Felo 实时翻译 – 基于 AI 的免费实时翻译应用(GPT-4)[iOS]
https://www.appinn.com/felo-translator/
https://unsafe.sh/go-171484.html
https://www.appinn.com/felo-translator/
https://unsafe.sh/go-171484.html
小众软件
Felo 实时翻译 - 基于 AI 的免费实时翻译应用(GPT-4)[iOS] - 小众软件
Felo 实时翻译(Felo Translator)是一款基于 AI 的免费实时翻译应用,目前仅发布了 iOS 版本。使用时只需打开应用,它就能以对话的形式,实时识别并相互翻译两种语言,无论是国际旅行、跨境商务沟通,还是单纯学习外语,都非常适合,就像是你的私人翻译。@Appinn
每周蓝军技术推送(2023.7.1-7.7)
http://mp.weixin.qq.com/s?__biz=MzkyMTI0NjA3OA==&mid=2247491789&idx=1&sn=c78e40dca784fd075fff035b581010ad&chksm=c18420dcf6f3a9ca72b9a4803c164b901cafea6990e878689dcdf96a3d4d82cadd8e8496e85f#rd
https://unsafe.sh/go-171475.html
http://mp.weixin.qq.com/s?__biz=MzkyMTI0NjA3OA==&mid=2247491789&idx=1&sn=c78e40dca784fd075fff035b581010ad&chksm=c18420dcf6f3a9ca72b9a4803c164b901cafea6990e878689dcdf96a3d4d82cadd8e8496e85f#rd
https://unsafe.sh/go-171475.html
Weixin Official Accounts Platform
每周蓝军技术推送(2023.7.1-7.7)
关注高级攻防对抗技术热点,研究对手技术进行高级威胁模拟,研判攻击安全发展方向。
Pwning Adobe Reader Multiple Times with Malformed Strings
http://programlife.net/2020/04/29/pwning-adobe-reader-multiple-times-with-malformed-strings/
https://unsafe.sh/go-142457.html
http://programlife.net/2020/04/29/pwning-adobe-reader-multiple-times-with-malformed-strings/
https://unsafe.sh/go-142457.html
程序人生
Pwning Adobe Reader Multiple Times with Malformed Strings
这次我在 HITB Lockdown Livestream 上发表了题为《Pwning Adobe Reader Multiple Times with Malformed Strings》的演讲,该演讲本来是为 HITB 2020 Amsterdam 准备的,但由于受疫情影响,主办方被迫取消了原来的会议安排,转而在 YouTube 上举办了一次免费的在线会议。
东方财富APP“宕机”,导致股票无法交易
http://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651220298&idx=2&sn=35287d71e0efe0c3375d331e10f1c89e&chksm=bd1dfbc18a6a72d75aa75a2c25ac1173b373d5b15e54c97cab2ae3375a2d4eb86752c2e54c7c#rd
https://unsafe.sh/go-154542.html
http://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651220298&idx=2&sn=35287d71e0efe0c3375d331e10f1c89e&chksm=bd1dfbc18a6a72d75aa75a2c25ac1173b373d5b15e54c97cab2ae3375a2d4eb86752c2e54c7c#rd
https://unsafe.sh/go-154542.html
Weixin Official Accounts Platform
东方财富APP“宕机”,导致股票无法交易
3月21日上午,许多网友反映App无法正常登录交易。
『VulnHub 系列』AI: Web: 2 靶机-Walkthrough
http://mp.weixin.qq.com/s?__biz=MzkxNDAyNTY2NA==&mid=2247501587&idx=4&sn=9653bd6397b1aa04426872b78059879c&chksm=c1763abcf601b3aa12c608c84e599670fc204d742eddbad38e3680d256215ac774bb4b1fef79#rd
https://unsafe.sh/go-154716.html
http://mp.weixin.qq.com/s?__biz=MzkxNDAyNTY2NA==&mid=2247501587&idx=4&sn=9653bd6397b1aa04426872b78059879c&chksm=c1763abcf601b3aa12c608c84e599670fc204d742eddbad38e3680d256215ac774bb4b1fef79#rd
https://unsafe.sh/go-154716.html
Weixin Official Accounts Platform
『VulnHub 系列』AI: Web: 2 靶机-Walkthrough
现在只对常读和星标的公众号才展示大图推送,建议大家能把渗透安全团队“设为星标”,否则可能就看不到了啦!Par
[原创]The simplest Windows driver written in rust
https://bbs.pediy.com/thread-277769.htm
https://unsafe.sh/go-171257.html
https://bbs.pediy.com/thread-277769.htm
https://unsafe.sh/go-171257.html
Kanxue
[原创]The simplest Windows driver written in rust-编程技术-看雪-安全社区|安全招聘|kanxue.com
Nessus 5.2 XMLRPC Automation
https://nileshkapoor.blogspot.com/2014/01/nessus-52-xmlrpc-automation.html
https://unsafe.sh/go-164484.html
https://nileshkapoor.blogspot.com/2014/01/nessus-52-xmlrpc-automation.html
https://unsafe.sh/go-164484.html
Blogspot
Nessus 5.2 XMLRPC Automation
Recently, I was trying to use my previously automated Nessus Automation scripts and detected they aren’t working on latest Nessus 5.2 XML...
