unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Announcing the Burp Suite Professional chapter in the Testing Handbook
By Maciej DomanskiBased on our security auditing experience, we’ve found that Bu...
2024-6-14 21:0:23 | 阅读: 10 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
burp
security
chapter
trail
Exploiting ML models with pickle file attacks: Part 2
By Boyan MilanovIn part 1, we introduced Sleepy Pickle, an attack that uses mali...
2024-6-11 23:0:17 | 阅读: 17 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
pickle
payload
malicious
python
bytecode
Exploiting ML models with pickle file attacks: Part 1
By Boyan MilanovWe’ve developed a new hybrid machine learning (ML) model exploit...
2024-6-11 21:0:36 | 阅读: 16 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
pickle
malicious
sleepy
payload
attacker
Announcing AI/ML safety and security trainings
By Michael D. BrownWe are offering AI/ML safety and security training in summer...
2024-6-7 21:0:41 | 阅读: 11 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
security
surfaces
equip
stacks
Understanding AddressSanitizer: Better memory safety for your code
By Dominik Klemba and Dominik CzarnotaThis post will guide you through using Add...
2024-5-16 21:0:57 | 阅读: 12 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
memory
asan
shadow
poisoned
granule
A peek into build provenance for Homebrew
By Joe Sweeney and William WoodruffLast November, we announced our collaboration...
2024-5-14 21:0:5 | 阅读: 9 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
homebrew
provenance
brew
bottle
github
Using benchmarks to speed up Echidna
By Ben SiraphobDuring my time as a Trail of Bits associate last summer, I worked...
2024-5-8 21:30:7 | 阅读: 9 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
memory
echidna
hevm
profiling
evm
The life and times of an Abstract Syntax Tree
By Francesco BertolacciniYou’ve reached computer programming nirvana. Your journ...
2024-5-2 21:0:6 | 阅读: 12 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
memory
rhs
lhs
binexpr
intconstant
Curvance: Invariants unleashed
By Nat ChinWelcome to our deep dive into the world of invariant development with...
2024-4-30 21:30:43 | 阅读: 12 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
curvance
echidna
invariants
corpus
codebase
Announcing two new LMS libraries
By Will SongThe Trail of Bits cryptography team is pleased to announce the open-...
2024-4-26 21:0:32 | 阅读: 11 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
lms
schemes
stateful
security
5 reasons to strive for better disclosure processes
By Max AmmannThis blog showcases five examples of real-world vulnerabilities tha...
2024-4-15 21:0:53 | 阅读: 7 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
github
security
library
vec
mmkv
Introducing Ruzzy, a coverage-guided Ruby fuzzer
By Matt SchwagerTrail of Bits is excited to introduce Ruzzy, a coverage-guided f...
2024-3-29 21:30:44 | 阅读: 19 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
ruzzy
harness
libfuzzer
tracer
gems
Why fuzzing over formal verification?
By Tarun Bansal, Gustavo Grieco, and Josselin FeistWe recently introduced our ne...
2024-3-22 21:0:28 | 阅读: 10 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
formal
invariant
asset
echidna
invariants
Streamline your static analysis triage with SARIF Explorer
By Vasco FrancoToday, we’re releasing SARIF Explorer, the VSCode extension that...
2024-3-20 21:30:45 | 阅读: 13 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
sarif
weaudit
vscode
github
classify
Read code like a pro with our weAudit VSCode extension
By Filipe CasalToday, we’re releasing weAudit, the collaborative code-reviewing...
2024-3-19 21:30:0 | 阅读: 10 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
weaudit
vscode
codebase
bookmarks
github
Releasing the Attacknet: A new tool for finding bugs in blockchain nodes using chaos testing
By Benjamin Samuels (@thebensams)Today, Trail of Bits is publishing Attacknet,...
2024-3-18 21:0:59 | 阅读: 9 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
network
attacknet
faults
client
blockchain
Secure your blockchain project from the start
Systemic security issues in blockchain projects often appear early in development...
2024-3-13 21:0:45 | 阅读: 5 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
security
stage
development
identify
tailored
DARPA awards $1 million to Trail of Bits for AI Cyber Challenge
By Michael D. BrownWe’re excited to share that Trail of Bits has been selected a...
2024-3-12 01:46:31 | 阅读: 17 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
aixcc
crs
llms
competition
Out of the kernel, into the tokens
By Max Ammann and Emilio LópezOur application security team leaves no stone untu...
2024-3-8 22:0:48 | 阅读: 7 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
jose
kaslr
bypass
syslog
encryption
Cryptographic design review of Ockam
By Marc Ilunga, Jim Miller, Fredrik Dahlgren, and Joop van de PolIn October 2023...
2024-3-5 22:0:38 | 阅读: 10 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
ockam
security
identities
guarantees
modeling
Previous
3
4
5
6
7
8
9
10
Next