unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
New Alpha Release: Tor Browser 14.0a8
Tor Browser 14.0a8 is now available from the Tor Browser download page and also from our distributio...
2024-10-7 08:0:0 | 阅读: 0 |
收藏
|
Tor Project blog - blog.torproject.org
moz
0esr
spoofed
windows
yec
LC 多云资产梳理工具已更新至 v1.1.0 版本
介绍LC(List Cloud)是一个多云攻击面资产梳理的工具,使用 LC 可以让甲方蓝队在管理多云时快速梳理出可能暴露在公网上的资产。LC 项目地址:github.com/wgpsec/lc...
2024-10-7 07:37:26 | 阅读: 18 |
收藏
|
TeamsSix - www.teamssix.com
lc
阿里
wgpsec
腾讯
多云
Enhance your website's security with Cloudflare’s free security.txt generator
2024-10-063 min readA story of security and simplicityMeet Georgia, a diligent website administrator...
2024-10-7 07:0:0 | 阅读: 0 |
收藏
|
The Cloudflare Blog - blog.cloudflare.com
security
birthday
ensuring
georgia
developers
Lego's website was hacked to promote a crypto scam
tag:blogger.com,1999:blog-6921014549873020749Thu, 05 Sep 2024 06:44:33 +0000toolsweb securityconfere...
2024-10-7 05:8:35 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.engadget.com
justify
spacing
webkit
helvetica
2px
China-linked group Salt Typhoon hacked US broadband providers and breached wiretap systems
China-linked group Salt Typhoon hacked US broadband providers and breached wiretap systemsChin...
2024-10-7 05:4:0 | 阅读: 24 |
收藏
|
Security Affairs - securityaffairs.com
typhoon
salt
security
broadband
street
Sales Pitch Shake-Up: Part Two—The Pitch Hack So Obvious, You’ll Kick Yourself
In Part One, I (mercilessly?) disemboweled the 3 sales pitch strategies that tech startups cling to...
2024-10-7 04:35:39 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
pitch
brain
realize
annoying
stick
Sales Pitch Shake-Up: Part One—3 Pitfalls To Pull The Plug On
The first sales pitch.It’s like walking into a lion’s den, except the lions are bored executives, an...
2024-10-7 04:34:4 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
pitch
prospect
prospects
mentally
splinter
Comparative Analysis of TryOnDiffusion with Other State-of-the-Art Methods
Authors:(1) Luyang Zhu, University of Washington and Google Research, and work done while the auth...
2024-10-7 04:4:41 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
fig
garment
qualitative
folds
challenging
The Nuts and Bolts of Parallel-UNet: Implementation Details
Authors:(1) Luyang Zhu, University of Washington and Google Research, and work done while the auth...
2024-10-7 04:4:33 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
diffusion
tpu
trained
washington
zhu
Revolutionizing Virtual Try-On: Key Findings and Future Directions
Authors:(1) Luyang Zhu, University of Washington and Google Research, and work done while the auth...
2024-10-7 04:4:27 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
proceedings
arxiv
cvf
diffusion
preprint
TryOnDiffusion: A Tale of Two UNets: Experiments
Authors:(1) Luyang Zhu, University of Washington and Google Research, and work done while the auth...
2024-10-7 04:4:20 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
poses
garment
6k
viton
fig
How Parallel-UNet Transforms Virtual Try-On with Implicit Warping and Unified Operations
Authors:(1) Luyang Zhu, University of Washington and Google Research, and work done while the auth...
2024-10-7 04:4:12 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
garment
zhu
washington
saharia
chan
Cascaded Diffusion Models for Try-On
Authors:(1) Luyang Zhu, University of Washington and Google Research, and work done while the auth...
2024-10-7 04:4:2 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
diffusion
zhu
washington
consist
cascaded
Behind the Scenes of TryOnDiffusion
Authors:(1) Luyang Zhu, University of Washington and Google Research, and work done while the auth...
2024-10-7 04:3:56 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
washington
zhu
luyang
shlizerman
fitsum
How TryOnDiffusion Innovates on Existing Virtual Try-On Frameworks
Authors:(1) Luyang Zhu, University of Washington and Google Research, and work done while the auth...
2024-10-7 04:3:49 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
garment
warping
diffusion
viton
unet
TryOnDiffusion: A Tale of Two UNets
Authors:(1) Luyang Zhu, University of Washington and Google Research, and work done while the auth...
2024-10-7 04:3:44 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
garment
warping
shape
pose
unet
Quickpost: The Electric Energy Consumption Of LLMs
Quickpost: The Electric Energy Consumption Of LLMs Filed under: Quickpost — Didier Steve...
2024-10-7 03:17:24 | 阅读: 4 |
收藏
|
Didier Stevens - blog.didierstevens.com
wh
electrical
ollama
chatgpt
consumption
天堂之门(WoW64技术)总结及CTF中的分析
一基础知识天堂之门,是建立在WoW64技术上的逆向反调试技术。要去认识它,需要先明白64位系统中32位应用程序的执行过程以及WoW64是什么。1.1 在x64下的进程在x64下的进程,不管是32位或者...
2024-10-7 02:11:0 | 阅读: 2 |
收藏
|
看雪学苑 - mp.weixin.qq.com
0x8b
0x45
wow64
0x85
指令
目录更新!《安卓系统定制实战》
最新版目录:在这个移动互联网时代,安卓系统已经成为了手机操作系统的主流。作为一名开发人员,您是否曾想能定制自己的安卓系统,让它更符合您的需求?或者想深入了解安卓系统的内部机制,提升自己的技术能力?通过...
2024-10-7 02:11:0 | 阅读: 5 |
收藏
|
看雪学苑 - mp.weixin.qq.com
安全
签署
本课
加密
High-Risk Vulnerabilities in Apache HTTP Server’s mod_proxy Encoding Problem Allow Authentication…
2024-10-7 01:12:54 | 阅读: 7 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
Previous
262
263
264
265
266
267
268
269
Next