unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Portability of old Windows programs…
Many people believe that native Windows programs are so deeply integrated with OS that there is...
2024-11-24 03:2:44 | 阅读: 2 |
收藏
|
Hexacorn - www.hexacorn.com
windows
calculator
revert
sfp
kinda
Methods to bypass 403 & 401
2024-11-24 02:42:38 | 阅读: 3 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Methods to bypass 403 & 401
2024-11-24 02:42:38 | 阅读: 0 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
Disallowed but Discoverable: The Hacker’s robots.txt Playbook
2024-11-24 02:41:25 | 阅读: 3 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Disallowed but Discoverable: The Hacker’s robots.txt Playbook
2024-11-24 02:41:25 | 阅读: 0 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
Building a Virtual Ethical Hacking Home Lab — Part 4: Attack Machine Setup
2024-11-24 02:41:11 | 阅读: 1 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
A cyberattack on gambling giant IGT disrupted portions of its IT systems
A cyberattack on gambling giant IGT disrupted portions of its IT systems...
2024-11-24 01:7:28 | 阅读: 1 |
收藏
|
Security Affairs - securityaffairs.com
gambling
igt
cyberattack
promptly
Decrypting a PDF With a User Password, (Sat, Nov 23rd)
In diary entry "Analyzing an Encrypted Phishing PDF", I decrypted a phishing PDF document. Because...
2024-11-24 01:6:46 | 阅读: 1 |
收藏
|
SANS Internet Storm Center, InfoCON: green - isc.sans.edu
phishing
qpdf
pdfid
didier
suitable
Using MLLMs for Diffusion Synthesis That Synergizes Both Sides: How Is This Possible?
Table of LinksAbstract and 1 Introduction2 Background & Problem Statement2.1 How can we use MLLMs...
2024-11-24 01:0:14 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
megvii
mllms
multimodal
internship
Get to Know More About DreamLLM: The Background on This Learning Framework
Authors:(1) Runpei Dong, Xi’an Jiaotong University and Internship at MEGVII;(2) Chunrui Han, MEGV...
2024-11-24 00:30:17 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
megvii
internship
tsinghua
jiaotong
xi
The HackerNoon Newsletter: Educational Byte: Are Privacy Coins Like Monero and Zcash Legal? (11/23/2024)
2024-11-24 00:5:7 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
obsolete
corruption
satellite
contest
hackernoon
What Is DreamLLM? Everything You Need to Know About the Learning Framework
Table of LinksAbstract and 1 Introduction2 Background & Problem Statement2.1 How can we use MLLMs...
2024-11-24 00:0:16 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
multimodal
dreamllm
megvii
interleaved
DEF CON 32 – Troll Trapping Through TAS Tools Exposing Speedrunning Cheaters
Saturday, November 23, 2024...
2024-11-24 00:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
webinars
youtube
boulevard
成年黑猩猩会通过游戏促进社会关系
部分黑猩猩和人类一样,会在一生中经常与同伴玩耍,尤其是在需要集体合作之前。对生活在科特迪瓦 Tai 森林里的 3 个黑猩猩群体的观察发现,成年雄性和雌性经常在一起玩耍。这些游戏通常包括身体...
2024-11-23 23:25:40 | 阅读: 8 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
玩耍
黑猩猩
猩猩
集体
雌性
The rise and fall of the ‘Scattered Spider’ hackers
After evading capture for more than two years following a hacking spree that targeted some of the w...
2024-11-23 23:16:25 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - techcrunch.com
spider
scattered
mgm
authorities
美国再次指责中国黑客入侵其电信基础设施
上个月《华尔街日报》报道称中国黑客入侵了美国的电信基础设施,本周《华盛顿邮报》和《纽约时报》公布了更多信息。黑客组织被称为 Salt Typhoon,他们能利用美国执法机构在电信基础设施中...
2024-11-23 23:9:57 | 阅读: 5 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
黑客
加密
salt
美国
typhoon
高颜值实力!AB Download Manager - 可替代 IDM 免费开源多线程下载加速工具
网络软件 Windows, Linux 2024-11-23夸克网盘 ¥119 年卡 | 百度网盘年卡¥176 (买一得五) | 开通京东 Plus 年卡限时仅 ¥69大家...
2024-11-23 20:55:12 | 阅读: 4 |
收藏
|
异次元软件世界 - www.iplaysoft.com
idm
download
开源
网络
Wireshark 4.4.2 Released, (Sat, Nov 23rd)
Published: 2024-11-23. Last Updated: 2024-11-23 12:42:31 UTCby Didier Stevens (Version: 1)Wiresh...
2024-11-23 20:42:31 | 阅读: 1 |
收藏
|
SANS Internet Storm Center, InfoCON: green - isc.sans.edu
didier
stevens
senior
China-linked APT Gelsemium uses a new Linux backdoor dubbed WolfsBane
China-linked APT Gelsemium uses a new Linux backdoor dubbed WolfsBane...
2024-11-23 20:14:14 | 阅读: 3 |
收藏
|
Security Affairs - securityaffairs.com
wolfsbane
gelsemium
gelsevirine
firewood
windows
Google Exposes GLASSBRIDGE: A Pro-China Influence Network of Fake News Sites
Cloud Security / Threat IntelligenceGovernment agencies and non-governmental organizations in the...
2024-11-23 20:10:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
2077
newswire
microsoft
glassbridge
inauthentic
Previous
-7
-6
-5
-4
-3
-2
-1
0
Next