SecWiki周刊(第537期)
2024/06/10-2024/06/16
安全资讯
安全技术
F5 Shape最新版逆向分析-加解密和补环境
https://mp.weixin.qq.com/s/-Qhxz_LD7XEEBESNStKr0A
https://mp.weixin.qq.com/s/-Qhxz_LD7XEEBESNStKr0A
大模型语音模式越狱攻击 (Jailbreak Attack)
https://mp.weixin.qq.com/s/XD2e6gH4B2amJhnjd5ytGg
https://mp.weixin.qq.com/s/XD2e6gH4B2amJhnjd5ytGg
App渗透 - 从SQL注入到人脸识别登录绕过
https://xz.aliyun.com/t/8308
https://xz.aliyun.com/t/8308
ScopeSentry-资产测绘、信息收集、漏洞扫描工具
https://github.com/Autumn-27/ScopeSentry
https://github.com/Autumn-27/ScopeSentry
AI在自动化攻击模拟与规则检测的前沿探索
https://mp.weixin.qq.com/s/0T9DFTqLA95McgVeLS14rg
https://mp.weixin.qq.com/s/0T9DFTqLA95McgVeLS14rg
智能化网络漏洞挖掘系统Mayhem概览
https://mp.weixin.qq.com/s/tvRIuFd-DAUi7fxf4dFpZw
https://mp.weixin.qq.com/s/tvRIuFd-DAUi7fxf4dFpZw
自动识别CVE受影响的版本与补丁和开发人员日志
https://mp.weixin.qq.com/s/_XMs1tNE65TTkXZdEfyXzA
https://mp.weixin.qq.com/s/_XMs1tNE65TTkXZdEfyXzA
将xz后门隐藏技术为我所用
https://mp.weixin.qq.com/s/cAOf2PhQThtzNpaJaMGB8g
https://mp.weixin.qq.com/s/cAOf2PhQThtzNpaJaMGB8g
CISA网络安全事件应急手册
https://mp.weixin.qq.com/s/UJALYnYS6YeZZD3hTF5ONQ
https://mp.weixin.qq.com/s/UJALYnYS6YeZZD3hTF5ONQ
iMessage通信加密协议安全性分析
https://mp.weixin.qq.com/s/JqSz0qCqu43VKWK08z7RTA
https://mp.weixin.qq.com/s/JqSz0qCqu43VKWK08z7RTA
代码分类深度学习模型的鲁棒解释
https://mp.weixin.qq.com/s/KITfS6IU2kyblVCvAfYuDg
https://mp.weixin.qq.com/s/KITfS6IU2kyblVCvAfYuDg
DE-GNN:基于图神经网络的双嵌入细粒度加密流量分类
https://mp.weixin.qq.com/s/e3M4uxYj2bG6Z48-jKVujg
https://mp.weixin.qq.com/s/e3M4uxYj2bG6Z48-jKVujg
通过稳健的流量表征颠覆网站指纹防御
https://mp.weixin.qq.com/s/UHk3CNOLlPGXG60ZI1lRwQ
https://mp.weixin.qq.com/s/UHk3CNOLlPGXG60ZI1lRwQ
SecWiki周刊(第536期)
https://www.sec-wiki.com/weekly/536
https://www.sec-wiki.com/weekly/536
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第537期)
