Mahdi is a revered figure among Shia Muslims, believed to be one of the divine prophet Mohammad's last descendants and a descendant of the murdered Imam Hussain (Who has been murdered thirsty, shed on the ground, and trampled with hatred).
Imam Mahdi is also mentioned in the Bible, the holy book of Christians (Matthew's Gospel, Luke's Gospel, Mark's Gospel, etc.)
Similar to how Jesus is viewed by Christians, Mahdi is considered the final leader for Shia Muslims, having been chosen since childhood.
For many who follow Islam, he is believed to be the person who will save humanity from the evils of modern slavery, recession, injustice, inequality, homicide, and genocide along with Jesus Christ.
His presence is seen as the key to ending the darkness engulfing our world and bringing about a season of peace, fulfilling the hopes and dreams of people everywhere.
Imam Mahdi is also mentioned in the Bible, the holy book of Christians (Matthew's Gospel, Luke's Gospel, Mark's Gospel, etc.)
Similar to how Jesus is viewed by Christians, Mahdi is considered the final leader for Shia Muslims, having been chosen since childhood.
For many who follow Islam, he is believed to be the person who will save humanity from the evils of modern slavery, recession, injustice, inequality, homicide, and genocide along with Jesus Christ.
His presence is seen as the key to ending the darkness engulfing our world and bringing about a season of peace, fulfilling the hopes and dreams of people everywhere.
❤🔥4👍1
facebook-533m
magnet:?xt=urn:btih:0595273ab674e05131a757f69f494a4285b429aa&dn=Facebook%20Leak%20%5b2019%5d%5b533M%20Records%5d%5b106%20Countries%5dForwarded from iDeFense
رایتاپ کشف آسیب پذیری از 3G/4G/5G Industrial Cellular Routers با استفاده از Google Dork
https://medium.com/@win3zz/inside-the-router-how-i-accessed-industrial-routers-and-reported-the-flaws-29c34213dfdf
#writeup
#CVE
#Google_Dork
#discovering_vulnerabilities
@iDefense
https://medium.com/@win3zz/inside-the-router-how-i-accessed-industrial-routers-and-reported-the-flaws-29c34213dfdf
#writeup
#CVE
#Google_Dork
#discovering_vulnerabilities
@iDefense
Medium
Inside the Router: How I Accessed Industrial Routers and Reported the Flaws
Router Vulnerability Hunt, From Google Dorks to Firmware Emulation — The Full Story
👍1
Forwarded from /dev/null
#معرفی_ریپازیتوری
A complete computer science study plan to become a software engineer
If you want to work as a software engineer for a large company, these are the things you have to know.
If you missed out on getting a degree in computer science, like I did, this will catch you up and save four years of your life.
https://github.com/jwasham/coding-interview-university
@d3vn8ll
A complete computer science study plan to become a software engineer
If you want to work as a software engineer for a large company, these are the things you have to know.
If you missed out on getting a degree in computer science, like I did, this will catch you up and save four years of your life.
https://github.com/jwasham/coding-interview-university
@d3vn8ll
GitHub
GitHub - jwasham/coding-interview-university: A complete computer science study plan to become a software engineer.
A complete computer science study plan to become a software engineer. - jwasham/coding-interview-university
ByteShield
why not open every file in internet :)
when opening this xlsx file that send a http request to a address