Aggregator
Phone hack/ screen mirror
从零开始复现CVE-2023-20073
What's torch onion url and how to get onion links
疑似伊朗MuddyWater组织利用新型安卓间谍软件展开攻击——每周威胁情报动态第232期(07.18-07.24)
.NET 内网攻防实战电子报刊
疑似伊朗MuddyWater组织利用新型安卓间谍软件展开攻击——每周威胁情报动态第232期(07.18-07.24)
Sharp4WebCmd 再进化:无需依赖 cmd.exe 从命令到上传,一步到位
Web 内存远程加载 .NET 文件 ,通过 Sharp4ExecMemory 绕过终端安全防护
Sharp4WebCmd 再进化:无需依赖 cmd.exe 从命令到上传,一步到位
.NET 内网攻防实战电子报刊
Web 内存远程加载 .NET 文件 ,通过 Sharp4ExecMemory 绕过终端安全防护
JVN: TP-Link製VIGI NVR1104H-4PおよびVIGI NVR2016H-16MPにおけるOSコマンドインジェクションの脆弱性
npm Supply Chain Attack Exposes Devs to “Scavenger” Malware Via Phished Accounts
A major incident has rocked the npm ecosystem: the widely-used package eslint-config-prettier suddenly received an update devoid of any corresponding changes on GitHub. Developers quickly grew suspicious—and with good reason. The package’s maintainer later...
The post npm Supply Chain Attack Exposes Devs to “Scavenger” Malware Via Phished Accounts appeared first on Penetration Testing Tools.
派早报:英国认定 Apple 和 Google 具有战略市场定位等
#StopRansomware: CISA & FBI Warn of Interlock Ransomware Surging, Hits US Healthcare Giants
A surge of cyberattacks has been recorded across the United States, attributed to the Interlock group, which employs a double extortion strategy targeting companies and critical infrastructure entities. This warning was jointly issued by...
The post #StopRansomware: CISA & FBI Warn of Interlock Ransomware Surging, Hits US Healthcare Giants appeared first on Penetration Testing Tools.
传 GPT-5 将在 8 月初发布;马斯克转发懂车帝辅助驾驶测试;腾讯股价创四年来新高 | 极客早知道
传 GPT-5 将在 8 月初发布;马斯克转发懂车帝辅助驾驶测试;腾讯股价创四年来新高 | 极客早知道
Google’s AI Now Calls Businesses for You: A New Era of Search Automation or Digital Noise?
Google has officially unveiled a new experimental feature within its search engine, enabling users to delegate the task of calling local businesses to artificial intelligence and receive relevant information without any direct involvement. Instead...
The post Google’s AI Now Calls Businesses for You: A New Era of Search Automation or Digital Noise? appeared first on Penetration Testing Tools.
Lumma Stealer Resurfaces After Takedown: New Stealth Tactics Target Users Via Fake Cracks, CAPTCHAs & GitHub
Following a sweeping law enforcement operation in May—which dismantled over 2,300 domains and disrupted portions of its infrastructure—the malicious Lumma platform is once again exhibiting a resurgence in activity. Despite the significant blow, the...
The post Lumma Stealer Resurfaces After Takedown: New Stealth Tactics Target Users Via Fake Cracks, CAPTCHAs & GitHub appeared first on Penetration Testing Tools.