
About ICMP-TransferTools
AboutICMP-TransferToolsICMP-TransferToolsisapowerfulfiletransfertoolthatcanhelpresearcher...
About Get-AppLockerEventlog
AboutGet-AppLockerEventlogGet-AppLockerEventlogisapowerfulAppLockereventlogextractiontool....
About COM-Hunter
AboutCOM-HunterCOM-HunterisasecuritydetectiontoolforpersistentCOMhijackingvulnerabilities...
About AV|Ator
AboutAV|AtorAV|AtorisapowerfulAVdetectionbypasstool.Essentially,thistoolisabackdoorge...

A04. System access permission configuration
PrefaceThisarticlewillSystemaccesspermissionconfiguration,operationpermissionsforoperation...

A. What is CIS?
A.WhatisCIS? CISisacommunity-drivennon-profitorganizationresponsibleformana...

A weak password in a certain middleware manufacturer led to RDP risks for enterprises
PrefaceRecently,theauthorpublishedanarticletitled'700governmentandenterpriseofficesystem...
A slap in the face, the data leakage of the International Internet Society
ThepersonalinformationoftensofthousandsofISOCmemberswasexposedontheInternetduetocon...
![A simple summary of Linux privilege escalation [Chinese]](https://www.hackeref.com/zb_users/cache/thumbs/3715e662613b3b154d868cbfaf3ad125-240-160-1.jpg)
A simple summary of Linux privilege escalation [Chinese]
PrefaceFirst,understandthepreviouspredecessors'previoussolidfactsudfprivilegeescalationClas...

A simple example of bypassing frida anti-debugging
Asimpleexampleofbypassingfridaanti-debuggingIntroductionRecently,whenanalyzinganapp,Ienc...