Aggregator
特朗普推翻拜登人工智能行政命令;警惕!勒索软件团伙滥用微软Teams发起攻击 | 牛览
特朗普推翻拜登人工智能行政命令;警惕!勒索软件团伙滥用微软Teams发起攻击 | 牛览
《Agentic AI安全技术应用报告(2025版)》调研启动
《Agentic AI安全技术应用报告(2025版)》调研启动
eHIDS: Linux Host-based Intrusion Detection System based on eBPF
eHIDS A Linux Host-based Intrusion Detection System based on eBPF. Implementations & Functionalities: TCP network data capture UDP network data capture DNS information capture in uprobe mode Process data capture Uprobe way to achieve...
The post eHIDS: Linux Host-based Intrusion Detection System based on eBPF appeared first on Penetration Testing Tools.
Pentest Mapper: Burp Suite Extension for Application Penetration Testing
Pentest Mapper Pentest Mapper is a Burp Suite extension that integrates the Burp Suite request logging with a custom application testing checklist. The extension provides a straightforward flow for application penetration testing. The extension...
The post Pentest Mapper: Burp Suite Extension for Application Penetration Testing appeared first on Penetration Testing Tools.
Explaining What a Cache Stampede Is and How to Prevent It Using Redis
How persistent is an APT? Battling Three Threat Actors in a Single Environment
SANS Threat Analysis Rundown with Katie Nickels | November 2024
nysm: A stealth post-exploitation container
nysm: A stealth post-exploitation container With the rise in popularity of offensive tools based on eBPF, going from credential stealers to rootkits hiding their own PID, a question came to our mind: Would it...
The post nysm: A stealth post-exploitation container appeared first on Penetration Testing Tools.