['404.pdf', '从现实世界到CTF的智能合约攻防.pdf', '你好,捕鱼人.pdf', '实战中内网穿透的打法.pdf', '渗透Webpack等站点,从此更加优雅.pdf', '红蓝对抗中的SSRF深入利用实战.pdf']
['12 Ways to Hack MFA.pdf', '4G to 5G Evolution:In-Depth Security Perspective.pdf', '99 Security Tools and You Still Got Breached%3F.pdf', 'A Cloud Security Architecture Workshop.pdf', 'Accelerate and Simplify Incident Response with Security Automation.pdf', 'Achieving Operational Security Excellence in Connected IoT Solutions.pdf', 'AI and Machine Learning:Managing the Risks of Major Lawsuits.pdf', 'AI:Hacking Without Humans How Can Human Brains Be Hacked%3F.pdf', 'Are Spoof-Proof Biometrics Really Possible%3F.pdf', 'ATT&CK in Practice A Primer to Improve Your Cyber Defense.pdf', 'Attack Vectors in Orbit:The Need for IoT and Satellite Security.pdf', 'Automated Fault Analysis of Block Cipher Implementations.pdf', 'Automatic Search for A Variant of Division Property Using Three Subsets.pdf', 'Automation vs Human Eyes:Optimizing Human Intuition for Success.pdf', 'Aviation Cybersecurity:Keeping the Wings On.pdf', 'Awareness at Scale:Creating Risk-Aware Cultures in Big Companies.pdf', 'Barney Fife Metrics:The Bullet That we Have but Don’t Use, and Why.pdf', 'Better Securing the Now and the Next:Applying Engineering First Principles to Achieve Demonstrably Better Cybersecurity.pdf', 'Bitcoin Por Favor:Cybercriminal Usage of Cryptocurrency in Latin America.pdf', 'Blockchain Anchored Swap Meet —a mock trial.pdf', 'Blockchain Augmentation of the Trusted Supply Chain.pdf', 'Blockchain Based Digital Identity:Exploring the messy space between promise and reality.pdf', 'Blockchainification of Cyber Supply Chain Risk:Hype vs. Hope.pdf', 'Building a Defensible Cyberspace(Paper).pdf', 'Building a Leading Cloud Security Program.pdf', 'Building Identity for an Open Perimeter.pdf', 'Changing the World with the UK’s Code of Practice for Consumer IoT Security.pdf', 'Cheaper by the dozen:application security on a limited budget.pdf', 'Combatting the Scourge of Fileless Attacks.pdf', 'Container Security at the Speed of CI\uf022CD.pdf', 'Cryptocurrency Hacking and the Legal Climate for Bl
2022-01-04 12:00:07 566.71MB 开发安全 零信任 红蓝对抗 物联网安全
业务安全红蓝对抗的思考与实践.pdf 中小互联网企业业务安全建设实践.pdf 从0-1的企业安全建设之路.pdf 搭建切合实战的风控分析体系.pdf
2022-01-03 09:00:12 42.56MB 红蓝对抗 企业安全 业务安全 安全建设
蓝壳 BlueShell是一个Go语言编写的持续远程控制工具,拿下靶机后,根据操作系统版本下载部署对应的bsClient,其会每隔固定时间向指定的C&C地址发起反弹连接尝试,在C&C端运行bsServer即可连接bsClient,从而实现对靶机的持续控制,主要适用场景: 红蓝对抗中的持久化后门或内网代理 社工钓鱼二次加载 目前支持的主要功能有: 循环持续控制 跨平台,支持Linux,Windows,MacOS 交互式Shell反弹,Linux支持Tab补全,VIM,Ctrl + C等交互操作,Windows只支持普通反弹Shell 袜子5代理反弹 文件上传,下载 TLS通信加密 项目地址:
2021-11-28 13:42:22 15KB shell socks pentest blueteam
1
攻防演习五点演变 攻防演习四点成绩 演习防守九个关键举措
2021-11-23 09:00:08 20.15MB 演习防守 HW 红蓝对抗 安全保障
「数据分析」红蓝对抗的思考 - web安全 安全资讯 安全研究 系统安全 安全管理 数据安全
2021-11-12 18:00:12 2.38MB 安全开发 安全建设 安全防护 swift
非传统型社交网络安全 移动安全 威胁情报 数据安全 AI 身份与访问管理
2021-09-12 09:00:10 3.84MB 红蓝对抗 漏洞分析 零信任 培训与认证
看一看XSS_原来像梦一场 安全众测 威胁情报 数据分析 威胁情报 企业安全
2021-09-11 21:00:20 6.85MB 安全威胁 数据安全 红蓝对抗 安全架构
网络安全回归以人为本 系统安全 安全管理 威胁情报 AI 安全运维