unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Use of AI/ML in Penetration Testing and Cyber Security
The article discusses the transformative role of Artificial Intelligence (AI) and Machine Learning...
2024-2-16 21:58:0 | 阅读: 40 |
收藏
|
Hacking Dream - www.hackingdream.net
security
threats
network
phishing
Learn Cyber Security Basics - Cyber Security Courses Online Free - Part I
In an era where digital threats loom at every corner, arming yourself with cyber security knowledge...
2024-2-15 21:51:0 | 阅读: 29 |
收藏
|
Hacking Dream - www.hackingdream.net
security
network
threats
career
Quantum Computing and Artificial Intelligence: A New Era of Technology - Unlocking the Power of Conscious Machines
Welcome to our blog post on the exciting intersection of quantum computing and artificial intellige...
2024-2-15 16:30:0 | 阅读: 21 |
收藏
|
Hacking Dream - www.hackingdream.net
exploration
turing
industries
earth
development
How Spotify AI Personalizes User Experience for Music Recommendation
Spotify is the world's largest music streaming service with over 500 million users. One of the key...
2024-2-13 06:30:0 | 阅读: 21 |
收藏
|
Hacking Dream - www.hackingdream.net
spotify
algorithmic
The 10 Stages of Artificial General Intelligence (AGI)
Artificial General Intelligence (AGI) is a rapidly evolving technology that has the potential to t...
2024-2-12 13:0:0 | 阅读: 26 |
收藏
|
Hacking Dream - www.hackingdream.net
agi
stage
agiagi
innovation
stages
Charting the Path of Innovation and Responsibility: The Dual Faces of ChatGPT in the Digital Age
ChatGPT may also be a game-changer, for it may be just this development that allows for a revolutio...
2024-2-11 19:30:0 | 阅读: 19 |
收藏
|
Hacking Dream - www.hackingdream.net
chatgpt
creativity
propaganda
ethically
Exploiting AI using Model Stealing or Data Extraction Attacks
Model Stealing or Extraction Attacks tries to replicate the functionality of a proprietary model wi...
2024-2-11 00:29:0 | 阅读: 23 |
收藏
|
Hacking Dream - www.hackingdream.net
attacker
cloud
scores
cloned
proprietary
Exploiting AI Using Membership Inference Attacks
Membership Inference attacks seek to identify if a specific data point was included in a model's tr...
2024-2-11 00:11:0 | 阅读: 21 |
收藏
|
Hacking Dream - www.hackingdream.net
patient
attacker
membership
inference
diagnosis
Exploiting Model Inversion Attacks on AI Artificial Intelligence
Model inversion attacks are among the most sophisticated ways in which adversaries can steal sensit...
2024-2-10 21:14:0 | 阅读: 13 |
收藏
|
Hacking Dream - www.hackingdream.net
attacker
facial
inversion
hair
predicts
Safeguarding AI Models Against Data Poisoning Attacks: Strategies and Solutions
Data poisoning is a sophisticated cyber attack targeting machine learning models by deliberately al...
2024-2-10 20:15:0 | 阅读: 17 |
收藏
|
Hacking Dream - www.hackingdream.net
attacker
security
adversarial
poisoning
anomaly
Starting Your AI Journey? Here's the Roadmap You Need
Are you interested in pursuing a career in Artificial Intelligence (AI)? With the rapid growth of...
2024-2-10 11:30:0 | 阅读: 16 |
收藏
|
Hacking Dream - www.hackingdream.net
machine
extensive
industries
evolving
artificial
Future of Generative AI and The Dark Side of Advanced AI Systems
Advanced AI systems have revolutionized various industries and aspects of our lives. However, as th...
2024-2-9 14:0:0 | 阅读: 19 |
收藏
|
Hacking Dream - www.hackingdream.net
industries
chatgpt
creative
society
Exploring the Future of Technology: The Rabbit R1 AI Assistant
The pace of digital innovation continues to accelerate, bringing to the forefront groundbreaking te...
2024-2-9 01:50:0 | 阅读: 17 |
收藏
|
Hacking Dream - www.hackingdream.net
rabbit
security
innovative
versatility
healthcare
Pentesting Domain Controllers Cheatsheet
DNSdig srv domaim.com @DC_IP#Query ldap servicedig +short srv _ldap._tcp.dc._msdcs.dc.domain.co...
2024-2-6 20:24:0 | 阅读: 16 |
收藏
|
Hacking Dream - www.hackingdream.net
auxiliary
dcerpc
ldapsearch
mcs
Web Penetration Testing with Curl Cheatsheet
In lot of scenarios, we usually don't have access to GUI access to web applications but in most of...
2024-2-6 13:30:0 | 阅读: 21 |
收藏
|
Hacking Dream - www.hackingdream.net
kl
faultactor
rpcrouter
php
digest
MSSQL Penetration Testing Using Python
Installation curl https://packages.microsoft.com/keys/microsoft.asc | sudo tee /etc/apt/trusted.gpg...
2024-2-5 23:5:0 | 阅读: 18 |
收藏
|
Hacking Dream - www.hackingdream.net
microsoft
odbc
msodbcsql18
library
lib64
Running your first Local LLM Model like ChatGPT without Coding
In the fast-paced world of artificial intelligence and machine learning, local LLM (Large Language...
2024-2-1 23:1:0 | 阅读: 17 |
收藏
|
Hacking Dream - www.hackingdream.net
llm
gpt
mistral
ollama
windows
Best Practices for Secure Coding: Writing Hack-Proof Applications
In the digital age, where cyber threats are becoming more sophisticated, the importance of secure c...
2024-2-1 14:0:0 | 阅读: 13 |
收藏
|
Hacking Dream - www.hackingdream.net
security
development
encryption
developers
Cybersecurity Trends 2024: What Experts Predict
As we approach 2024, the landscape of cybersecurity is evolving rapidly, influenced by both emergin...
2024-2-1 02:22:0 | 阅读: 17 |
收藏
|
Hacking Dream - www.hackingdream.net
security
threats
emerging
ensuring
Navigating the Threat Landscape: A Guide to Internet Viruses
In the digital era, the internet has become a pivotal part of our daily lives, serving as a gateway...
2024-1-30 22:19:0 | 阅读: 15 |
收藏
|
Hacking Dream - www.hackingdream.net
threats
viruses
software
malicious
Previous
3
4
5
6
7
8
9
10
Next