Aggregator
CVE-2014-3081 | IBM Global Console Manager 16 up to 1.20.0.22574 Firmware prodtest.php filename information disclosure (ID 127543 / EDB-34132)
CVE-2007-0774 | Apache Tomcat JK Web Server Connector 1.2.19 mod_jk.so map_uri_to_worker stack-based overflow (EDB-4162 / Nessus ID 24841)
更幽默!当在必应搜索谷歌时微软会弹出仿照谷歌搜索的UI让用户留在必应
新 AI 越狱方法“Bad Likert Judge”将攻击成功率提升超 60%
新 AI 越狱方法“Bad Likert Judge”将攻击成功率提升超 60%
Any hackers amongst us tonight ready to eat?
Sensitive Patient and Employee Data Exposed in Asheville Eye Associates Cyberattack
LDAPNightmare 漏洞:未打补丁的 Windows 服务器面临崩溃重启风险
LDAPNightmare 漏洞:未打补丁的 Windows 服务器面临崩溃重启风险
研究人员发现 Nuclei 漏洞可绕过签名执行代码
研究人员发现 Nuclei 漏洞可绕过签名执行代码
CVE-2019-6208 | Apple tvOS up to 12.1.1 Kernel resource management (HT209447 / EDB-46296)
RequestShield: analyze HTTP access.logs and identify suspicious HTTP requests and potential security threats
RequestShield RequestShield is a 100% Free and Open Source tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential security threats. It uses factors like geolocation, abuse history, request volume, and...
The post RequestShield: analyze HTTP access.logs and identify suspicious HTTP requests and potential security threats appeared first on Penetration Testing Tools.
针对 PostgreSQL 数据库的攻击研究
针对 PostgreSQL 数据库的攻击研究
针对 PostgreSQL 数据库的攻击研究
针对 PostgreSQL 数据库的攻击研究
幽默!微软推送的Windows 11升级弹窗自己卡死崩溃 肯定又是没测试
autobloody: automatically exploit Active Directory privilege escalation paths
autobloody autobloody is a tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound combining pathgen.py and autobloody.py. This tool automates the AD privesc between two AD objects, the source (the one we own) and...
The post autobloody: automatically exploit Active Directory privilege escalation paths appeared first on Penetration Testing Tools.