Aggregator
SunshineCTF 2025 Web 题解
Three Factors Determine Whether a Ransomware Group is Successful
ReliaQuest’s Threat Spotlight: How Automation, Customization, and Tooling Signal Next Ransomware exposes how elite Ransomware-as-a-Service (RaaS) groups thrive. Automation, advanced tools, and attack customization attract top affiliates and drive faster, more effective ransomware operations.
The post Three Factors Determine Whether a Ransomware Group is Successful appeared first on Security Boulevard.
深入分析调试CVE-2024-30090-ks.sys内核流服务权限提升漏洞
AdaptixC2通信机制与流量解密分析(listener_gophertcp)
基于阿里AI安全全球挑战赛靶场的AI智能体安全攻防研究
记一次windows对抗的病毒分析
Spring Cloud GateWay CVE-2025-41243 分析
Go语言模糊测试实战:从go-fuzz到官方工具链的漏洞挖掘之路
GhostBeacon: The Tool That Detects Rogue and Hidden Wi-Fi with 99% Accuracy
GhostBeacon mainly consists of two primary modules: the Rogue (Fake) Access Point Spotter, which analyses Beacon Frames using
The post GhostBeacon: The Tool That Detects Rogue and Hidden Wi-Fi with 99% Accuracy appeared first on Penetration Testing Tools.
Windows隐蔽执行技巧之ADS
U8cloud 所有版本 NCCloudGatewayServlet 远程命令执行和任意文件上传(基于该漏洞的变种)
标准验证码渗透测试指南
Bionic Hackbots Rise, Powerful Partners to Humans
The rapid rise of AI and automation has helped create a new breed of researcher — the bionic hacker. Think of a Steve Austen-type researcher, only instead of body parts replaced by machines, human creativity is being augmented by automation. These bionic hackers use “AI as a catalyst, accelerating recon, triage, scaling pattern recognition, and..
The post Bionic Hackbots Rise, Powerful Partners to Humans appeared first on Security Boulevard.
记一次HVV实战中对EL表达式的极限绕过
Импортозамещённый Linux не спас. Новый Go-троян бьет по госструктурам
记一次对某oa的代码审计
Михаил Кадер: «Zero Trust – не панацея»
如何巧用系统合法功能实现RCE
LockBit Rises: New Cross-Platform 5.0 Ransomware Eclipses Former Self
After a brief period of dormancy, the operator of the LockBit ransomware has returned to full-scale activity, unveiling
The post LockBit Rises: New Cross-Platform 5.0 Ransomware Eclipses Former Self appeared first on Penetration Testing Tools.