unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
How to switch between NVIDIA and Intel Graphics Completely || Battery Saving in Manjaro | by Jashaswimalya Acharjee | Medium
One of the main problems people face while switching to Linux based distros is that Notebook users e...
2022-2-12 01:28:47 | 阅读: 1131 |
收藏
|
medium.com
optimus
manjaro
gdm
nvidia
xorg
SQL Injection in Wordpress core (CVE-2022–21661) | by Ngocnb | Jan, 2022 | Medium
Cuối năm 2021, team mình đã phát hiện ra lỗ hổng SQL Injection trong phần core của Wordpress và mới...
2022-1-10 16:3:57 | 阅读: 5253 |
收藏
|
medium.com
và
có
đư
đã
trong
如何成為一名駭客
記得在我小時候曾玩過一款線上遊戲,我把我身上的總財產100元拿去買了遊戲點數,用這些錢買了強力的裝備,不料過了幾天之後裝備就憑空消失了,我的幼小心靈就隨著這100元的消逝而破碎了-這就是我第一次接觸到...
2021-10-15 19:51:59 | 阅读: 43 |
收藏
|
medium.com
程式
資料
漏洞
密碼
injection
$300,000 RCE @ Wordpress. An analysis of the current state of… | by MrIP | Oct, 2021 | Medium
When you first start reviewing Wordpress you’ll be immediately hit by what looks like weak system de...
2021-10-13 21:50:11 | 阅读: 50 |
收藏
|
medium.com
wordpress
wp
developers
php
injection
$300,000 RCE @ Wordpress
When you first start reviewing Wordpress you’ll be immediately hit by what looks like weak system de...
2021-10-11 17:06:14 | 阅读: 59 |
收藏
|
medium.com
wordpress
wp
php
developers
libxml2
Yes We can: Watermarking Machine Learning Models beyond Classification
2021-6-16 17:55:18 | 阅读: 0 |
收藏
|
Stories by SAP Security Research on Medium - medium.com
Talking About My Generation: Targeted DOM-based XSS Exploit Generation using Dynamic Data Flow…
2021-5-6 21:56:23 | 阅读: 0 |
收藏
|
Stories by SAP Security Research on Medium - medium.com
Detection, assessment and mitigation of vulnerabilities in open source dependencies
2021-4-2 00:42:6 | 阅读: 0 |
收藏
|
Stories by SAP Security Research on Medium - medium.com
Optimizing Leak Detection in Open-source Platforms with Machine Learning Techniques
2021-4-2 00:20:7 | 阅读: 0 |
收藏
|
Stories by SAP Security Research on Medium - medium.com
Commit2Vec: Learning Distributed Representations of Code Changes
2021-4-1 23:59:46 | 阅读: 0 |
收藏
|
Stories by SAP Security Research on Medium - medium.com
How do I get Started in Cyber Security? — My Perspective & Learning Path!
Cyber Security, Ethical Hacking, Application Security, Penetration Testing, Bug Bounties, etc., thes...
2021-03-06 19:38:56 | 阅读: 297 |
收藏
|
medium.com
security
network
mozilla
developer
career
eWPTXv2 Exam Review
Web Application is commonly found part of any organization’s infrastructure and often is exposed pub...
2021-02-16 23:52:23 | 阅读: 1271 |
收藏
|
medium.com
courseware
resets
security
Finding My First Bug: HTTP Request Smuggling
This is the report of my first bug. The bug was HTTP Request Smuggling for which I got a bounty of $...
2021-02-15 04:49:59 | 阅读: 315 |
收藏
|
medium.com
portswigger
403
desync
security
gave
Getting started with XSS: Cross-Site Scripting Attacks
Let’s get started with XSS, in order to get those critical bugs- CSRF, SSRF, RCE. Most of the time,...
2021-02-14 20:57:06 | 阅读: 248 |
收藏
|
medium.com
payload
client
malicious
samy
attacker
Oauth Misconfig — Leads to Account Takeover
Hello Infosec Community,This is my first writeup for the vulnerability that I reported and got the f...
2021-02-12 01:20:56 | 阅读: 226 |
收藏
|
medium.com
victim
attacker
hunt
rvdp
hunters
A Tale of 2nd $xxx Bounty | Ability to Gain Persistence on Facebook Events as an unremovable…
Ability to Gain Persistence on Facebook Events as an unremovable co-host.This writeup describes a bu...
2021-02-10 11:31:56 | 阅读: 226 |
收藏
|
medium.com
facebook
eventone
usertwo
pagetwo
malicious
Dangling DNS: AWS EC2
Oct 3rd, 2019Asset: Private Program #1 (*.example.com)Report:Details:I began with enumerating subdom...
2021-02-10 03:32:12 | 阅读: 266 |
收藏
|
medium.com
dangling
ec2
subdomain
2019asset
fig
TCS HackQuest Season 5 - First Round CTF Write-up
TCS HackQuest Season 5TCS HackQuest Season 5 is an ongoing CTF competition conducted by TCS Company...
2021-02-07 02:13:11 | 阅读: 341 |
收藏
|
medium.com
hq5
competition
hackquest
php
Hacking Organizations One Document at a Time With Metadata
Metadata is simply defined as data about data. In computer systems, this is used to correctly interp...
2021-02-03 22:41:46 | 阅读: 226 |
收藏
|
medium.com
client
software
leveraged
removal
security
Intigriti’s January XSS Challenge
IntroductionExplaining the codeInitial ideas and method of solvingThe solutionAs always, I started w...
2021-02-02 19:13:33 | 阅读: 241 |
收藏
|
medium.com
inject
intigriti
0121
subdomain
0aid
Previous
4
5
6
7
8
9
10
11
Next