Aggregator
恶意代码技术及恶意代码检测技术原理与实现
守护网络安全:从日常生活做起的防护策略
2024高校网络安全管理运维赛 wp - 渗透测试中心
2024熵密杯wp - 渗透测试中心
Rspamd: Open-source spam filtering system
Rspamd is an open-source spam filtering and email processing framework designed to evaluate messages based on a wide range of rules, including regular expressions, statistical analysis, and integrations with custom services like URL blacklists. The system analyzes each message and assigns a verdict, which the MTA can use to take further actions, such as rejecting the message or adding a spam indicator header. Additionally, Rspamd provides valuable information like potential DKIM signatures and suggested message … More →
The post Rspamd: Open-source spam filtering system appeared first on Help Net Security.
SOC teams are frustrated with their security tools
Security operations center (SOC) practitioners believe they are losing the battle detecting and prioritizing real threats – due to too many siloed tools and a lack of accurate attack signal, according to Vectra AI. They cite a growing distrust in vendors, believing their tools can be more of a hindrance than help in spotting real attacks. This is at odds with growing confidence in their teams’ abilities and a sense of optimism around the promise … More →
The post SOC teams are frustrated with their security tools appeared first on Help Net Security.
Quickpost: The Electric Energy Consumption Of LLMs
Meet the shared responsibility model with new CIS resources
You can’t fulfill your end of the shared responsibility model if you don’t emphasize secure configurations. Depending on the cloud services you’re using, you’re responsible for configuring different things. Once you figure out those responsibilities, you then need to perform the hardening. Our guidance helps simplify the process. It explains how you can use the CIS Foundations Benchmarks to get started with identity and access management (IAM), logging and monitoring, and networking on the cloud … More →
The post Meet the shared responsibility model with new CIS resources appeared first on Help Net Security.
解决WordPress上传svg/ico/webp,您无权上传此文件类型
Everest
SHELLSILO: Simplifying Syscall Assembly and Shellcode Creation
SHELLSILO SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the process of constructing and utilizing structures, assigning variables, and making system calls. With this...
The post SHELLSILO: Simplifying Syscall Assembly and Shellcode Creation appeared first on Penetration Testing Tools.
BPF Compiler Collection: BPF-based Linux IO analysis, networking, monitoring, and more
BPF Compiler Collection (BCC) BCC is a toolkit for creating efficient kernel tracing and manipulation programs and includes several useful tools and examples. It makes use of extended BPF (Berkeley Packet Filters), formally known...
The post BPF Compiler Collection: BPF-based Linux IO analysis, networking, monitoring, and more appeared first on Penetration Testing Tools.
SharpDPAPI: C# port of some Mimikatz DPAPI functionality
SharpDPAPI SharpDPAPI is a C# port of some DPAPI functionality from @gentilkiwi‘s Mimikatz project. The SharpChrome subproject is an adaptation of work from @gentilkiwi and @djhohnstein, specifically his SharpChrome project. However, this version of SharpChrome uses a different version of the C# SQL library that...
The post SharpDPAPI: C# port of some Mimikatz DPAPI functionality appeared first on Penetration Testing Tools.