unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Frida CheatSheet for Android
Printing all the loaded classesJava.perform(function(){Java.enumerateLoadedClasses({"onMatch":fun...
2017-07-26 04:17:07 | 阅读: 25 |
收藏
|
appsec-labs.com
mymethod1
appseclabs
appname
onmatch
Brute Force Prevention
Following the first part of the article, which explained the brute-force attack and its different te...
2017-05-08 16:20:09 | 阅读: 18 |
收藏
|
appsec-labs.com
captcha
locking
telephone
security
A Taxonomy on Brute Force Attacks
Brute force attack is a well-known technique of trial and error attempts used by attackers to gain a...
2017-05-08 16:16:35 | 阅读: 19 |
收藏
|
appsec-labs.com
attacker
username
hashed
rainbow
passwords
Secure Development Lifecycle for Open Source Usage
PrefaceHow do we adjust the SDL (Security Development Lifecycle) process for the growing use of ope...
2017-03-07 18:16:30 | 阅读: 23 |
收藏
|
appsec-labs.com
security
sdl
stage
development
analysis
Hacking Android Apps Through Exposed Components
In almost every Android application, developers expose activities without sufficient protections. Ex...
2017-02-28 19:08:30 | 阅读: 22 |
收藏
|
appsec-labs.com
appsec
drozer
broadcast
receiver
exposing
Cryptography as a Solution – Using Advanced Techniques for Data Protection
In the world of information security it is highly advised to implement security solutions in laye...
2017-01-22 00:17:21 | 阅读: 22 |
收藏
|
appsec-labs.com
encryption
client
security
symmetric
pinning
Guidelines for pentesting security systems
How do you perform a security test?Ever wanted to perform a penetration test on a security system (...
2016-12-29 19:31:31 | 阅读: 19 |
收藏
|
appsec-labs.com
security
assumptions
positives
Previous
2
3
4
5
6
7
8
9
Next