New surprises in AD CS... Let's add the ESC11 technique🙈
New surprises in AD CS... Let's add the ESC11 technique🙈
Report: Cobalt Strike. Tactics of modern threats
What is TTL?
• TTL (Time To Live) is a special indicator in the header of an IP packet that determines the lifetime of the packet. It is needed to prevent loops in the network (So that the packet does not run in a circle, from one router to another).
Human Benchmark - a test of our performance
Performance test, benchmark is a control task necessary to determine the comparative performance characteristics of a computer system. And HumanBenchmark is a human benchmark that includes checking the reaction speed and your memory.
Asteroids
Asteroids is a free operating system for smartwatches from various manufacturers, based on OpenEmbedded, libhybris and Qt5.
Inure
Inure is an application package manager for Android, regardless of whether they are installed or not.
It can scan the internal components of any application and modify them on the go. It also includes a beautiful terminal emulator, usage statistics, Split/APK installer and various other tools, and many of them are also waiting to be implemented.
Pinecone
Pynecone is a full-stack Python environment that simplifies the creation and deployment of web applications in minutes.
Penpot
Penpot is a platform for designing the design of graphical interfaces of programs and websites.
InstructPix2Pix
A method of editing already created images taking into account the user's text hint using AI
Extrapolate
Extrapolate is an application that allows you to see how you age by transforming your face with the help of artificial intelligence. Freely and confidentially.
🌐 Fake Wi-Fi access points.
It is necessary to note one more risk factor (and for some, an opportunity) when using Wi-Fi technologies: fake access points. Attacks of this type have been carried out for about 15 years (the first known case was the use of a tool called "Jasager" in 2008), and are very simple: firstly, it is not difficult to develop a tool for such an attack on your own, and secondly, a number of relevant devices are available for sale (for example, Wi-Fi Pineapple).