不安全
EDR lab: piccolo self-test #1
1 year 4 months ago
IntroduzioneDevo fare diverse premesse per questo post e parto dall’inizio. Da circa un pai
USENIX Security ’23 – V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-Source Software Components Using Code Classification Techniques
1 year 4 months ago
Authors/Presenters:Seunghoon Woo, Eunjin Choi, Heejo Lee, Hakjoo Oh Many thanks to U
Amazing Game with Real World Geographic Data
1 year 4 months ago
Normally I like to post tips and tricks here, but this time it will be just a youtube reference
Re-implementing my Linux Rust scheduler in eBPF
1 year 4 months ago
OverviewThe main bottleneck of scx_rustland, a Linux schedulerwritten in Rust, is the communicati
New Malware Hits 300,000 Users with Rogue Chrome and Edge Extensions
1 year 4 months ago
Browser Security / Online FraudAn ongoing, widespread malware campaign has been observed installin
A Nationwide Drive Time Matrix Between U.S. ZIP Code Areas: Methodology
1 year 4 months ago
Authors:(1) Yujie Hu, Department of Geography, University of Florida, Gainesville, FL 32611 and UF
The Complex Road From P to NP: The Magic of the Solution Space
1 year 4 months ago
P (polinomyal time) vs NP (non-polynomial time) is a question that tackles the underlying complexity
Idapro-9.0-beta build has been leaked and cracked
1 year 4 months ago
略缩图打开变成另一张图
1 year 4 months ago
发布时间: 2024-08-10(New Article)
After global IT meltdown, CrowdStrike courts hackers with action figures and gratitude
1 year 4 months ago
On Wednesday morning, thousands of cybersecurity professionals swarmed the halls of the Mandalay Ba
A Nationwide Drive Time Matrix Between U.S. ZIP Code Areas: Abstract and Introduction
1 year 4 months ago
Authors:(1) Yujie Hu, Department of Geography, University of Florida, Gainesville, FL 32611 and UF
Crooks took control of a cow milking robot causing the death of a cow
1 year 4 months ago
Crooks took control of a cow milking robot causing the death of a cowCrooks took control of a
The Cyber Kill Chain and Incident Response Process
1 year 4 months ago
How I got my first $13500 bounty through Parameter Polluting (HPP)
1 year 4 months ago
How I got my first $13500 bounty through Parameter Polluting (HPP)
1 year 4 months ago
SSRF: Blacklist and Whitelist-Based Input Filters
1 year 4 months ago
SSRF: Blacklist and Whitelist-Based Input Filters
1 year 4 months ago
Persistent XSS Vulnerability on Microsoft Bing’s Video Indexing System
1 year 4 months ago
Android Penetration Testing + Nuclei (Automated Android Pentesting)
1 year 4 months ago
Checked
2 hours 33 minutes ago
unSafe.sh - 不安全
不安全 feed