Aggregator
在电影《流浪地球2》中,重启全球互联网的情节让观众印象深刻,影片中重启根服务器象征着全球DNS
从漏洞扫描到利用,告别手工复现!Goby插件市场等你来大展拳脚!
11 months 3 weeks ago
Goby社区第 26 篇插件分享文章全文共:3091 字 预计阅读时间:8 分钟 01 前言在实战过程中
Buzzing on Christmas Eve: Trigona Ransomware in 3 Hours
11 months 3 weeks ago
Key Takeaways In late December 2022, we observed threat actors exploiting a publicly exposed Remote Desktop Protocol (RDP) host, leading to data exfiltration and the deployment of Trigona ransomware. On … Read More
editor
从零开始自定义安卓系统(4) product配置详解
11 months 3 weeks ago
从零开始自定义安卓系统(4) product配置详解 前言 在学习修改一样东西时, 最好的方法之一就是搞懂他到底可以干什么. 而不是跟一个教程学一个选
Exploring Google Bard's Data Visualization Feature (Code Interpreter)
11 months 3 weeks ago
Last November Google had an interesting update to Google Bard. This updated included the ability to solve math equations and draw charts based on data.
What does this mean and why is it interesting?
It means that Google Bard has access to a computer and can run more complex programs, including Python code that plots graphs!
Let’s explore this with a simple example.
Drawing Charts with Google Bard The following prompt will create a chart:
从零开始自定义安卓系统(3) 配置开发环境与新建product
11 months 4 weeks ago
从零开始自定义安卓系统(3) 配置开发环境与新建product aidegen aidegen是一个自动生成项目配置文件的工具 在运行完lunch后 会自动配置这
基于全景数据流转论金融行业供应链安全方法论
11 months 4 weeks ago
引言在金融行业的数字化演进中,供应链安全已迅速从一个支持功能转变为核心战略要素。
Jenkins文件读取漏洞拾遗(CVE-2024-23897)
11 months 4 weeks ago
Jenkins 未授权文件读取漏洞(CVE-2024-23897)今天闹得沸沸扬扬,我也来简单分析一下这个漏洞,并看看这个文件读取如何利用。
首先说的是,由于Jenkins存在版本和插件差异,所以利用时可能也有不一样之处,本文内容不一定适用于所有Jenkins server。我们这里使用Vulhub的环境(2.441)来做分析和演示:https://github.com/vulhub/vul...
phithon
New Ransomware Reporting Requirements Kick in as Victims Increasingly Avoid Paying
11 months 4 weeks ago
A lower percentage of ransomware victims are paying, as new regulations
begin to elicit more and more public disclosure of ransomware incidents.
Bill Siegel
探索aarch64架构上使用ftrace的BPF LSM
11 months 4 weeks ago
笔者在MacBook M2上搭建Linux虚拟机上开发eBPF程序时,遇到一些LSM eBPF类型程序无法运行的问题。 在笔者尝试定位这些差异时,看到这篇文章,可以让大家更直观地了解LSM eBPF在ARM64、AMD64 内核上的差异。
CFC4N
Position paper: Quantum Key Distribution kent beperkingen
11 months 4 weeks ago
Vandaag heeft de Algemene Inlichtingen- en Veiligheidsdienst samen met partnerdiensten uit Frankrijk, Duitsland en Zweden een position paper uitgebracht over Quantum Key Distribution (QKD).
Atlassian Confluence 模板注入漏洞分析(CVE-2023-22527)
11 months 4 weeks ago
Confluence 存在 Velocity 模板注入漏洞,未经身份验证的攻击者可以直接访问`*.vm`文件传入恶意 Ognl 表达式来实现 RCE。
小米入选2023年移动互联网APP产品安全漏洞治理十大优秀案例
11 months 4 weeks ago
“小米智能终端产品安全风险治理”项目被评选为“2023年度移动互联网APP产品安全漏洞治理十大优秀案例”
今晚开赛|最强大脑入局RWCTF,CTFer「贴脸开大」
11 months 4 weeks ago
开赛之夜,希望大家wonder尽兴!
今晚开赛|最强大脑入局RWCTF,CTFer「贴脸开大」
11 months 4 weeks ago
开赛之夜,希望大家wonder尽兴!
平台放假公告|360漏洞云祝大家龙行龘龘,前程朤朤!
11 months 4 weeks ago
请查收2024春节期间平台放假安排
【风险通告】Jenkins CLI 任意文件读取漏洞(CVE-2024-23897)
11 months 4 weeks ago
2024年1月25日,Jenkins 官方披露 CVE-2024-23897 Jenkins CLI 任意文件读取漏洞。
两三年前写的蜜罐开源了
11 months 4 weeks ago
darkless
3 CIS Resources to Help You Drive Your Cloud Cybersecurity
11 months 4 weeks ago
Once you've migrated to the cloud, you need to prioritize your cloud cybersecurity. These three resources from CIS can help.
Introducing the Mutator Kit: Creating Object File Monstrosities with Sleep Mask and LLVM
11 months 4 weeks ago
This is a joint blog written by William Burgess (@joehowwolf) and Henri Nurmi (@HenriNurmi). In our ‘Cobalt Strike and YARA: Can I Have Your Signature?’ blog post, we highlighted that the sleep mask is a common target for in-memory YARA signatures. In that post we recommended using the evasive sleep mask option to scramble the [...]
The post Introducing the Mutator Kit: Creating Object File Monstrosities with Sleep Mask and LLVM appeared first on Cobalt Strike.
William Burgess