Aggregator
某友NCCloud黑名单绕过分析
【论文速读】| AutoSafeCoder:通过静态分析和模糊测试保障LLM代码生成安全的多智能体框架
What Are Normal Users Supposed to Do with IDS Alerts from Network Gear?
GitLab 曝出严重漏洞,可能导致任意 CI/CD 管道执行
BAADTokenBroker: Bypassing Entra ID Conditional Access
BAADTokenBroker BAADTokenBroker is a post-exploitation tool designed to leverage device-stored keys (Device key, Transport key etc..) to authenticate to Microsoft Entra ID. Use Import BAADTokenBroker in your target machine. PS C:\ > import-module .\BAADTokenBroker.ps1...
The post BAADTokenBroker: Bypassing Entra ID Conditional Access appeared first on Penetration Testing Tools.
lsassy: Extract credentials from lsass remotely
lsassy Python library to remotely extract credentials. This library uses impacket projects to remotely read necessary bytes in lsass dump and pypykatz to extract credentials. Different lsass dumping methods are implemented in lsassy, and some option are provided to...
The post lsassy: Extract credentials from lsass remotely appeared first on Penetration Testing Tools.
GitLab fixed a critical flaw that could allow arbitrary CI/CD pipeline execution
BLAKE3: The BLAKE3 cryptographic hash function
BLAKE3 BLAKE3 is a cryptographic hash function that is: Much faster than MD5, SHA-1, SHA-2, SHA-3, and BLAKE2. Secure, unlike MD5 and SHA-1. And secure against length extension, unlike SHA-2. Highly parallelizable across any number of...
The post BLAKE3: The BLAKE3 cryptographic hash function appeared first on Penetration Testing Tools.