Aggregator
近100万台存在高危漏洞的 Fortinet、SonicWall 设备正暴露在公开网络中
SDC2024 议题回顾 | 从硬件钱包到TrustZone:Web3密钥托管的安全挑战与解决方案
BlockFramework —— 客户端模块化业务开发框架
Extract VMK of BitLocker volume with TPMAndPIN protector and knowing PIN
Extract VMK of BitLocker volume with TPMAndPIN protector and knowing PIN Technic to extract VMK from the bitlocker volume that TPM protects are already documented in different publications. This GitHub repo gives a toolset...
The post Extract VMK of BitLocker volume with TPMAndPIN protector and knowing PIN appeared first on Penetration Testing Tools.
CVE-2016-1814 | Apple Mac OS X up to 10.11.4 IOAcceleratorFamily null pointer dereference (HT206567 / Nessus ID 91311)
eaphammer: evil twin attacks against WPA2-Enterprise networks
EAPHammer EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. It is designed to be used in full scope wireless assessments and red team engagements. As such, the focus is...
The post eaphammer: evil twin attacks against WPA2-Enterprise networks appeared first on Penetration Testing Tools.
slack watchman: Monitoring you Slack workspaces for sensitive information
Slack Watchman Slack Watchman is an application that uses the Slack API to look for potentially sensitive data exposed in your Slack workspaces. Features It searches for, and reports back on: Externally shared...
The post slack watchman: Monitoring you Slack workspaces for sensitive information appeared first on Penetration Testing Tools.