unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Running DeepSeek AI Locally on your PC/Laptop
DeepSeek, a groundbreaking Chinese artificial intelligence (AI) company founded in 2023 by Liang We...
2025-1-28 16:1:0 | 阅读: 10 |
收藏
|
Hacking Dream - www.hackingdream.net
deepseek
ollama
windows
distill
llm
Android APK Penetration Testing Cheatsheet & Guide
Explore a step-by-step guide to Android APK penetration testing! This blog covers essential techniq...
2025-1-25 13:12:0 | 阅读: 3 |
收藏
|
Hacking Dream - www.hackingdream.net
apk
drozer
mobsf
diva
jakhar
Understanding PE Headers: A Complete Guide to the Windows Portable Executable Format
IntroductionThe Portable Executable (PE) format is an essential structure for Windows binaries such...
2025-1-4 20:0:0 | 阅读: 4 |
收藏
|
Hacking Dream - www.hackingdream.net
scn
initialized
memory
virtualsize
Jenkins Penetration Test Cheatsheet
Setting up Test Environment sudo wget -O /usr/share/keyrings/jenkins-keyring.asc \ https://pkg....
2024-12-23 13:27:0 | 阅读: 7 |
收藏
|
Hacking Dream - www.hackingdream.net
jenkins
jaf
bhanu
python
crumb
[Updated 8th May 2024]Solo Leveling Arise Redeem Codes Free
Need a Power-Up in Solo Leveling: Arise? Unlock Free Rewards with These Codes Want to level up your...
2024-5-9 02:9:0 | 阅读: 12 |
收藏
|
Hacking Dream - www.hackingdream.net
leveling
solo
arise
redeem
webtoon
Wordpress Penetration Testing
Find Wordpress Applications and Run WPScanwget https://raw.githubusercontent.com/Bhanunamikaze/Pe...
2024-4-11 17:7:0 | 阅读: 13 |
收藏
|
Hacking Dream - www.hackingdream.net
wordpress
wpscan
somename
reverse
php
The Art of Social Engineering: Manipulating Individuals into Revealing Confidential Information
Social engineering is a growing threat to businesses, as manipulators use psychological manipulati...
2024-2-22 13:0:0 | 阅读: 12 |
收藏
|
Hacking Dream - www.hackingdream.net
security
divulging
revealing
texts
Six Crucial Cybersecurity Principles and the One to Avoid: A Comprehensive Guide
Cybersecurity is a critical aspect of any organization's infrastructure, as it helps protect sensi...
2024-2-21 22:2:0 | 阅读: 12 |
收藏
|
Hacking Dream - www.hackingdream.net
security
threats
principle
secrecy
Understanding Cryptography Basics - Symmetric vs. Asymmetric
In today's digital world, data security is a top priority for individuals and organizations alike....
2024-2-20 11:0:0 | 阅读: 10 |
收藏
|
Hacking Dream - www.hackingdream.net
encryption
asymmetric
symmetric
security
parties
Role of Artificial Intelligence in Cybersecurity
In today's digital age, cybersecurity is more important than ever. As technology advances, the need...
2024-2-19 11:30:0 | 阅读: 17 |
收藏
|
Hacking Dream - www.hackingdream.net
threats
ethical
security
identify
The Future of Work: How Automation and AI Will Impact Jobs
As technology continues to advance, the future of work is becoming increasingly uncertain. While so...
2024-2-18 04:30:0 | 阅读: 14 |
收藏
|
Hacking Dream - www.hackingdream.net
aoe
agi
exposure
accounting
AI Predictions for 2024: Synthetic Data, Multimodal Models, Security Challenges, and More
As we enter 2024, the field of artificial intelligence (AI) is rapidly advancing. In this blog post...
2024-2-17 23:30:0 | 阅读: 21 |
收藏
|
Hacking Dream - www.hackingdream.net
crucial
multimodal
gpt
security
misleading
Use of AI/ML in Penetration Testing and Cyber Security
The article discusses the transformative role of Artificial Intelligence (AI) and Machine Learning...
2024-2-16 21:58:0 | 阅读: 17 |
收藏
|
Hacking Dream - www.hackingdream.net
security
threats
network
phishing
Learn Cyber Security Basics - Cyber Security Courses Online Free - Part I
In an era where digital threats loom at every corner, arming yourself with cyber security knowledge...
2024-2-15 21:51:0 | 阅读: 12 |
收藏
|
Hacking Dream - www.hackingdream.net
security
network
threats
career
Quantum Computing and Artificial Intelligence: A New Era of Technology - Unlocking the Power of Conscious Machines
Welcome to our blog post on the exciting intersection of quantum computing and artificial intellige...
2024-2-15 16:30:0 | 阅读: 15 |
收藏
|
Hacking Dream - www.hackingdream.net
exploration
turing
industries
earth
development
How Spotify AI Personalizes User Experience for Music Recommendation
Spotify is the world's largest music streaming service with over 500 million users. One of the key...
2024-2-13 06:30:0 | 阅读: 13 |
收藏
|
Hacking Dream - www.hackingdream.net
spotify
algorithmic
The 10 Stages of Artificial General Intelligence (AGI)
Artificial General Intelligence (AGI) is a rapidly evolving technology that has the potential to t...
2024-2-12 13:0:0 | 阅读: 20 |
收藏
|
Hacking Dream - www.hackingdream.net
agi
stage
agiagi
innovation
stages
Charting the Path of Innovation and Responsibility: The Dual Faces of ChatGPT in the Digital Age
ChatGPT may also be a game-changer, for it may be just this development that allows for a revolutio...
2024-2-11 19:30:0 | 阅读: 12 |
收藏
|
Hacking Dream - www.hackingdream.net
chatgpt
creativity
propaganda
ethically
Exploiting AI using Model Stealing or Data Extraction Attacks
Model Stealing or Extraction Attacks tries to replicate the functionality of a proprietary model wi...
2024-2-11 00:29:0 | 阅读: 16 |
收藏
|
Hacking Dream - www.hackingdream.net
attacker
cloud
scores
cloned
proprietary
Exploiting AI Using Membership Inference Attacks
Membership Inference attacks seek to identify if a specific data point was included in a model's tr...
2024-2-11 00:11:0 | 阅读: 16 |
收藏
|
Hacking Dream - www.hackingdream.net
patient
attacker
membership
inference
diagnosis
Previous
0
1
2
3
4
5
6
7
Next