Aggregator
福建省唯一入围企业!国投智能入选“2024年中国网络安全前二十家企业”名单
Scrollable Cards in iOS 18 - #30DaysOfSwift
JVN: Trend Micro Deep Discovery Inspector (DDI) における複数のSQLインジェクションの脆弱性
CVE-2016-1078 | Adobe Acrobat Reader up to 11.0.15/15.006 memory corruption (APSB16-14 / Nessus ID 91096)
CVE-2000-1190 | Jon Atkins imwheel .imwheelrc symlink (XFDB-4941)
微软运用欺骗性策略大规模打击网络钓鱼活动
FreeBuf | 字节大模型被实习生投毒;新的macOS漏洞可绕过安全控制
NIS2: Implementing Regulation della Commissione
Bear C2 Exposed: Russian APT’s Advanced Encryption Tactics
BEAR-C2 Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of encryption methods, including AES, XOR, DES, TLS, RC4, RSA and...
The post Bear C2 Exposed: Russian APT’s Advanced Encryption Tactics appeared first on Penetration Testing Tools.
conjur: secures secrets used by privileged users and machine identities
Conjur Conjur provides secrets management and machine identity for modern infrastructure: Machine Authorization Markup Language (“MAML”), a role-based access policy language to define system components & their roles, privileges, and metadata A REST web...
The post conjur: secures secrets used by privileged users and machine identities appeared first on Penetration Testing Tools.
Cross-Platform Design Wrapped Part 3: UI Polish and Interaction Design
Rubeus: C# toolset for raw Kerberos interaction and abuses
Rubeus Rubeus is a C# toolset for raw Kerberos interaction and abuses. It is heavily adapted from Benjamin Delpy’s Kekeo project (CC BY-NC-SA 4.0 license) and Vincent LE TOUX‘s MakeMeEnterpriseAdmin project (GPL v3.0 license). Full credit goes to Benjamin and Vincent for...
The post Rubeus: C# toolset for raw Kerberos interaction and abuses appeared first on Penetration Testing Tools.