Aggregator
DeepSeek本地化部署有风险!快来看看你中招了吗?
DeepSeek本地化部署有风险!快来看看你中招了吗?
DeepSeek本地化部署有风险!快来看看你中招了吗?
微软宣布将移除 Windows 中的位置历史功能
AtlasReaper: reconnaissance of Confluence and Jira
AtlasReaper AtlasReaper is a command-line tool developed for offensive security purposes, primarily focused on a reconnaissance of Confluence and Jira. It also provides various features that can be helpful for tasks such as credential...
The post AtlasReaper: reconnaissance of Confluence and Jira appeared first on Penetration Testing Tools.
DynastyPersist: A Linux persistence tool
DynastyPersist A CTF Tool for Linux persistence (KOTH, Battlegrounds) A powerful and versatile Linux persistence script designed for various security assessment and testing scenarios. This script provides a collection of features that demonstrate different...
The post DynastyPersist: A Linux persistence tool appeared first on Penetration Testing Tools.
GTFONow: Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries
GTFONow Automatic privilege escalation on Unix systems by exploiting misconfigured setuid/setgid binaries, capabilities, and sudo permissions. Designed for CTFs but also applicable in real-world pentests. Features Automatically exploit misconfigured sudo permissions. Automatically exploit misconfigured...
The post GTFONow: Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries appeared first on Penetration Testing Tools.
新型 XCSSET macOS 恶意软件变体采用高级混淆技术
雨水 | 春雨滋养万物昌
Src第六期:稳住!别浪~
雨水 | 春雨滋养万物昌
Is Russia Reining In Ransomware-Wielding Criminals?
Even before Donald Trump took office on Jan. 20, there were signs that Russian President Vladimir Putin ordered cybercriminals operating inside his country's borders to be reined in, potentially as a bargaining chip in negotiations over Russia's stalemated war of conquest against Ukraine.
Why Some States Are Beefing Up Their Health Cyber Regs
Attackers Exploit Palo Alto Zero-Day Authentication Bypass
Attackers have stepped up efforts to exploit a vulnerability in the software that runs Palo Alto Networks firewall appliances that could give them direct access to the underlying software. Unauthenticated hackers could use PHP scripts to bypass the PAN-OS management web interface.
Researchers Caution AI Benchmark Score Reliability
Artificial intelligence model makers routinely publish benchmark scores of their performance, but the leaderboard race may be more an exercise in marketing than an accurate reflection of the models' abilities. Understanding model failures can be more valuable than celebrating high scores.
Italian Privacy Agency Warns Against Unlawful Spyware Use
The Italian privacy regulator warned against unlawful uses of Graphite spyware following reports of mass hacking campaigns using the tool. The Italian Data Protection Authority published a warning targeting commercial spyware developed by Israeli firm Paragon Solutions.