unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Engaging Social Engineering: Extracting Information through Strategic Interactions
Editorial note: We decided to remove any and all last names from the examples section as to not b...
2023-5-18 16:51:11 | 阅读: 18 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
disputes
restraint
anger
employed
Exclusive Interview with Alexandre Teyar - the creator of BurpGPT
Dear Readers, Burp Suite and ChatGPT have been hot topics in the world of Cybersecurity. That is...
2023-5-11 16:45:42 | 阅读: 28 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
security
alexandre
hot
teyar
Secure Coding Practices in Python: Best Practices for Avoiding Common Vulnerabilities
Overview Creating a program is only one aspect of coding. Because stolen data is just as harmful...
2023-4-26 04:1:17 | 阅读: 19 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
python
security
developers
threats
agnostic
OSINT: A Thoughtfulness About the Advantages and Disadvantages of this Technique
OSINT, What is it? OSINT, acronym word from English Open Source Intelligence, refers to a set of...
2023-4-26 03:48:17 | 阅读: 18 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
masint
conflict
refers
forums
specialized
Bypassing and Securing Kubernetes Ingress Network Policies
AuthorsKavyashree Ramesh, Tousif Khazi, Tejas Jaiswal About UsIBM PTC is a proficient internal...
2023-4-26 03:35:28 | 阅读: 24 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
network
ingress
bypass
security
weakness
When PT in ChatGPT refers to Penetration Testing
Reconnaissance and scanning A word of caution: this article makes considerable use of concepts su...
2023-4-20 18:42:27 | 阅读: 30 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
chatgpt
nowadays
funnier
prologue
everybody
Hashcat: A Beginner's Guide
Disclaimer: This is intended to...
2023-4-18 22:10:41 | 阅读: 24 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
hashing
anyway
hashed
identify
dirty
Impact of Artificial Intelligence on Cybersecurity
Impact of Artificial Intelligenc...
2023-4-18 01:3:40 | 阅读: 15 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
artificial
toolsets
impacting
attackers
Insider Threats: The Hidden Danger Within Your Organization and How to Safeguard Against Them
In today's digital age, informat...
2023-4-17 18:39:46 | 阅读: 13 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
insider
threats
workplace
broad
Security of Privileged Access
Introduction Privileged access r...
2023-4-17 16:45:0 | 阅读: 14 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
privileged
security
elevated
carefully
harm
Modern Special Forces Of The Future (Air, Land, Sea, Cyber)
The world is becoming more complicat...
2023-4-13 01:9:34 | 阅读: 21 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
forces
military
artificial
autonomous
armed
A.I.-driven shields design for cyber warriors.
Since more private data is stored and transmitted digitally, cybersecurity has emerged as a press...
2023-4-4 17:41:43 | 阅读: 10 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
artificial
threats
crucial
worst
Email Delivery: How to Break All the Rules of Zero Trust
92% of malware spread through the email system. This is not a surprise if we consider that the em...
2023-4-3 21:39:31 | 阅读: 22 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
surprise
breaks
security
facebook
szilárd
Bitcoin Account Hijacking Using OSINT Techniques
Researchers at Kudelski Security have managed to break Bitcoin and Ethereum wallets using a novel...
2023-3-28 21:51:52 | 阅读: 25 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
wallets
facebook
szilárd
pfeiffer
kudelski
Cyber Counter-Terrorism: Shutdown
Breaking through the vulnerabilities of fear From here, a perspective will be addressed regarding t...
2023-3-9 05:57:46 | 阅读: 14 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
fear
security
moral
duty
lucas
New frontiers, new worlds, new threats
Where are you going?There.What time will you be back?I will be back soon. Mr.Cardoso Image created...
2023-3-9 04:12:12 | 阅读: 20 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
facebook
mendes
midjourney
drastic
The process of developing tactics with the purpose of preparing for a cyberwar
Who are the cyber military powers today? Cyber military defenses are being developed by most of t...
2023-3-9 02:48:16 | 阅读: 14 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
military
powers
defenses
defensive
facebook
Dynamic SQLIA Detection with PHP
Introduction We’re going to discuss a dynamic approach to detect an SQL Injection Attack (SQLIA)...
2023-3-9 02:40:26 | 阅读: 17 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
injection
malicious
manipulated
taqiezadeh
taqie
Writing A Simple Ransomware Using Python
Introduction: Ransomware is a program designed to prevent a user or organization from accessing fil...
2023-3-9 02:26:23 | 阅读: 19 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
saeed
encrypts
demands
paying
easiest
Why Using Open Source Resources in App Development is Essential
App development can be a logistical nightmare if you do not know what you are doing, and if you d...
2023-3-8 20:54:5 | 阅读: 15 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
development
software
developers
truly
flexibility
Previous
3
4
5
6
7
8
9
10
Next