unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Hack Yourself To A Secure Future With Breach And Attack Simulation by Jeff Broth
As the title denotes, you need to hack your organization's IT systems before cyberattackers do s...
2022-1-12 20:13:39 | 阅读: 12 |
收藏
|
hakin9.org
security
simulation
bas
network
Android Malware On the Rise Again - Essential Tips to Follow by Farwa Sajjad
Everyone is now immensely dependent on mobile phones. From acquiring education to shopping, onli...
2022-1-11 21:1:17 | 阅读: 20 |
收藏
|
hakin9.org
malicious
signs
phones
security
battery
RiotPot - Resilient IoT and Operational Technology Honeypot
1. DescriptionRIoTPot is an interoperable medium interaction honeypot, primarily focused on the...
2022-1-5 19:52:32 | 阅读: 25 |
收藏
|
hakin9.org
riotpot
honeypot
development
containers
database
AzureHunter - a Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365
Getting Started1. Check that you have the right O365 PermissionsThe following roles are requi...
2022-1-4 18:29:21 | 阅读: 18 |
收藏
|
hakin9.org
playbooks
azurehunter
playbook
FormatFuzzer - a framework for high-efficiency, high-quality generation and parsing of binary inputs
FormatFuzzer is a framework for high-efficiency, high-quality generation and parsing of binary i...
2021-12-16 23:24:43 | 阅读: 29 |
收藏
|
hakin9.org
fuzzer
readubyte
fuzzers
ihdr
Swurg - a Burp Suite extension for automating OpenAPI-based APIs security assessments
Swurg is a Burp Suite extension designed for OpenAPI testing.The OpenAPI Specification (OAS) d...
2021-12-11 17:00:51 | 阅读: 23 |
收藏
|
hakin9.org
openapi
burp
swurg
swagger
repository
Cross-Browser Fingerprinting: Tracking and Verification Method of the Future or Abandoned Experiment? by
At the NDSS Symposium of 2017, three researchers from Pennsylvania’s Lehigh University presented...
2021-12-10 22:59:10 | 阅读: 15 |
收藏
|
hakin9.org
seon
adopted
boda
utilized
Privilege Escalation with MySQL User Defined Functions by Nairuz Abulhul
Functions are a block of queries and statements that take inputs and return values. All popula...
2021-12-10 20:36:14 | 阅读: 22 |
收藏
|
hakin9.org
library
raptor
database
udf2
machine
Kubernetes DDoS: Dangers of K8s Auto Scaling by Gilad David Maayan
Distributed denial of service (DDoS) is an old attack pattern, and there are well-known solution...
2021-12-10 19:43:03 | 阅读: 26 |
收藏
|
hakin9.org
kubernetes
cloud
scaling
burst
limiting
Building an Incident Response Process for SSRF Attacks by Gilad David Maayan
What is Server-Side Request Forgery (SSRF)?It is quite common for web applications to perform r...
2021-12-07 18:49:24 | 阅读: 28 |
收藏
|
hakin9.org
ssrf
security
identify
network
attackers
OffensiveRust - Rust Weaponization for Red Team Engagements
My experiments in weaponizing Rust for implant development and general offensive operations.Ta...
2021-12-6 15:25:4 | 阅读: 81 |
收藏
|
hakin9.org
shellcode
compiling
toolchain
windows
client
SillyRAT - a Cross Platform multifunctional (Windows/Linux/Mac) RAT
Getting StartedDescriptionA cross platform RAT written in pure Python. The RAT accept commands...
2021-11-24 16:31:22 | 阅读: 10 |
收藏
|
hakin9.org
payload
python
sillyrat
python3
hash3lizer
Fhex - A Full-Featured HexEditor compatible with Linux/Windows/MacOS
This project is born with the aim to develop a lightweight, but useful tool. The reason is that...
2021-11-19 23:04:58 | 阅读: 15 |
收藏
|
hakin9.org
fhex
chart
keystone
drag
axis
ATM Hacking: Advanced methods for finding security vulnerabilities by Anastasis Vasileiadis
The ATM is a machine that allows customers to make banking transactions without entering the ban...
2021-11-17 21:25:13 | 阅读: 34 |
收藏
|
hakin9.org
atm
security
atms
network
windows
ddosify - a high-performance load testing tool, written in Golang
Features✔️ Protocol Agnostic - Currently supporting HTTP, HTTPS, HTTP/2. Other protocols are o...
2021-11-10 01:46:38 | 阅读: 33 |
收藏
|
hakin9.org
proxy
payload
apk
download
tap
The Russian Kerbrute by Ivan Glinkin
The first thing every penetration tester performs getting into a controller domain subnet is t...
2021-11-09 20:38:15 | 阅读: 37 |
收藏
|
hakin9.org
surnames
security
surname
woords
letter
PeTeReport - open-source application vulnerability reporting tool
PeTeReport (PenTest Report) is an open-source application vulnerability reporting tool designed...
2021-11-08 19:51:29 | 阅读: 59 |
收藏
|
hakin9.org
petereport
database
django
appendix
pentesters
GC2 - Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet and exfiltrate data using Google Drive
GC2 (Google Command and Control) is a Command and Control application that allows an attacker to...
2021-11-04 20:09:23 | 阅读: 36 |
收藏
|
hakin9.org
gc2
download
machine
github
remote
Identification and Authentication of IoT Objects by Arthur Rowley
Learn everything you need about the authentication of IoT objects IoT devices undoubtedly make...
2021-11-03 01:13:09 | 阅读: 41 |
收藏
|
hakin9.org
security
parties
symmetric
hardware
9 Upcoming Cybersecurity Trends To Watch Out For In 2021
Cybersecurity has evolved to be a very crucial component of any business today. Technology has b...
2021-10-27 18:18:23 | 阅读: 26 |
收藏
|
hakin9.org
security
ransomware
encryption
threats
Previous
11
12
13
14
15
16
17
18
Next