unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Cloudflare: How to Secure Your Origin Server?
Cloudflare has established itself as a key player on the web in recent years, offering not...
2024-10-8 15:52:54 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
truncated
attacker
php
vaadata
client
Frida, the Tool Dedicated to Mobile Application Security
IntroductionMobile applications play a central role in today’s world. Whether for per...
2024-10-7 21:44:29 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
bypass
inject
machine
decrypted
What is Command Injection? Exploitations and Security Best Practices
Command injections are one of the most critical vulnerabilities in web security. They occu...
2024-9-13 22:49:50 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
injection
injections
passwd
attacker
php
What is Pre-Account Takeover? Exploitations & Security Tips
Pre-Account Takeover is a type of attack that we very often carry out during our audits. A...
2024-9-12 16:11:58 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
attacker
sso
brown
vaadata
What is RFI? Remote File Inclusion Exploitations and Security Tips
Security vulnerabilities are a major risk for modern web applications, potentially exposin...
2024-9-3 17:46:54 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
php
remote
rfi
attacker
inclusion
Exploring Email Change Vulnerabilities and Security Best Practices
Whatever the web application, it is common practice to allow users to change their email a...
2024-8-23 17:9:7 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
validated
attacker
privileged
Introduction to Nuclei, an Open Source Vulnerability Scanner
IntroductionWith IT threats constantly evolving, businesses need to ensure that their...
2024-8-23 16:44:52 | 阅读: 4 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
nuclei
identify
audits
security
What are IoT Attack Vectors and Security Challenges?
IoT security is a key issue for organisations. In all sectors and areas of activity (healt...
2024-8-6 23:26:37 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
security
hardware
attacker
network
software
Security Audits: Objectives, Types and Methodologies
With cyberattacks on the rise, carrying out an IT security audit has never been a higher p...
2024-8-6 21:55:42 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
security
audits
What is Prototype Pollution? Exploitations and Security Tips
Prototype pollution vulnerabilities are specific to JavaScript. They can be exploited on b...
2024-8-6 17:34:25 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
pollution
client
polluted
Phishing: Methodology, Common Techniques and Tools
We can’t talk about social engineering without mentioning phishing. Similarly, email is es...
2024-8-5 21:22:8 | 阅读: 4 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
phishing
attacker
victim
dropbox
Account Takeover Techniques and Security Best Practices
Account takeover is a common practice that threatens the security of users and their data....
2024-7-22 17:26:43 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
security
attacker
passwords
phishing
SAML: How it Works, Vulnerabilities and Common Attacks
Secure identity and access management has become a key challenge for organisations. Among...
2024-7-19 22:31:19 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
assertion
idp
assertions
security
Understanding NTLM Authentication and NTLM Relay Attacks
In an office environment, user workstations generally use Windows operating systems and th...
2024-7-8 18:30:19 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
windows
llmnr
network
machine
Sqlmap, the Tool for Detecting and Exploiting SQL Injections
IntroductionSurely one of the best-known vulnerabilities, and one that has been aroun...
2024-6-7 21:40:45 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
sqlmap
injection
database
injections
payload
Exploring LLM Vulnerabilities and Security Best Practices
You’ve probably heard about the arrival of LLMs in a big way, at least with ChatGPT.LL...
2024-5-14 02:39:25 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
llm
chatgpt
injection
prompts
GraphQL API Vulnerabilities, Common Attacks and Security Tips
Developed in 2012 and made open source in 2015 by Facebook, GraphQL (Graph Query Language)...
2024-5-13 22:48:11 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
mutation
mutations
malicious
Identification and Authentication Failures: OWASP Top 10 #7
Authentication and, by extension, user identification are central to web applications....
2024-4-15 18:19:59 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
passwords
sso
attacker
security
Modifying Java Serialized Objects as Easily as JSON
Often, when we hear about Java serialization, we find resources or challenges that only ta...
2024-4-11 13:16:29 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
zelda
serialized
serde
annotations
burp
What is a DoS Attack? Types, Exploitations and Security Tips
In the space of 5 years, the number of Denial of Service (DoS) attacks has almost doubled....
2024-4-11 10:1:27 | 阅读: 5 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
fragment
victim
attacker
client
Previous
3
4
5
6
7
8
9
10
Next