unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Recon for bug bounty: 8 essential tools for performing effective reconnaissance
We all know that reconnaissance is important in bug bounty, in fact, it is the most important phase...
2024-10-15 08:0:0 | 阅读: 0 |
收藏
|
Intigriti - blog.intigriti.com
github
security
amass
记一次因API接口问题导致目标内网沦陷
这是 酒仙桥六号部队 的第 119 篇文章。全文共计1689个字,预计阅读时长6分钟。背景在跟女朋友一起散步的时候,突然接到通知,客户已经给了测试的资产范围如下,目标要求拿到目标服务器内网权限。目标资...
2024-10-15 07:15:0 | 阅读: 28 |
收藏
|
迪哥讲事 - mp.weixin.qq.com
女朋友
漏洞
账号
信息
表哥
New FASTCash malware Linux variant helps steal money from ATMs
error code: 1106...
2024-10-15 06:30:22 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Attacking the Samsung Galaxy A* Boot Chain
We discovered several vulnerabi...
2024-10-15 06:0:0 | 阅读: 0 |
收藏
|
Quarkslab's blog - blog.quarkslab.com
memory
samsung
odin
persistency
Unlocking Proactive Compliance with Adobe’s Common Controls Framework
TechSpective Podcast Episode 141 I had the pleasure of speaking with Devansh Sharma, Se...
2024-10-15 05:45:59 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
tony
bradley
proactive
vivo X200 Pro :再见「高山」
以「影像灭霸」之名,再一次攀登高山作者 | 张勇毅编辑 | 靖宇在电影《一代宗师》中,叶问在与北派武林的盟主切磋技艺「搭手」前,被「世外高人」账房先生指点:过手如登山,一步一重天。在主流的理解中,这句...
2024-10-15 05:1:0 | 阅读: 15 |
收藏
|
极客公园 - mp.weixin.qq.com
x200
vivo
ultra
x100
风光
Escape the Coordi(N)ation Hunger Games: The Matrix of Coordination & Optimistic Exit (Part 1)
The Imagination CeilingOne of the people who know me best once told me, "You know, Neter (they used...
2024-10-15 05:0:28 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
quadrant
governance
coordinate
U.S. CISA adds Fortinet products and Ivanti CSA bugs to its Known Exploited Vulnerabilities catalog
U.S. CISA adds Fortinet products and Ivanti CSA bugs to its Known Exploited Vulnerabilities catalo...
2024-10-15 04:46:58 | 阅读: 8 |
收藏
|
Security Affairs - securityaffairs.com
csa
exploited
ivanti
catalog
Minutes Network Appoints Gaming And Web3 Veteran Jamie King, Former Rockstar Co-Founder, as CMO
**LEEDS, United Kingdom, October 14th, 2024/Chainwire/--**Minutes Network, the world's first blockch...
2024-10-15 04:42:12 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
network
jamie
king
worldwide
innovation
Jetpack fixes critical information disclosure flaw existing since 2016
error code: 1106...
2024-10-15 03:45:20 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
How to Write Good Bug Reports: Recommendations
Imagine you're a developer, and a tester brings you a bug that was found during regression. You want...
2024-10-15 03:0:35 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
developer
tester
occurred
testers
USENIX NSDI ’24 – CHISEL: An Optical Slice of the Wide-Area Network
Authors/Presenters:Abhishek Vijaya Kumar, Bill Owens, Nikolaj Bjørner, Binbin Guan, Yaw...
2024-10-15 03:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
usenix
presenters
vijaya
rachee
U.S. Lawmakers, White House Move to Stem China Cyberthreat
Congressional lawmakers are pushing for information from three wireless carriers and pressing feder...
2024-10-15 02:42:31 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
typhoon
salt
committee
CODASPY 2025 CFP
环境异常 当前环境异常,完成验证后即可继续访问。 去验证...
2024-10-15 02:42:0 | 阅读: 11 |
收藏
|
安全学术圈 - mp.weixin.qq.com
AI革新软件供应链:开辟安全赋能的新篇章
环境异常 当前环境异常,完成验证后即可继续访问。 去验证...
2024-10-15 02:30:0 | 阅读: 0 |
收藏
|
默安科技 - mp.weixin.qq.com
音视频技术原理及应用
音频基础声音转数字信号音频基础知识及 PCM 技术详解声音的本质是一种能量波。音调,由声音的频率决定。音量,由振幅和人离声源的距离决定。音色,由波形决定。从声音到数字信号,宏观上包括三个步骤:声波通过...
2024-10-15 02:4:0 | 阅读: 0 |
收藏
|
字节跳动技术团队 - mp.weixin.qq.com
数据
滤波
码率
网络
信息
他来了,他带着官方课程走来了!豆包MarsCode 研习社开始报名啦!
听说,还有同学没用过豆包MarsCode?还有同学下载了豆包MarsCode 编程助手却不知如何使用?莫慌!让我来教你!作为一个优秀的 AI 编程助手插件,必须提供全方位的一条龙服务!为了帮助大家深度...
2024-10-15 02:4:0 | 阅读: 0 |
收藏
|
字节跳动技术团队 - mp.weixin.qq.com
豆包
marscode
研习
编程
京东
UL NO. 454: The First AI Breaches
SECURITY | AI | PURPOSEUNSUPERVISED LEARNING is a newsletter about upgrading to thrive in a world fu...
2024-10-15 01:59:54 | 阅读: 4 |
收藏
|
Unsupervised Learning - danielmiessler.com
elon
myself
security
threats
tesla
AI时代 安全护航 | 霸王茶姬,助力第八届安全开发者峰会(内含赠票活动)
第八届安全开发者峰会 / SDC2024AI时代,安全不仅仅是防御和保护,而是需要与技术创新并行发展。10月23日,看雪·第八届安全开发者峰会(SDC 2024)将于上海举办!本届峰会以“AI时代 安...
2024-10-15 01:59:0 | 阅读: 2 |
收藏
|
看雪学苑 - mp.weixin.qq.com
安全
审计
信息
数据
libEnccryptor vm 还原的探索
一前言VM对我也说一直是个很有意思的东西,自想还原vmp失败以来,一有机会了解vm都会去看一下,js的vm有很多教程了对我启发很大。这篇文章的实现方案是我的一种对vm还原的尝试,按照我最开始的想法是要...
2024-10-15 01:59:0 | 阅读: 3 |
收藏
|
看雪学苑 - mp.weixin.qq.com
vreg
x4
16vreg
x19
x5
Previous
379
380
381
382
383
384
385
386
Next