unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
How to Detect Persistence Mechanisms with Elastic SIEM: SOC Analyst Hands-On Lab | Hunt Forward Lab…
Hunt Forward Lab #005 — Threat Hunting for Registry Run Keys, Scheduled Tasks & Startup Folders | MI...
2026-5-13 08:21:39 | 阅读: 2 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
hunt
rlike
windows
sigma
attacker
CVE-2026-44843: One Chat Message Steals Your Credentials. Then It Gets Worse!
How We Turned LangChain’s Tracer Into an Unauthenticated Remote Credential Exfiltration GadgetBy Dew...
2026-5-13 08:21:2 | 阅读: 1 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
langchain
attacker
langsmith
hubrunnable
payload
Exploiting Insecure Output Handling in LLMs via Indirect Prompt Injection (XSS)
2026-5-13 08:20:48 | 阅读: 1 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
injection
llm
rapidly
chatbot
Phishing-as-a-Service (PhaaS): Inside a Telegram Phishing Bot
How It Works, What It Steals & How to Stay SafePress enter or click to view image in full sizeSummar...
2026-5-13 08:19:44 | 阅读: 1 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
victim
attacker
phishing
instantly
bots
APT41 Targeting Pharmaceutical Sector: Log4Shell to Domain Compromise
Threat Intelligence Report | Operation DragonRxPress enter or click to view image in full sizeClassi...
2026-5-13 08:18:56 | 阅读: 1 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
apt41
dragonrx
2026
cti
tlp
Lab Write-up: Linux CLI — Identifying Incorrect File Extensions
Course: Security Blue Team — BTJAObjective: Use Linux command-line tools to identify, investigate, a...
2026-5-12 06:30:18 | 阅读: 14 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
doggo
bankdetails
identify
AI Models & Data | TryHackMe Write-up
Non-members are welcome to access the full story herePress enter or click to view image in full size...
2026-5-12 06:30:13 | 阅读: 18 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
security
pii
neededtask
reliance
Bad USB: The Invisible Hardware Threat
Press enter or click to view image in full sizeImagine plugging a simple USB drive into your compute...
2026-5-12 06:29:37 | 阅读: 14 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
payload
hardware
arduino
revenant
cloudflared
Microsoft Edge Password Exposure: How a Memory Dump Reveals Your Credentials
By: Kavin Jindal (@Klevr)Press enter or click to view image in full sizeA recent disclosure by a Nor...
2026-5-12 06:29:27 | 阅读: 18 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
memory
microsoft
passwords
security
python
Your Wallet Is the Inbox: How Web3 Phishing Attacks Are Targeting Users On-Chain
From fake NFT airdrops to malicious wallet approvals — how attackers exploit users directly on-chain...
2026-5-12 06:29:18 | 阅读: 16 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
phishing
web3
malicious
attackers
wallets
Attack Playbook — Operation DragonRx
A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and...
2026-5-12 06:28:10 | 阅读: 13 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
weekly
encounters
reportlab
Information disclosure on debug page APPRENTICE | Lab -02
portswigger LabInformation Disclosure is a security vulnerability where a system or application unin...
2026-5-12 06:26:43 | 阅读: 13 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
sizefinally
burp
security
php
developers
Information disclosure in error messages | Lab -01
portswigger LabInformation Disclosure is a security vulnerability where a system or application unin...
2026-5-12 06:26:39 | 阅读: 13 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
portswigger
reveals
security
planning
You Don’t Need a 0-Day for RCE: A Real-World Kill Chain
Press enter or click to view image in full sizeIntroductionThere is a pervasive myth in cybersecurit...
2026-5-10 19:51:30 | 阅读: 14 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
censys
certguard
naked
403
remote
You Don’t Need a 0-Day for RCE: A Real-World Kill Chain
Press enter or click to view image in full sizeIntroductionThere is a pervasive myth in cybersecurit...
2026-5-10 19:51:30 | 阅读: 20 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
certguard
censys
naked
403
remote
Passkeys Aren’t Nearly as Effective as We Thought
I thought I discovered a genuinely novel research technique and even submitted a CFP I’ll have to re...
2026-5-10 19:51:16 | 阅读: 11 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
passkey
phishing
phishu
aitm
picker
Solving “Copy Fail” CVE-2026–31431 Q/A Lab
This writeup covers my solution for the Linux Kernel algif_aead Cross-Mapping In-Place AEAD (“Copy F...
2026-5-10 19:50:45 | 阅读: 16 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
aead
algif
recvmsg
sgl
alg
They Charged $10/Month for a $5 Server, a Free Script, and Three Years of Lies. Here’s the Proof.
Press enter or click to view image in full sizeThis is not a review. This is a documented technical...
2026-5-10 19:49:55 | 阅读: 13 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
coderlegion
database
peter
qa
observable
Reading Responses: Status Codes, Headers, and Body Forensics
A 403 and a 404 look similar. They mean completely different things.Press enter or click to view ima...
2026-5-4 13:6:12 | 阅读: 22 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
403
injection
timing
download
ttfb
Breakdown of CVE-2026–31431 (Copy Fail) an Overl00k3d Linux Kernel Vulnerability Enables Privilege…
Press enter or click to view image in full sizeis a newly discovered Linux kernel flaw (April 2026)...
2026-5-4 13:5:50 | 阅读: 30 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
memory
alg
attacker
splice
aead
Previous
-40
-39
-38
-37
-36
-35
-34
-33
Next