unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Meet Hugo Le Belzic: Pro Behind Pixel Trickery Outsmarting AI in Image Classification Models
Recently, I was exploring GitHub for AI-related repositories and came across a fascinating profil...
2024-9-6 19:19:43 | 阅读: 4 |
收藏
|
Pentestmag - pentestmag.com
impressive
hugo
belzic
security
jakub
Enhancing Malware Detection with AI-Assisted Reverse Engineering
AbstractThe cybersecurity industry faces a critical challenge due to the rapid evolution of malwar...
2024-9-1 18:53:25 | 阅读: 0 |
收藏
|
Pentestmag - pentestmag.com
reverse
trees
forest
assisted
machine
Beginner’s Guide to Cybersecurity
Cybersecurity refers to the practice of protecting systems, networks, and programs from digital att...
2024-7-24 15:45:27 | 阅读: 2 |
收藏
|
Pentestmag - pentestmag.com
security
threats
software
network
A New Frontier in Cybersecurity: Drone Pentesting
In the ever-evolving landscape of cybersecurity, a novel approach has emerged that combines cutti...
2024-7-18 18:52:24 | 阅读: 1 |
收藏
|
Pentestmag - pentestmag.com
drone
security
printers
unsecured
Secret Scanner for Jira and Confluence: CVE-2023–22515 Defense in Depth
HomeCoursesMagazinesSubscriptionShopBlogContact UsAbout Us Products ▼Online Cour...
2023-11-7 21:56:43 | 阅读: 20 |
收藏
|
Pentestmag - pentestmag.com
security
shop
magazines
n0s1
magazine
Cloud Security
Nowadays, with the evolution of technology, many companies are starting their journey as a cloud...
2023-10-24 21:18:31 | 阅读: 9 |
收藏
|
Pentestmag - pentestmag.com
cloud
remote
facebook
nowadays
The Essential Guide to Radio Frequency Penetration Testing
Introduction Radio Frequency (RF) penetration testing, popularly referred to as RF pentesting, st...
2023-10-12 22:18:21 | 阅读: 10 |
收藏
|
Pentestmag - pentestmag.com
exponential
popularly
stands
referred
"In our modern world, countless applications rely on radio frequency elements" - an Interview with Larbi Ouiyzme
About the Author: Larbi OUIYZME Cybersecurity Consultant and Licensed Ham Radio Operator since 19...
2023-10-12 21:6:8 | 阅读: 9 |
收藏
|
Pentestmag - pentestmag.com
deeply
antennas
attackers
spoofing
The Surge of Double Extortion Ransomware Attacks
The Surge of Double Extortion Ransomware Attacks Ransomware attacks have become an increasingly s...
2023-10-10 22:22:54 | 阅读: 8 |
收藏
|
Pentestmag - pentestmag.com
extortion
ransomware
threaten
facebook
surge
Setting Up a Radio Frequency Penetration Testing Lab: A Comprehensive Guide
Introduction The advent of wireless technologies, from mobile phones to Wi-Fi, satellite communic...
2023-9-30 02:24:21 | 阅读: 16 |
收藏
|
Pentestmag - pentestmag.com
satellite
replaying
intriguing
threats
disruption
JOIN THE FIRST EVER LIVE WEBINAR BY PENTEST MAGAZINE - SEPTEMBER 30TH
We're extremely happy to invite you to the first ever webinar by PenTest Mag! Hosted by Timothy H...
2023-9-29 18:29:6 | 阅读: 7 |
收藏
|
Pentestmag - pentestmag.com
aerospace
satellite
webinar
angelina
CYBER THREAT INTELLIGENCE: A LIGHT THAT SHINES IN THE DIGITAL UNDERWORLD
INTRODUCTION In today's technology-driven world, cybersecurity has emerged as a key priority. How...
2023-9-29 02:35:16 | 阅读: 10 |
收藏
|
Pentestmag - pentestmag.com
mariana
gouveia
sufficient
cti
facebook
API Penetration Testing: Tools, Techniques and Security Practices
Overview As we live in a digital era with rapid development of Application Programming Interfaces...
2023-9-28 20:26:17 | 阅读: 4 |
收藏
|
Pentestmag - pentestmag.com
development
seamless
era
Honeypot Technology: Comparisons, Types and Importance for Cyber Security
Honeypot technology holds significant importance in today's technology-driven world, serving as a c...
2023-9-28 19:43:31 | 阅读: 6 |
收藏
|
Pentestmag - pentestmag.com
honeypot
proving
serving
monitoring
Efficient Reconnaissance with BBRF: Organizing Enumeration
Whether during a pentest or bug hunting activity, the first step is the reconnaissance phase, and s...
2023-9-27 20:51:10 | 阅读: 6 |
收藏
|
Pentestmag - pentestmag.com
subdomain
enhance
streamline
facebook
emerges
Insecure Deserialization with JSON .NET - Pentestmag
Insecure Deserialization with JSON .NETby Nairuz Abulhul Today, I will go over one of the OWASP’s to...
2021-04-11 11:40:52 | 阅读: 133 |
收藏
|
pentestmag.com
machine
bearer
serialized
security
reverse
Exploiting The Entity: XXE (XML External Entity Injection) - Pentestmag
HistoryIn the recent year, major tech giants, like Google, Facebook, Magento, Shopify, Uber, Twitt...
2020-11-22 21:40:37 | 阅读: 228 |
收藏
|
pentestmag.com
injection
passwd
clearly
subnet
php
Metasploit Cheat Sheet - Pentestmag
by Tim KearyWidely reputed as the most used penetration testing framework, Metasploit helps securi...
2020-02-06 17:28:52 | 阅读: 400 |
收藏
|
pentestmag.com
payload
cheat
security
encoder
download
Knocking the door to Server-side Template Injection. Part 1 - Pentestmag
Knocking the door to Server-side Template Injection. Part 1by Mohamed Habib Jawadi# Hands on guide...
2020-02-02 21:45:51 | 阅读: 366 |
收藏
|
pentestmag.com
templating
ssti
injection
habib
jinja2
How to quickly run a basic security audit against docker & secure the host - Pentestmag
by E...
2019-07-02 13:51:12 | 阅读: 295 |
收藏
|
pentestmag.com
security
bench
auditctl
dockerd
aureport
Previous
-24
-23
-22
-21
-20
-19
-18
-17
Next