Aggregator
最终议程 | EISS-2024企业信息安全峰会之深圳站(09.20/周五)
EISS企业安全峰会始办于2016年,在上海、北京、深圳等地已成功举办20届。EISS由安世加主办,并得到众多行业协会、机构以及媒体等共同参与支持,已成为国内具备广泛影响力的行业安全盛会。大会以“直面信息安全挑战,创造最佳实践”为主题,聚焦企业信息安全技术与实践等热点话题,致力于推进企业信息安全体系建设,加强企业信息安全管理,助推企业信息安全生态圈的健康发展。EISS-2024企业信息安全峰会之深圳站将于2024年09月20日举行,本次是EISS系列峰会第21届,届时约有300+来自全国各地的企业CS0、安全专家出席,共同探讨企业信息安全现状与未来。
Ex-Engineer Charged in Missouri for Failed $750,000 Bitcoin Extortion Attempt
小米中秋活动开始啦,礼盒兑换&漏洞翻倍在等你,冲鸭~
小米中秋活动开始啦,礼盒兑换&漏洞翻倍在等你,冲鸭~
CVE-2017-2374 | Apple GarageBand up to 10.1.5 Projects memory corruption (HT207518 / ID 370309)
SessionExec: Execute commands in other Sessions
SessionExec SessionExec allows you to execute specified commands in other Sessions on Windows Systems, either targeting a specific session ID or All sessions, with the option to suppress command output. The tool is inspired...
The post SessionExec: Execute commands in other Sessions appeared first on Penetration Testing Tools.
HackBrowserData: Decrypt passwords/cookies/history/bookmarks from the browser
HackBrowserData HackBrowserData is a command-line tool for decrypting and exporting browser data (passwords, history, cookies, bookmarks, credit cards, download history, localStorage and extensions) from the browser. It supports the most popular browsers on the market...
The post HackBrowserData: Decrypt passwords/cookies/history/bookmarks from the browser appeared first on Penetration Testing Tools.
2024-08-28 CORONA MIRAI Botnet Spreads via Zero-Day (CVE-2024-7029) - command injection vulnerability found in the brightness function of AVTECH closed-circuit television (CCTV) Samples
Arkime: open source, large scale, full packet capturing, indexing, and database system
Arkime Arkime is an open-source, large-scale, full packet capturing, indexing, and a database system. Arkime augments your current security infrastructure to store and index network traffic in standard PCAP format, providing fast, indexed access....
The post Arkime: open source, large scale, full packet capturing, indexing, and database system appeared first on Penetration Testing Tools.