unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Exploiting Model Inversion Attacks on AI Artificial Intelligence
Model inversion attacks are among the most sophisticated ways in which adversaries can steal sensit...
2024-2-10 21:14:0 | 阅读: 10 |
收藏
|
Hacking Dream - www.hackingdream.net
attacker
facial
inversion
hair
predicts
Safeguarding AI Models Against Data Poisoning Attacks: Strategies and Solutions
Data poisoning is a sophisticated cyber attack targeting machine learning models by deliberately al...
2024-2-10 20:15:0 | 阅读: 14 |
收藏
|
Hacking Dream - www.hackingdream.net
attacker
security
adversarial
poisoning
anomaly
Starting Your AI Journey? Here's the Roadmap You Need
Are you interested in pursuing a career in Artificial Intelligence (AI)? With the rapid growth of...
2024-2-10 11:30:0 | 阅读: 12 |
收藏
|
Hacking Dream - www.hackingdream.net
machine
extensive
industries
evolving
artificial
Future of Generative AI and The Dark Side of Advanced AI Systems
Advanced AI systems have revolutionized various industries and aspects of our lives. However, as th...
2024-2-9 14:0:0 | 阅读: 17 |
收藏
|
Hacking Dream - www.hackingdream.net
industries
chatgpt
creative
society
Exploring the Future of Technology: The Rabbit R1 AI Assistant
The pace of digital innovation continues to accelerate, bringing to the forefront groundbreaking te...
2024-2-9 01:50:0 | 阅读: 14 |
收藏
|
Hacking Dream - www.hackingdream.net
rabbit
security
innovative
versatility
healthcare
Pentesting Domain Controllers Cheatsheet
DNSdig srv domaim.com @DC_IP#Query ldap servicedig +short srv _ldap._tcp.dc._msdcs.dc.domain.co...
2024-2-6 20:24:0 | 阅读: 13 |
收藏
|
Hacking Dream - www.hackingdream.net
auxiliary
dcerpc
ldapsearch
mcs
Web Penetration Testing with Curl Cheatsheet
In lot of scenarios, we usually don't have access to GUI access to web applications but in most of...
2024-2-6 13:30:0 | 阅读: 18 |
收藏
|
Hacking Dream - www.hackingdream.net
kl
faultactor
rpcrouter
php
digest
MSSQL Penetration Testing Using Python
Installation curl https://packages.microsoft.com/keys/microsoft.asc | sudo tee /etc/apt/trusted.gpg...
2024-2-5 23:5:0 | 阅读: 16 |
收藏
|
Hacking Dream - www.hackingdream.net
microsoft
odbc
msodbcsql18
library
lib64
Running your first Local LLM Model like ChatGPT without Coding
In the fast-paced world of artificial intelligence and machine learning, local LLM (Large Language...
2024-2-1 23:1:0 | 阅读: 13 |
收藏
|
Hacking Dream - www.hackingdream.net
llm
gpt
mistral
ollama
windows
Best Practices for Secure Coding: Writing Hack-Proof Applications
In the digital age, where cyber threats are becoming more sophisticated, the importance of secure c...
2024-2-1 14:0:0 | 阅读: 10 |
收藏
|
Hacking Dream - www.hackingdream.net
security
development
encryption
developers
Cybersecurity Trends 2024: What Experts Predict
As we approach 2024, the landscape of cybersecurity is evolving rapidly, influenced by both emergin...
2024-2-1 02:22:0 | 阅读: 12 |
收藏
|
Hacking Dream - www.hackingdream.net
security
threats
emerging
ensuring
Navigating the Threat Landscape: A Guide to Internet Viruses
In the digital era, the internet has become a pivotal part of our daily lives, serving as a gateway...
2024-1-30 22:19:0 | 阅读: 11 |
收藏
|
Hacking Dream - www.hackingdream.net
threats
viruses
software
malicious
How to Get Started in Ethical Hacking and Penetration Testing: A Beginner's Guide
Introduction:Embarking on your journey in Getting Started in Ethical Hacking and Penetration Testin...
2024-1-30 05:22:0 | 阅读: 8 |
收藏
|
Hacking Dream - www.hackingdream.net
ethical
security
career
Java JMX RMI Pentest Cheatsheet
RMI can be run on any nonstandard port and when RMI is running you will observer one more endpoint...
2023-11-20 19:53:0 | 阅读: 19 |
收藏
|
Hacking Dream - www.hackingdream.net
beanshooter
rmg
jmx
github
remote
Pentesting Oracle TNS listener/ Database - Chaeatsheet - Port 1521
#nmapnmap -Pn -sV -p1521 --script=oracle* 10.10.10.10#Check for service Version#Oracle Database...
2023-8-14 22:7:0 | 阅读: 47 |
收藏
|
Hacking Dream - www.hackingdream.net
odat
1521
auxiliary
nmap
database
SNMP Pentest Cheatsheet - Port 161
Basic info About SNMPPorts - 161,162,10161,10162/udp SNMP is a based on UDP, stateless protocol...
2023-8-14 22:4:0 | 阅读: 25 |
收藏
|
Hacking Dream - www.hackingdream.net
snmpwalk
mibs
nmap
pty
processes
Attacking and Pentesting VMWare ESXi Hosts
Before getting into the Attacking and Exploitation, it is recommended to know the difference betwe...
2023-8-11 21:6:0 | 阅读: 61 |
收藏
|
Hacking Dream - www.hackingdream.net
vcenter
902
vsphere
centralized
vms
Exploiting VulnServer - KSTET - Egg Hunting - Windows Binary Exploitation
Egg hunting in 32-bit Windows binary exploitation is a technique used to locate and exploit vulnera...
2023-6-1 05:47:0 | 阅读: 42 |
收藏
|
Hacking Dream - www.hackingdream.net
egg
shellcode
mona
x2b
x2a
Shellcodes for Binary Exploitation
Get shellcode of the binary using objdump objdump -d ./Exit.o|grep '[0-9a-f]:'|grep -v 'file'|cut...
2023-5-28 04:14:0 | 阅读: 33 |
收藏
|
Hacking Dream - www.hackingdream.net
objdump
xc0
x05
x89
x2f
64-bit Binary Exploitation Cheatsheet
X64 Exploit concepts#JMP RAX Final Exploit - `nops + shellcode + JUNK + JMP RAX`#JMP RSP - use...
2023-5-26 05:29:0 | 阅读: 44 |
收藏
|
Hacking Dream - www.hackingdream.net
nops
shellcode
junk
payload
ret2libc
Previous
2
3
4
5
6
7
8
9
Next