unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Email, Email on the Wall, Who Sent You, After All?
Franky opens her email in the morning and sees the following email in her inbox:...
2024-10-29 16:1:33 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.compass-security.com
aol
yahoo
spf
dkim
msa
Voice Cloning with Deep Learning Models
Given the explosion of development and interest in deep learning models in the past...
2024-10-18 15:1:30 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.compass-security.com
wav
duration
clips
cloning
tortoise
COM Cross-Session Activation
Once again, reading blogs and tweets from James Forshaw led me to wonder how things work. T...
2024-10-1 15:2:28 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.compass-security.com
software
activation
updater
forshaw
Email, Email on the Wall, Who Sent You, After All?
During Business Email Comproise (BEC) engagements we often have to analyze the provenance o...
2024-9-24 17:47:11 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.compass-security.com
aol
yahoo
spf
dkim
dmarc
Three-Headed Potato Dog
Earlier this year, several security researchers published research about using DCOM to coer...
2024-9-17 21:32:16 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.compass-security.com
potato
dcom
machine
clsid
From Classroom into Bug Bounty: Investigating Motivational Factors Among Swiss Students
Bug bounty programs have evolved into a critical element of modern cybersecurity, allowing...
2024-9-6 14:2:10 | 阅读: 17 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.compass-security.com
rewards
hunters
attract
A Patchdiffing Journey – TP-Link Omada
IntroductionLast year we participated in the Pwn2Own 2023 Toronto competition and succe...
2024-8-20 15:2:10 | 阅读: 12 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.compass-security.com
dhcp6c
v61
dhcp6
payload
dhcpv6
SAML Raider Release 2.0.0
SAML Raider [0] is a Burp Suite [1] extension and the tool of choice for many pentesters fo...
2024-7-2 15:1:58 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.compass-security.com
gradle
github
burp
montoya
raider
Introducing Conkeyscan – Confluence Keyword Scanner
TL;DR Release of Conkeyscan – A Confluence Keyword/Secret Scanner, which is tailored towar...
2024-6-18 15:2:4 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.compass-security.com
conkeyscan
atlassian
cql
696
username
Blockchain / Smart Contract Bugs
IntroductionA blockchain is a distributed append-only database (aka ledger) that remove...
2024-6-4 15:1:21 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.compass-security.com
blockchain
reentrancy
attacker
How to become a Hacker
IntroductionLast year, I attended a job fair organized by the Association of Comput...
2024-5-21 15:2:1 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.compass-security.com
network
security
degree
solving
Bug Bounty: Insights from Our First-hand Experience
error code: 1016...
2024-5-7 15:2:0 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.compass-security.com
1016
New Burp Extension: JWT-scanner
Authentication and authorization are critical components of any application. Various standa...
2024-4-23 15:2:1 | 阅读: 18 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.compass-security.com
jwts
security
burp
jwk
Behind The Scenes Of Ransomware Attacks
This is hopefully the most useless blog post you will read this year as this post will...
2024-4-9 15:1:54 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.compass-security.com
ransomware
negotiation
encryption
security
lockbit3
Pwn2Own Toronto 2023: Part 5 – The Exploit
If you have not read the previous blog posts I recommend you to have a look at part 1, wher...
2024-3-29 16:1:55 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.compass-security.com
payload
lex
pwn2own
invoked
impl
Pwn2Own Toronto 2023: Part 4 – Memory Corruption Analysis
Welcome to the 4th part of this blog post series. If you have not read the previous blog p...
2024-3-28 16:2:6 | 阅读: 17 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.compass-security.com
lex
ivar2
undefined4
libjansson
synocam
Pwn2Own Toronto 2023: Part 3 – Exploration
If you have not read the previous blog posts I recommend you to have a look at part 1, wher...
2024-3-27 16:1:57 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.compass-security.com
syno
security
webd
maintenance
Pwn2Own Toronto 2023: Part 2 – Exploring the Attack Surface
Welcome back to the next part of our blog series. If you haven’t checked out the earlier po...
2024-3-26 16:1:57 | 阅读: 20 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.compass-security.com
upnp
webdav
injection
synology
Pwn2Own Toronto 2023: Part 1 – How it all started
Around a year ago a few of my colleagues and I were sitting in Benoit Forgette and Dami...
2024-3-25 16:1:58 | 阅读: 17 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.compass-security.com
nand
ubi
ubi0
14965870
partitions
Manipulating LLMs – How to confuse ChatGPT
What are LLMsLLMs (Large Language Models) are language models with a large number of...
2024-3-12 16:2:1 | 阅读: 16 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.compass-security.com
llm
llms
injection
attacker
xn
Previous
-48
-47
-46
-45
-44
-43
-42
-41
Next