Aggregator
关注 | 流量智能安全分析专题会议顺利举行
关注 | 抗量子密码:标准、迁移与应用专题会议顺利举行
CVE-2024-52312 | Amazon data.all up to 2.6.0 authorization (GHSA-676j-g6g5-chj9)
CVE-2024-10953 | Amazon data.all up to 2.6.0 UPDATE authorization (GHSA-x4j5-jm65-vp5j)
CVE-2024-52311 | Amazon data.all up to 2.6.0 API Request authorization (GHSA-p69m-h9rw-584v)
CVE-2024-52314 | Amazon data.all up to 2.6.0 Application Log authorization (GHSA-p2h8-r28g-5q6h)
CVE-2024-52313 | Amazon data.all up to 2.6.0 getDataset authorization (GHSA-hx8q-7wxv-6c7c)
发布 | 中国信通院发布《边缘计算产业发展研究报告(2024年)》(附下载)
观点 | 防范数字贸易中的全球价值链参与风险
前沿 | 从产业布局看中美AI发展路径差异
前沿 | 国内大型油气田网络信息安全问题及对策研究
关于举办第十八届全国大学生信息安全竞赛暨第二届“长城杯”大赛的通知
IP切片剪辑运营陪跑实操课程
APT73
macOS Adobe 应用程序下载和安装程序:Adobe Downloader
cred1py: A tool used to exploit CRED-1 over a SOCKS5 connection
Overview This is a tool used to exploit CRED-1 over a SOCKS5 connection (with UDP support). How CRED-1 Attack Works CRED-1 can be broken down into the following steps: Send a DHCP Request for...
The post cred1py: A tool used to exploit CRED-1 over a SOCKS5 connection appeared first on Penetration Testing Tools.
拿不下总统之位,那就用热加载拿下验证码识别与爆破好了!
velociraptor: Endpoint visibility and collection tool
Velociraptor – Endpoint visibility and collection tool. Velociraptor is a unique, advanced open-source endpoint monitoring, digital forensic, and cyber response platform. It was originally developed by DFIR professionals who needed a powerful and efficient...
The post velociraptor: Endpoint visibility and collection tool appeared first on Penetration Testing Tools.
ivre: open source network recon framework
IVRE IVRE is an open-source framework for network recon. It relies on open-source well-known tools (Nmap, Zmap, Masscan, Bro, and p0f) to gather data (network intelligence), stores it in a database (MongoDB), and provides tools to analyze it....
The post ivre: open source network recon framework appeared first on Penetration Testing Tools.