unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Leveraging AI in Reverse Engineering: Techniques, Challenges, and Future Trends
Reverse engineering is the process of deconstructing a product or system to understand its...
2024-12-10 12:59:51 | 阅读: 0 |
收藏
|
Pentestmag - pentestmag.com
reverse
hardware
software
enhance
identify
Design Your Penetration Testing Setup
IntroductionAs we navigate through the complexities of modern cybersecurity penetration te...
2024-12-10 12:59:4 | 阅读: 0 |
收藏
|
Pentestmag - pentestmag.com
ethical
crucial
Meet Hugo Le Belzic: Pro Behind Pixel Trickery Outsmarting AI in Image Classification Models
Recently, I was exploring GitHub for AI-related repositories and came across a fascinating profil...
2024-9-6 19:19:43 | 阅读: 4 |
收藏
|
Pentestmag - pentestmag.com
impressive
hugo
belzic
security
jakub
Enhancing Malware Detection with AI-Assisted Reverse Engineering
AbstractThe cybersecurity industry faces a critical challenge due to the rapid evolution of malwar...
2024-9-1 18:53:25 | 阅读: 0 |
收藏
|
Pentestmag - pentestmag.com
reverse
trees
forest
assisted
machine
Beginner’s Guide to Cybersecurity
Cybersecurity refers to the practice of protecting systems, networks, and programs from digital att...
2024-7-24 15:45:27 | 阅读: 2 |
收藏
|
Pentestmag - pentestmag.com
security
threats
software
network
A New Frontier in Cybersecurity: Drone Pentesting
In the ever-evolving landscape of cybersecurity, a novel approach has emerged that combines cutti...
2024-7-18 18:52:24 | 阅读: 1 |
收藏
|
Pentestmag - pentestmag.com
drone
security
printers
unsecured
Secret Scanner for Jira and Confluence: CVE-2023–22515 Defense in Depth
HomeCoursesMagazinesSubscriptionShopBlogContact UsAbout Us Products ▼Online Cour...
2023-11-7 21:56:43 | 阅读: 20 |
收藏
|
Pentestmag - pentestmag.com
security
shop
magazines
n0s1
magazine
Cloud Security
Nowadays, with the evolution of technology, many companies are starting their journey as a cloud...
2023-10-24 21:18:31 | 阅读: 9 |
收藏
|
Pentestmag - pentestmag.com
cloud
remote
facebook
nowadays
The Essential Guide to Radio Frequency Penetration Testing
Introduction Radio Frequency (RF) penetration testing, popularly referred to as RF pentesting, st...
2023-10-12 22:18:21 | 阅读: 10 |
收藏
|
Pentestmag - pentestmag.com
exponential
popularly
stands
referred
"In our modern world, countless applications rely on radio frequency elements" - an Interview with Larbi Ouiyzme
About the Author: Larbi OUIYZME Cybersecurity Consultant and Licensed Ham Radio Operator since 19...
2023-10-12 21:6:8 | 阅读: 9 |
收藏
|
Pentestmag - pentestmag.com
deeply
antennas
attackers
spoofing
The Surge of Double Extortion Ransomware Attacks
The Surge of Double Extortion Ransomware Attacks Ransomware attacks have become an increasingly s...
2023-10-10 22:22:54 | 阅读: 8 |
收藏
|
Pentestmag - pentestmag.com
extortion
ransomware
threaten
facebook
surge
Setting Up a Radio Frequency Penetration Testing Lab: A Comprehensive Guide
Introduction The advent of wireless technologies, from mobile phones to Wi-Fi, satellite communic...
2023-9-30 02:24:21 | 阅读: 16 |
收藏
|
Pentestmag - pentestmag.com
satellite
replaying
intriguing
threats
disruption
JOIN THE FIRST EVER LIVE WEBINAR BY PENTEST MAGAZINE - SEPTEMBER 30TH
We're extremely happy to invite you to the first ever webinar by PenTest Mag! Hosted by Timothy H...
2023-9-29 18:29:6 | 阅读: 7 |
收藏
|
Pentestmag - pentestmag.com
aerospace
satellite
webinar
angelina
CYBER THREAT INTELLIGENCE: A LIGHT THAT SHINES IN THE DIGITAL UNDERWORLD
INTRODUCTION In today's technology-driven world, cybersecurity has emerged as a key priority. How...
2023-9-29 02:35:16 | 阅读: 10 |
收藏
|
Pentestmag - pentestmag.com
mariana
gouveia
sufficient
cti
facebook
API Penetration Testing: Tools, Techniques and Security Practices
Overview As we live in a digital era with rapid development of Application Programming Interfaces...
2023-9-28 20:26:17 | 阅读: 4 |
收藏
|
Pentestmag - pentestmag.com
development
seamless
era
Honeypot Technology: Comparisons, Types and Importance for Cyber Security
Honeypot technology holds significant importance in today's technology-driven world, serving as a c...
2023-9-28 19:43:31 | 阅读: 6 |
收藏
|
Pentestmag - pentestmag.com
honeypot
proving
serving
monitoring
Efficient Reconnaissance with BBRF: Organizing Enumeration
Whether during a pentest or bug hunting activity, the first step is the reconnaissance phase, and s...
2023-9-27 20:51:10 | 阅读: 6 |
收藏
|
Pentestmag - pentestmag.com
subdomain
enhance
streamline
facebook
emerges
WiFi Deauthers vs Signal Jammers
2023-8-4 13:46:17 | 阅读: 0 |
收藏
|
Pentestmag - pentestmag.com
jammers
spectrum
jamming
jammer
injects
The Good, Bad, and Ugly of HTTP/2
AuthorsPranali Phadtare, Soummya Kulkarni, Shruthi Shunmugom MAbout UsIBM PTC is a profici...
2023-7-3 15:57:13 | 阅读: 0 |
收藏
|
Pentestmag - pentestmag.com
security
refinements
shunmugom
network
ChatGPT for Pentesters
AuthorsChaitanya S Rao, Arpitha SAbout UsIBM PTC is a proficient internal Security Test Te...
2023-4-5 14:53:9 | 阅读: 0 |
收藏
|
Pentestmag - pentestmag.com
security
chatgpt
openai
arpitha
Previous
-37
-36
-35
-34
-33
-32
-31
-30
Next