unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Open Redirect Simple Bug, Powerful Chains: Phishing Se OAuth Bypass Tak! (Hinglish Mein)
2026-4-30 05:13:28 | 阅读: 24 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
hai
bypass
karta
mein
karo
Building an Android App Analysis Lab on Ubuntu: A Practical Setup Guide
A practical step-by-step guide to building an Android malware analysis and security testing lab on U...
2026-4-30 05:13:11 | 阅读: 21 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
analysis
security
usable
workflows
constantly
Android Emulation & Virtualisation
Complete Research Lab Guide. From Zero to a Fully Instrumented Android Research EnvironmentPress ent...
2026-4-30 04:47:17 | 阅读: 22 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
assumes
variantsadb
rooted
sizewho
security
Vulnerable AI Lab
Technical Guide for Usage, Attack Testing, Scenario Authoring, and Vulnerability Module DevelopmentP...
2026-4-30 04:46:38 | 阅读: 24 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
matters
emerge
authoring
AI Offensive Security: Practical Attacks Against LLM Agents
Red-Team and AppSec Practitioner GuidePress enter or click to view image in full sizeIntroductionLLM...
2026-4-30 04:45:57 | 阅读: 25 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
planning
appsec
taxonomies
injection
Intigriti April 2026 XSS Challenge Writeup
IntroductionEvery month Intigriti drops a browser challenge. This one was the April 2026 edition.Pre...
2026-4-30 04:43:44 | 阅读: 19 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
noteid
presets
preset
rendermode
widgetsink
WaTF Bank Walkthrough (Part 4): Exploiting Android App Security Flaws
2026-4-29 05:9:17 | 阅读: 14 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
URL Anatomy & Encoding: Why Your Payloads Break
2026-4-29 05:8:59 | 阅读: 18 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
PaloAltoRCE Lab Write-Up | By BnHany
2026-4-29 05:8:43 | 阅读: 48 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Backup Files + .env Exposure Developers Ki Sabse Badi Galti: Config Files Se Credentials Nikalo!
2026-4-29 05:7:55 | 阅读: 20 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
php
backup
karo
nuclei
bak
Backup Files + .env Exposure Developers Ki Sabse Badi Galti: Config Files Se Credentials Nikalo!
2026-4-29 05:7:55 | 阅读: 36 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
From Zero Reports to My First Hall of Fame
For almost two years, I hunted bugs without a single acknowledgment.Late nights, no triaged reports,...
2026-4-29 05:7:50 | 阅读: 17 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
bounties
gea
vdp
portfolio
quit
From Zero Reports to My First Hall of Fame
2026-4-29 05:7:50 | 阅读: 45 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
ShellForge: Building a Constraint-Aware Shellcode Generator from Scratch
2026-4-29 05:7:30 | 阅读: 17 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Reverse Engineering the Proscenic 850T Robot Vacuum
2026-4-29 05:6:59 | 阅读: 18 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
How to Detect DNS Tunneling with Elastic SIEM: SOC Analyst Hands-On Lab | Hunt Forward Lab #003
2026-4-29 05:6:31 | 阅读: 26 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Analyse Your Network Traffic (Live Packet Inspection Using Wireshark)
Press enter or click to view image in full sizeHave you ever seen live-moving data packets in your n...
2026-4-29 05:6:11 | 阅读: 8 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
network
analysing
capturing
analysis
youtube
This Is How I Could Have Reactivated Your Instagram Account Without Your Knowledge
In this write-up, I have shared the story of an Instagram bug where deactivated account could be sil...
2026-4-29 05:5:43 | 阅读: 7 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
silently
eve
victim
spoiler
streak
This Is How I Could Have Reactivated Your Instagram Account Without Your Knowledge
In this write-up, I have shared the story of an Instagram bug where deactivated account could be sil...
2026-4-29 05:5:43 | 阅读: 18 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
silently
painful
reactivate
fame
consecutive
Connecting a Windows Endpoint to Wazuh
好的,我现在要帮用户总结这篇文章的内容。首先,我需要仔细阅读文章,理解它的主要目的和步骤。 文章的标题是关于如何将Windows终端连接到Wazuh的分步指南。看起来是教用户如何安装Windows代理并收集日志。作者之前已经部署了Wazuh SIEM平台在Kali Linux上使用Docker,现在扩展SOC实验室,安装Windows代理连接到Wazuh服务器。 接下来,文章提到代理允许Wazuh收集来自终端的安全遥测数据,包括操作系统、应用程序和系统日志。通过代理,Wazuh服务器可以监控各种事件,如身份验证活动、文件完整性变化、恶意软件检测、系统配置更改以及端点上的可疑行为等。 最后,用户完成指南后,Windows机器将开始向Wazuh平台发送日志,使SIEM能够检测和分析潜在的安全事件。如果用户还没有设置Windows虚拟机,可以参考作者的上一篇指南。 现在我需要将这些信息浓缩到100字以内,并且不需要以“文章内容总结”或“这篇文章”开头。重点包括:安装Windows代理、连接到Wazuh服务器、收集安全日志类型以及实现的功能。 所以总结起来应该是:指导如何在Windows上安装Wazuh代理并连接到服务器,收集系统日志用于安全监控。 </think> 文章介绍如何在Windows上安装Wazuh代理并连接到服务器,以收集系统日志用于安全监控。...
2026-4-28 07:4:41 | 阅读: 14 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
wazuh
windows
security
Previous
2
3
4
5
6
7
8
9
Next