unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
BSI Publishes Windows 10 SiSyPHuS Reports: Application Compatibility Infrastructure, Microsoft Defender Antivirus ETW Usage and Device Setup Manager Service
The German Federal Office for Information Security (BSI – Bundesamt für Sicherheit...
2024-4-16 15:18:43 | 阅读: 5 |
收藏
|
Insinuator.net - insinuator.net
analysis
furthermore
dsmsvc
microsoft
security
Breaking UPS Parcel Tracking
Today, we describe our findings at United Parcel Service of America, Inc. (UPS), a...
2024-4-10 21:22:1 | 阅读: 6 |
收藏
|
Insinuator.net - insinuator.net
ups
parcel
reaction
ernw
I know what you ordered last summer @ Winterkongress 2024
Dennis and I already published blog posts about our research project dealing with...
2024-4-3 19:45:44 | 阅读: 6 |
收藏
|
Insinuator.net - insinuator.net
winterthur
journalists
security
swiss
Considerations on AI-Security – Part I: Introduction and Nondeterminism
Hey there!This is the first blog post in a series about issues we think are currently rel...
2024-2-7 00:48:49 | 阅读: 12 |
收藏
|
Insinuator.net - insinuator.net
security
chatgpt
llm
bots
Student Project – Audit Framework
IntroductionIn 2021, ERNW collaborated with Hochschule Mannheim for their CEP (Cy...
2023-10-20 16:38:17 | 阅读: 11 |
收藏
|
Insinuator.net - insinuator.net
highlights
ernw
github
jungbusch
goja
c0c0n 2023 – A Short Retrospective
Two weeks ago, I was at the c0c0n conference in Cochin (India). This conference is...
2023-10-17 23:21:43 | 阅读: 9 |
收藏
|
Insinuator.net - insinuator.net
security
software
windows
c0c0n
Lua-Resty-JWT Authentication Bypass
I was writing some challenges for PacketWars at TROOPERS22. One was intended to be...
2023-10-10 23:14:47 | 阅读: 14 |
收藏
|
Insinuator.net - insinuator.net
jwe
alg
library
whitelist
cdbattags
Breaking DPD Parcel Tracking
This blog post is the continuation of our parcel research. We already reported abo...
2023-9-13 00:28:6 | 阅读: 17 |
收藏
|
Insinuator.net - insinuator.net
dpd
parcel
dhl
prompts
limiting
Identification of (malicious) modifications in memory-mapped image files
I’m happy to announce the publication of the paper Windows memory forensics: Identificatio...
2023-9-6 21:51:8 | 阅读: 10 |
收藏
|
Insinuator.net - insinuator.net
vad
windows
memory
Select * from OpenStack – A Steampipe Plugin for OpenStack
Although, more and more companies start to move their IT-Infrastructure from on-premise to...
2023-8-2 17:45:18 | 阅读: 9 |
收藏
|
Insinuator.net - insinuator.net
steampipe
openstack
cloud
software
security
All your parcel are belong to us – Talk at Troopers 2023
At Troopers 2023, we gave a talk on how to attack DHL parcel tracking information based on...
2023-7-11 22:9:38 | 阅读: 10 |
收藏
|
Insinuator.net - insinuator.net
postal
parcel
dhl
parcels
population
The DRACO Stream Cipher
In symmetric-key cryptography, we typically distinguish two types of encryption schemes: b...
2023-6-21 21:15:10 | 阅读: 16 |
收藏
|
Insinuator.net - insinuator.net
draco
ciphers
security
matthias
volatile
Jasper Reports Library Code Injection
During the past year we had several projects where our target application used Jasper Repo...
2023-6-13 22:8:10 | 阅读: 34 |
收藏
|
Insinuator.net - insinuator.net
jasper
library
reverse
IMF Conference 2023 in Munich
The IMF Conference is the International Conference on IT Security Incident Managem...
2023-5-26 02:3:59 | 阅读: 13 |
收藏
|
Insinuator.net - insinuator.net
ceph
software
osd
vampyr
bluestore
AD /Azure Security Track on Troopers 23
Hi!We’re excited to announce the nearly complete composition of the Active Direct...
2023-5-5 16:28:20 | 阅读: 12 |
收藏
|
Insinuator.net - insinuator.net
troopers
windows
announce
schmitt
martin
Hack In The Box Security Conference 2023 @ Amsterdam – Summary
In this blog post, we are sharing summaries of talks from the Hack in the Box Conference i...
2023-5-4 17:12:48 | 阅读: 24 |
收藏
|
Insinuator.net - insinuator.net
security
xrp
talks
attacker
Hilarious Buffer Overflow Mitigation and TCL Injection in CheckPoint Gaia Portal
Hey there,I am going to disclose two bug classes I found a while ago in CheckPoin...
2022-12-16 18:5:17 | 阅读: 24 |
收藏
|
Insinuator.net - insinuator.net
tcl
overflow
remote
checkpoint
username
Some experiments with Process Hollowing
Process Hollowing is a technique used by various malware families (such as FormBook, Trick...
2022-9-30 05:20:43 | 阅读: 22 |
收藏
|
insinuator.net
memory
windows
syswow64
mapped
nounmap
Spymax: The android RAT and it works like that….
2022-9-7 19:23:29 | 阅读: 14 |
收藏
|
insinuator.net
Whitepaper Endpoint Management & Monitoring Solutions Released
Over the course of the last 2 years we preformed vulnerability research on several...
2022-8-10 19:36:33 | 阅读: 25 |
收藏
|
insinuator.net
whitepaper
xi
preformed
dsm
broadcom
Previous
1
2
3
4
5
6
7
8
Next