不安全
Common web application threats & risk
1 year 1 month ago
DLL hijacking in TOTOLINK A600UB Driver Installer
1 year 1 month ago
HTB | Cascade — Reverse Engineering - DnSpy and AD Recycle
1 year 1 month ago
Electron JS Application Penetration Testing
1 year 1 month ago
Electron JS Application Penetration Testing
1 year 1 month ago
How i Find Database Credentials via Mass Recon & Recon Scoping on Gcash
1 year 1 month ago
Bypassing Account Suspension Using Anonymous Posting | Facebook Bug Bounty
1 year 1 month ago
Utilizing AI Model for Hacking: Bypassing CAPTCHAs using AI leads to Account Takeover | Bug Bounty
1 year 1 month ago
大模型时代已经来临!AI Agent 进入2.0时代,然而我发现我错了...
1 year 1 month ago
大模型发展实在是太快了,也太“卷”了,在ChatGPT发布大火之后,标志着人类开始已经进入大模型时代... 在这里时代了主要围绕大模型本身(参数,打榜)、多模态(视频、声音)、Agent(自动化)、提
CVE-2024–25600: WordPress Bricks Builder Remote Code Execution Vulnerability -$$$$ BOUNTY
1 year 1 month ago
CVE-2024–25600: WordPress Bricks Builder Remote Code Execution Vulnerability -$$$$ BOUNTY
1 year 1 month ago
DnsAdmins PrivEsc
1 year 1 month ago
Exploring Jailbreak Attacks: Understanding LLM Vulnerabilities and the Challenges of Detection and…
1 year 1 month ago
Building and Automating Cybersecurity Newsletter — DevSec Selection Case Study
1 year 1 month ago
Security — Like Layers of Onion (Defense)
1 year 1 month ago
Local Privilege Escalation by Leveraging Remote Debugging Protocol Features Pt. 1
1 year 1 month ago
How You Can Hack and Take Over a Car in 30 Seconds: Lessons from Sam Curry’s Research
1 year 1 month ago
Build a Keylogger in Python — Beginner Cybersecurity Project
1 year 1 month ago
Advance AI Test Cases For Penetration Testing
1 year 1 month ago
Checked
11 hours 49 minutes ago
unSafe.sh - 不安全
不安全 feed