Aggregator
微软运用欺骗性策略大规模打击网络钓鱼活动
FreeBuf | 字节大模型被实习生投毒;新的macOS漏洞可绕过安全控制
NIS2: Implementing Regulation della Commissione
Bear C2 Exposed: Russian APT’s Advanced Encryption Tactics
BEAR-C2 Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of encryption methods, including AES, XOR, DES, TLS, RC4, RSA and...
The post Bear C2 Exposed: Russian APT’s Advanced Encryption Tactics appeared first on Penetration Testing Tools.
conjur: secures secrets used by privileged users and machine identities
Conjur Conjur provides secrets management and machine identity for modern infrastructure: Machine Authorization Markup Language (“MAML”), a role-based access policy language to define system components & their roles, privileges, and metadata A REST web...
The post conjur: secures secrets used by privileged users and machine identities appeared first on Penetration Testing Tools.
Cross-Platform Design Wrapped Part 3: UI Polish and Interaction Design
Rubeus: C# toolset for raw Kerberos interaction and abuses
Rubeus Rubeus is a C# toolset for raw Kerberos interaction and abuses. It is heavily adapted from Benjamin Delpy’s Kekeo project (CC BY-NC-SA 4.0 license) and Vincent LE TOUX‘s MakeMeEnterpriseAdmin project (GPL v3.0 license). Full credit goes to Benjamin and Vincent for...
The post Rubeus: C# toolset for raw Kerberos interaction and abuses appeared first on Penetration Testing Tools.