Windows Kernel Exploitation Basics - Part 4 : Stack-based Buffer Overflow exploitation (bypassing cookie)
https://poppopret.blogspot.com/2011/07/windows-kernel-exploitation-basics-part_16.html
https://unsafe.sh/go-164047.html
https://poppopret.blogspot.com/2011/07/windows-kernel-exploitation-basics-part_16.html
https://unsafe.sh/go-164047.html
Blogspot
Windows Kernel Exploitation Basics - Part 4 : Stack-based Buffer Overflow exploitation (bypassing cookie)
In this article, we'll exploit the Stack-based Buffer Overflow that is present into the DVWDDriver when we pass a too big buffer to the dr...
Advanced Windows TaskScheduler Playbook - Part.3 from RPC to lateral movement
http://www.zcgonvh.com/post/Advanced_Windows_Task_Scheduler_Playbook-Part.3_from_RPC_to_lateral_movement.html
https://unsafe.sh/go-153934.html
http://www.zcgonvh.com/post/Advanced_Windows_Task_Scheduler_Playbook-Part.3_from_RPC_to_lateral_movement.html
https://unsafe.sh/go-153934.html
1day漏洞反推技巧实战(2) - 飘渺红尘✨
https://www.cnblogs.com/piaomiaohongchen/p/15215885.html
https://unsafe.sh/go-143128.html
https://www.cnblogs.com/piaomiaohongchen/p/15215885.html
https://unsafe.sh/go-143128.html
Cnblogs
1day漏洞反推技巧实战(2) - 飘渺红尘✨ - 博客园
学习存货(2) CVE-2018-11784简单分析之反推的魅力 看着挺有趣的,简单分析下: 通过搜索tomcat漏洞找到: http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.91 修改了这两个文件,我们看java
Badsecrets - A Library For Detecting Known Secrets Across Many Web Frameworks
http://www.kitploit.com/2023/07/badsecrets-library-for-detecting-known.html
https://unsafe.sh/go-171490.html
http://www.kitploit.com/2023/07/badsecrets-library-for-detecting-known.html
https://unsafe.sh/go-171490.html
KitPloit - PenTest & Hacking Tools
Badsecrets - A Library For Detecting Known Secrets Across Many Web Frameworks
Differential fuzz testing upgradeable smart contracts with Diffusc
https://blog.trailofbits.com/2023/07/07/differential-fuzz-testing-upgradeable-smart-contracts-with-diffusc/
https://unsafe.sh/go-171488.html
https://blog.trailofbits.com/2023/07/07/differential-fuzz-testing-upgradeable-smart-contracts-with-diffusc/
https://unsafe.sh/go-171488.html
The Trail of Bits Blog
Differential fuzz testing upgradeable smart contracts with Diffusc
On March 28, 2023, SafeMoon, a self-styled “community-focused DeFi token” on Binance Smart Chain, lost the equivalent of $8.9 million in Binance Coin BNB to an exploit in a liquidity pool. The exploit leveraged a simple error introduced in an upgrade to SafeMoon’s…
Debugging with gdb - Fixing a NULL Pointer Dereference in dhcpcd
https://www.archcloudlabs.com/projects/gdb-debugging-1/
https://unsafe.sh/go-171412.html
https://www.archcloudlabs.com/projects/gdb-debugging-1/
https://unsafe.sh/go-171412.html
Arch Cloud Labs
Debugging with gdb - Fixing a NULL Pointer Dereference in dhcpcd
About the Project Several tutorials exist on how to leverage the GNU Debugger (GDB) to debug misbehaving applications. However, a majority of these blogs just show commands to run that poke at memory addresses, and don’t show the process of resolving said…