Aggregator
发布 | 中国信通院发布《边缘计算产业发展研究报告(2024年)》(附下载)
观点 | 防范数字贸易中的全球价值链参与风险
前沿 | 从产业布局看中美AI发展路径差异
前沿 | 国内大型油气田网络信息安全问题及对策研究
关于举办第十八届全国大学生信息安全竞赛暨第二届“长城杯”大赛的通知
IP切片剪辑运营陪跑实操课程
APT73
macOS Adobe 应用程序下载和安装程序:Adobe Downloader
cred1py: A tool used to exploit CRED-1 over a SOCKS5 connection
Overview This is a tool used to exploit CRED-1 over a SOCKS5 connection (with UDP support). How CRED-1 Attack Works CRED-1 can be broken down into the following steps: Send a DHCP Request for...
The post cred1py: A tool used to exploit CRED-1 over a SOCKS5 connection appeared first on Penetration Testing Tools.
拿不下总统之位,那就用热加载拿下验证码识别与爆破好了!
velociraptor: Endpoint visibility and collection tool
Velociraptor – Endpoint visibility and collection tool. Velociraptor is a unique, advanced open-source endpoint monitoring, digital forensic, and cyber response platform. It was originally developed by DFIR professionals who needed a powerful and efficient...
The post velociraptor: Endpoint visibility and collection tool appeared first on Penetration Testing Tools.
ivre: open source network recon framework
IVRE IVRE is an open-source framework for network recon. It relies on open-source well-known tools (Nmap, Zmap, Masscan, Bro, and p0f) to gather data (network intelligence), stores it in a database (MongoDB), and provides tools to analyze it....
The post ivre: open source network recon framework appeared first on Penetration Testing Tools.