Aggregator
.NET 第52期 13个红队武器库和资源汇总
.NET 安全攻防知识交流社区
.NET内网实战:调用CMSTP实现UAC绕过
KrbRelayEx: Kerberos Relay and Forwarder for (Fake) SMB MiTM Server
KrbRelayEx KrbRelayEx is a tool designed for performing Man-in-the-Middle (MitM) attacks by relaying Kerberos AP-REQ tickets. It listens for incoming SMB connections and forwards the AP-REQ to the target host, enabling access to SMB...
The post KrbRelayEx: Kerberos Relay and Forwarder for (Fake) SMB MiTM Server appeared first on Penetration Testing Tools.
subparse: Modular malware analysis artifact collection and correlation framework
subparse Subparse is a modular framework developed by Josh Strochein, Aaron Baker, and Odin Bernstein. The framework is designed to parse and index malware files and present the information found during the parsing in...
The post subparse: Modular malware analysis artifact collection and correlation framework appeared first on Penetration Testing Tools.
spyre: simple YARA-based IOC scanner
Spyre Spyre is a simple host-based IOC scanner built around the YARA pattern matching engine and other scan modules. The main goal of this project is the easy operationalization of YARA rules and other indicators of...
The post spyre: simple YARA-based IOC scanner appeared first on Penetration Testing Tools.
Десять открытий года расширили границы человеческих возможностей
小米汽车交付超 13 万,雷军:创造奇迹;华为问界 M8 实车曝光;传 iPhone17 标准版终于支持高刷|极客早知道
小米汽车交付超 13 万,雷军:创造奇迹;华为问界 M8 实车曝光;传 iPhone17 标准版终于支持高刷|极客早知道
Intel's $475 million error: the silicon behind the Pentium division bug
Can i hack myself?
2024年终总结
CVE-2009-2535 | Mozilla Thunderbird up to 1.4 numeric error (Bug 460713 / EDB-9160)
Rainbow Table Attacks: How They Work and How to Defend Against Them
Many common password attack methods are quite straightforward — much like trying various physical keys to open the lock on a door. For example, in brute force attacks, adversaries systematically guess passwords until they find the correct one. Or instead of simply guessing, they can use a list of username/password combinations leaked from other breaches … Continued