Aggregator
小年纳福,满载祝愿
Local LLM Models and Game Changing Use Cases for Life Hackers: How Local LLMs Can Help You
Uptycs EKS Add-on on AWS | Uptycs
Mirai 变种 Murdoc Botnet 利用 AVTECH IP 摄像头和华为路由器的安全漏洞
Mirai 变种 Murdoc Botnet 利用 AVTECH IP 摄像头和华为路由器的安全漏洞
EDRSandblast-GodFault: weaponize a vulnerable signed driver to bypass EDR detections
EDRSandblast-GodFault Integrates GodFault into EDR Sandblast, achieving the same result without the use of any vulnerable drivers. EDRSandBlast is a tool written in C that weaponizes a vulnerable signed driver to bypass EDR detections (Notify Routine callbacks, Object...
The post EDRSandblast-GodFault: weaponize a vulnerable signed driver to bypass EDR detections appeared first on Penetration Testing Tools.
flutter-spy: Explore, analyze, and gain valuable data & insights from reverse engineered Flutter apps
Flutter Spy Flutter Spy is a Bash-based command-line tool designed to provide insightful code analysis and data extraction capabilities from built Flutter apps with reverse engineering. It empowers developers, bug hunters, and security enthusiasts...
The post flutter-spy: Explore, analyze, and gain valuable data & insights from reverse engineered Flutter apps appeared first on Penetration Testing Tools.
HTMLSmuggler: JS payload generator for IDS bypass and payload delivery via HTML smuggling
HTMLSmuggler HTMLSmuggler – JS payload generator for IDS bypass and payload delivery via HTML smuggling. The primary objective of HTML smuggling is to bypass network security controls, such as firewalls and intrusion detection systems,...
The post HTMLSmuggler: JS payload generator for IDS bypass and payload delivery via HTML smuggling appeared first on Penetration Testing Tools.