高贵的灵魂是自己尊敬自己
Shiro-550 Shiro-550
Shiro-5500x1 前言Shiro攻击payload经过AES加密,很多防护设备无法识别/拦截攻击 0x2 环境搭建git clone https://github.com/apache/shiro.git cd shiro gi
EvilModel:Hiding Malware Inside of Neural Network Models EvilModel:Hiding Malware Inside of Neural Network Models
EvilModel:Hiding Malware Inside of Neural Network Models摘要本文提出了一种通过神经网络模型秘密地传递恶意软件的新方法。神经网络模型解释能力差,泛化能力好。通过在神经元中潜入恶意软件,可
2022-10-07
Web Cache Deception Escalates Web Cache Deception Escalates
Web Cache Deception Escalatesweb Cache攻击前置知识: https://websec.readthedocs.io/zh/latest/vuln/webcache.html 这种攻击类似于RPO(Rela
2022-10-07
HTB-OpenSource HTB-OpenSource
HTB-OpenSourceIP: 10.10.11.164 fscan, kscan扫描,开放80和22端口 nmap -sC -sV -p- -oA openssource 10.10.11.164 Starting Nmap 7.9
2022-10-07
2 / 2