unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
IPv6 DNS Takeover - Attacking & Exploitation IPV6
Windows默认启用IPv6可能导致DNS欺骗攻击。攻击者通过伪造DNS服务器截获NTLM哈希,并利用mitm6和ntlmrelayx工具进行认证relay,最终获取网络控制权。...
2025-3-16 21:18:0 | 阅读: 24 |
收藏
|
Hacking Dream - www.hackingdream.net
attacker
wpad
windows
machine
mitm6
Understanding Kerberos Authentication and its Attacks
Kerberos is a widely used authentication protocol that ensures secure identity verification within...
2025-3-5 20:52:0 | 阅读: 27 |
收藏
|
Hacking Dream - www.hackingdream.net
delegation
silver
attacker
dcshadow
Postgres Pentest Cheatsheet - Port 5432
文章介绍了PostgreSQL的安全性问题及攻击方法,包括漏洞扫描、暴力破解凭据、权限提升以及通过SQL命令读取和写入文件的技术。...
2025-2-14 16:46:0 | 阅读: 14 |
收藏
|
Hacking Dream - www.hackingdream.net
pg
database
php
username
passwd
Ldap Penetration Testing Cheatsheet - Port 389,636
这篇文章介绍了LDAP的基本操作和安全测试方法。内容包括使用Nmap扫描端口(如389, 636)探测服务、通过ldeep和ldapsearch工具匿名或认证导出数据,并展示了如何利用JXplorer访问服务及进行盲注攻击。此外,还涉及了 posixAccount 等 LDAP对象类及其相关属性。...
2025-2-8 16:24:0 | 阅读: 24 |
收藏
|
Hacking Dream - www.hackingdream.net
objectclass
ldapsearch
lll
youruser
Running DeepSeek AI Locally on your PC/Laptop
DeepSeek, a groundbreaking Chinese artificial intelligence (AI) company founded in 2023 by Liang We...
2025-1-28 16:1:0 | 阅读: 27 |
收藏
|
Hacking Dream - www.hackingdream.net
deepseek
ollama
windows
distill
llm
Android APK Penetration Testing Cheatsheet & Guide
Explore a step-by-step guide to Android APK penetration testing! This blog covers essential techniq...
2025-1-25 13:12:0 | 阅读: 27 |
收藏
|
Hacking Dream - www.hackingdream.net
apk
drozer
mobsf
diva
jakhar
Understanding PE Headers: A Complete Guide to the Windows Portable Executable Format
IntroductionThe Portable Executable (PE) format is an essential structure for Windows binaries such...
2025-1-4 20:0:0 | 阅读: 32 |
收藏
|
Hacking Dream - www.hackingdream.net
scn
initialized
memory
virtualsize
Jenkins Penetration Test Cheatsheet
Setting up Test Environment sudo wget -O /usr/share/keyrings/jenkins-keyring.asc \ https://pkg....
2024-12-23 13:27:0 | 阅读: 20 |
收藏
|
Hacking Dream - www.hackingdream.net
jenkins
jaf
bhanu
python
crumb
[Updated 8th May 2024]Solo Leveling Arise Redeem Codes Free
Need a Power-Up in Solo Leveling: Arise? Unlock Free Rewards with These Codes Want to level up your...
2024-5-9 02:9:0 | 阅读: 28 |
收藏
|
Hacking Dream - www.hackingdream.net
leveling
solo
arise
redeem
webtoon
Wordpress Penetration Testing
Find Wordpress Applications and Run WPScanwget https://raw.githubusercontent.com/Bhanunamikaze/Pe...
2024-4-11 17:7:0 | 阅读: 21 |
收藏
|
Hacking Dream - www.hackingdream.net
wordpress
wpscan
somename
reverse
php
The Art of Social Engineering: Manipulating Individuals into Revealing Confidential Information
Social engineering is a growing threat to businesses, as manipulators use psychological manipulati...
2024-2-22 13:0:0 | 阅读: 29 |
收藏
|
Hacking Dream - www.hackingdream.net
security
divulging
revealing
texts
Six Crucial Cybersecurity Principles and the One to Avoid: A Comprehensive Guide
Cybersecurity is a critical aspect of any organization's infrastructure, as it helps protect sensi...
2024-2-21 22:2:0 | 阅读: 31 |
收藏
|
Hacking Dream - www.hackingdream.net
security
threats
principle
secrecy
Understanding Cryptography Basics - Symmetric vs. Asymmetric
In today's digital world, data security is a top priority for individuals and organizations alike....
2024-2-20 11:0:0 | 阅读: 16 |
收藏
|
Hacking Dream - www.hackingdream.net
encryption
asymmetric
symmetric
security
parties
Role of Artificial Intelligence in Cybersecurity
In today's digital age, cybersecurity is more important than ever. As technology advances, the need...
2024-2-19 11:30:0 | 阅读: 34 |
收藏
|
Hacking Dream - www.hackingdream.net
threats
ethical
security
identify
The Future of Work: How Automation and AI Will Impact Jobs
As technology continues to advance, the future of work is becoming increasingly uncertain. While so...
2024-2-18 04:30:0 | 阅读: 21 |
收藏
|
Hacking Dream - www.hackingdream.net
aoe
agi
exposure
accounting
AI Predictions for 2024: Synthetic Data, Multimodal Models, Security Challenges, and More
As we enter 2024, the field of artificial intelligence (AI) is rapidly advancing. In this blog post...
2024-2-17 23:30:0 | 阅读: 38 |
收藏
|
Hacking Dream - www.hackingdream.net
crucial
multimodal
gpt
security
misleading
Use of AI/ML in Penetration Testing and Cyber Security
The article discusses the transformative role of Artificial Intelligence (AI) and Machine Learning...
2024-2-16 21:58:0 | 阅读: 40 |
收藏
|
Hacking Dream - www.hackingdream.net
security
threats
network
phishing
Learn Cyber Security Basics - Cyber Security Courses Online Free - Part I
In an era where digital threats loom at every corner, arming yourself with cyber security knowledge...
2024-2-15 21:51:0 | 阅读: 29 |
收藏
|
Hacking Dream - www.hackingdream.net
security
network
threats
career
Quantum Computing and Artificial Intelligence: A New Era of Technology - Unlocking the Power of Conscious Machines
Welcome to our blog post on the exciting intersection of quantum computing and artificial intellige...
2024-2-15 16:30:0 | 阅读: 21 |
收藏
|
Hacking Dream - www.hackingdream.net
exploration
turing
industries
earth
development
How Spotify AI Personalizes User Experience for Music Recommendation
Spotify is the world's largest music streaming service with over 500 million users. One of the key...
2024-2-13 06:30:0 | 阅读: 20 |
收藏
|
Hacking Dream - www.hackingdream.net
spotify
algorithmic
Previous
2
3
4
5
6
7
8
9
Next