-
### Prerequisites
- [X] I verified that this is not a filter list issue. Report any issues with filter lists or broken website functionality in the [uAssets issue tracker](https://github.com/uBlockOr…
-
This working group has produced a ton of useful information about how best to build a secure package repository, along with data on what repositories are currently doing. Can we crystallize this into …
-
As part of the [Macaron](https://github.com/oracle/macaron) package, we have identified several malicious Python packages in your records that have been incorrectly attributed to ReversingLabs as the …
-
In file: https://raw.githubusercontent.com/RPiList/specials/refs/heads/master/Blocklisten/malware
Please remove domain `www2.internet2.edu^` . [Internet2](https://en.wikipedia.org/wiki/Internet2) i…
-
I took some time today to try and locate some techniques within the nursery being used in the wild, and relevant writeups to reference as well. I cannot guarantee they are all the most stellar example…
ghost updated
3 years ago
-
# 安全集锦
1. [Nexphisher - Advanced Phishing Toolkit With 30 Built In Templates — SkyNet Tools](https://skynettools.com/nexphisher-advanced-phishing-toolkit-with-30-built-in-templates/)
-
This would like involve abstracting InformationSource data to a top-level construct and leveraged where appropriate.
Below is from Byron Collie:
We are not leaving Source as a technical attribute in …
-
### **Title: Find and Integration of Online Database for Virus/Malicious Hashes**
**Description:**
This ticket involves researching and finding a comprehensive online virus/malicious hash database to…
-
Under the advanced threat method, we suggest an approach:
* **In-Depth Analysis** - If malware is discovered, but cannot be identified, further analysis will be necessary. This may also trigger a c…
-
I saw this program being offered as an alternative to an older program that's not being maintained anymore < https://github.com/WindowsLies/BlockWindows/issues/44 >, however unlike BlockWindows this d…