Upload
IntroductionIt might occur that companies discover vulnerabilities on web application assets...
2020-11-16 14:16:0 | 阅读: 25 |
收藏
|
blog.mindedsecurity.com
telerik
rau
raupostdata
bypass
Previous
1
2
3
4
5
6
7
8
Next