-
Hi!
Thanks for the nice work.
I want to use the three approaches used here for comparison in my own pipeline.
What I do is that
1. Train a model on my poisoned data.
2. Evaluate the feature s…
-
Can you change or customise the use between masscan and nmap
something like:
https://github.com/zan8in/masscan
-
```
http://code.google.com/intl/fi-FI/projecthosting/policy.html
You are violating code.google.com service policy by hosting malicious products.
Please remove this project from code.google.com.
I h…
-
## NixOS for Pentesting
This represents an effort to bring Security and Forensics software to NixOS, so that it can become a viable alternative to projects like Kali Linux and BlackArch.
Expect up…
-
Current Item Text
10.2.3: "Verify that the application source code and third party libraries do not contain back doors, such as hard-coded or additional undocumented accounts or keys, code obfuscat…
-
The snort rules: /etc/snort/rules are circa 2015
**websnort** does not indicate how 'old' the snort rules are that a user is relying on for detection, I realize you do not develop this tool, etc. s…
-
# 每日安全资讯(2024-02-17)
- HackerOne Hacker Activity
- [Multiple Open Redirect on TikTok domains](https://hackerone.com/reports/2221547)
- [HackerOne SAML signup domain enforcement bypass results in …
-
## Type of Issue
New feature.
## Description
While working on creating one exception for FP (#1583), the discussion there turned into getting a more holistic approach for monitoring agents.
…
fzipi updated
4 years ago
-
# 每日安全资讯(2023-04-05)
- SAP Blogs
- [ ] [SAP Billing and Revenue Innovation Management and Utilities – Case 1: Maintenance contract using rating](https://blogs.sap.com/2023/04/04/sap-billing-and-rev…
Tyaoo updated
2 months ago
-
### Description
In light of the recent supply chain attack in xz/lzma, leading to a backdoor in openSSH (https://www.openwall.com/lists/oss-security/2024/03/29/4), I believe that it would be a good…
danog updated
7 months ago