unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
CAPE - malware configuration and payload extraction
CAPE is a malware sandbox. It was derived from Cuckoo with the goal of adding automated malware...
2022-3-8 00:55:59 | 阅读: 48 |
收藏
|
hakin9.org
cape
kevoreilly
debugger
github
memory
SSRFire - an automated SSRF finder
An automated SSRF finder. Just give the domain name and your server and chill! ;) It also has op...
2022-3-4 23:29:34 | 阅读: 27 |
收藏
|
hakin9.org
gau
openredirex
ffuf
ssrfire
github
openSquat - Domain Squatting and Phishing Watchdog
What is openSquatopenSquat is an opensource Intelligence (OSINT) security tool to identify cybe...
2022-3-3 21:32:3 | 阅读: 31 |
收藏
|
hakin9.org
opensquat
python
phishing
squatting
homograph
How to Reduce and Secure Your Digital Footprint - infographic by Panda Security
Your digital footprint is the trail of data left behind from all your online activity. Anything...
2022-3-1 23:35:32 | 阅读: 19 |
收藏
|
hakin9.org
footprint
footprints
security
infographic
panda
The Two Sides of the OSINT Coin: A Tool for Hackers and Against Hackers by Gergo Varga
The cybersecurity and fraud world plays host to a relentless series of “cat and mouse” games bet...
2022-3-1 18:3:36 | 阅读: 35 |
收藏
|
hakin9.org
fraudsters
somebody
seon
pieces
network
Obfuscapk - A black-box obfuscation tool for Android apps
Obfuscapk is a modular Python tool for obfuscating Android apps without needing their sourc...
2022-3-1 17:36:52 | 阅读: 27 |
收藏
|
hakin9.org
obfuscapk
apk
keystore
obfuscator
obfuscators
Netdata - Real-time Performance Monitoring
Netdata's distributed, real-time monitoring Agent collects thousands of metrics from systems, ha...
2022-3-1 15:33:50 | 阅读: 22 |
收藏
|
hakin9.org
netdata
monitoring
cloud
19999
ro
Open Source Security in Azure by Gilad David Maayan
It is increasingly common to use open source components in enterprise software projects. Whateve...
2022-2-23 22:3:33 | 阅读: 18 |
收藏
|
hakin9.org
security
software
whitesource
development
Pass The Hash Attacks in Active Directory [FREE COURSE CONTENT]
Consent ManagementWhen you visit any website, it may store or retrieve information on your brow...
2022-2-18 23:53:4 | 阅读: 21 |
收藏
|
hakin9.org
identify
woocommerce
network
rid
utma
Scrummage - tool that centralises search functionality from powerful, yet simple OSINT sites.
VERSION 3.7https://github.com/matamorphosis/ScrummageCode efficiency enhancements and bug fix...
2022-2-18 18:51:53 | 阅读: 22 |
收藏
|
hakin9.org
scrummage
identities
scumblr
privileges
Droopescan - a plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal & Silverstripe
A plugin-based scanner that aids security researchers in identifying issues with several CMS.Us...
2022-2-17 21:11:26 | 阅读: 21 |
收藏
|
hakin9.org
drupal
droopescan
finds
joomla
wordpress
Attacking Kerberos Unconstrained Delegation by Nairuz Abulhul
Trust this user/computer for delegation to any service.Delegation is the act of giving someon...
2022-2-11 23:33:1 | 阅读: 39 |
收藏
|
hakin9.org
delegation
machine
mimikatz
dcorp
Scripting to find named hosts | Golang tutorial [FREE COURSE CONTENT]
Scripting is a crucial skill to make your ethical hacking more streamlined and efficient. In thi...
2022-2-10 23:46:59 | 阅读: 26 |
收藏
|
hakin9.org
security
network
60m
technicals
scraping
SQLRecon - a C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation
DescriptionA C# MS-SQL toolkit designed for offensive reconnaissance and post-exploitation. For...
2022-2-10 19:20:23 | 阅读: 21 |
收藏
|
hakin9.org
sysadmin
database
username
Top 5 EDR Capabilities: Behavioral Protection, Whitelisting, Antimalware and more by Gilad David Maayan
What is EDR?Endpoint detection and response (EDR) solutions provide real-time continuous visibi...
2022-2-10 17:13:3 | 阅读: 16 |
收藏
|
hakin9.org
security
threats
identify
network
monitoring
Using AutoPWN to get a backdoor | Metasploit Tutorial [FREE COURSE CONTENT
In this video from our Client-side Attacks online course we learn how to set up AutoPWN in Meta...
2022-2-9 23:30:18 | 阅读: 40 |
收藏
|
hakin9.org
client
windows
autopwn
software
Email spoofing 101 by Matteo Cosentino
Email spoofing is a technique mostly linked to malicious activities including phishing and spamm...
2022-2-8 23:8:14 | 阅读: 20 |
收藏
|
hakin9.org
dmarc
spf
dkim
3600
envelope
Winshark - Wireshark plugin to work with Event Tracing for Windows
Wireshark plugin to work with Event Tracing for WindowsMicrosoft Message Analyzer is being reti...
2022-2-8 17:4:39 | 阅读: 23 |
收藏
|
hakin9.org
winshark
windows
etw
network
logman
Digital criminology in solving cybercrime by Anastasis Vasileiadis
Digital forensics is the application of research techniques to solve digital crimes, from viruse...
2022-2-8 00:10:57 | 阅读: 27 |
收藏
|
hakin9.org
security
identify
criminology
developers
crimes
Phant0m - Windows Event Log Killer
Svchost is essential in the implementation of so-called shared service processes, where a number...
2022-2-4 22:26:26 | 阅读: 28 |
收藏
|
hakin9.org
phant0m
windows
eventlog
github
scm
Previous
9
10
11
12
13
14
15
16
Next