Forwarded from SecCode (Meisam Monsef)
پیش فروش کتاب تست نفوذ اپلیکیشن های اندروید
نویسنده : میثم منصف
تعداد صفحه : 447
قیمت کتاب : دقیق مشخص نیست
دوستانی که تمایل به خرید کتاب دارند میتواند مبلغ ۲۵۰ هزار تومان ( به عنوان پیش پرداخت ) واریز کنند برای دریافت شماره کارت و ارسال اسکرین واریزی به ایدی @AlirezaNourkazemi پیام بدهید.
یک برنامه خواهیم داشت در یکی از کافه های تهران که هماهنگ میکنیم دوستان میتواند بصورت حضوری تشریف بیارند کتاب را تحویل بگیرند و همچنین میتوانید یک مشاوره حضوری در زمینه تست نفوذ وب و موبایل بصورت رایگان داشته باشند
@SecCode
نویسنده : میثم منصف
تعداد صفحه : 447
قیمت کتاب : دقیق مشخص نیست
دوستانی که تمایل به خرید کتاب دارند میتواند مبلغ ۲۵۰ هزار تومان ( به عنوان پیش پرداخت ) واریز کنند برای دریافت شماره کارت و ارسال اسکرین واریزی به ایدی @AlirezaNourkazemi پیام بدهید.
یک برنامه خواهیم داشت در یکی از کافه های تهران که هماهنگ میکنیم دوستان میتواند بصورت حضوری تشریف بیارند کتاب را تحویل بگیرند و همچنین میتوانید یک مشاوره حضوری در زمینه تست نفوذ وب و موبایل بصورت رایگان داشته باشند
@SecCode
magnet:?xt=urn:btih:2df266c276cb8581b47afa091cfce1bdad7c2e99&xt=urn:btmh:12201107555fe207323098968f281f4c795f0cb180d4af6f813465546165a9670aba&dn=Samsung&tr=udp%3a%2f%2fpublic.popcorn-tracker.org%3a6969%2fannounce&tr=http%3a%2f%2f104.28.1.30%3a8080%2fannounce&tr=http%3a%2f%2f104.28.16.69%2fannounce&tr=udp%3a%2f%2f107.150.14.110%3a6969%2fannounce&tr=udp%3a%2f%2f109.121.134.121%3a1337%2fannounce&tr=udp%3a%2f%2f114.55.113.60%3a6969%2fannounce&tr=http%3a%2f%2f125.227.35.196%3a6969%2fannounce&tr=udp%3a%2f%2f128.199.70.66%3a5944%2fannounce&tr=http%3a%2f%2f157.7.202.64%3a8080%2fannounce&tr=http%3a%2f%2f158.69.146.212%3a7777%2fannounce&tr=http%3a%2f%2f173.254.204.71%3a1096%2fannounce&tr=http%3a%2f%2f178.175.143.27%2fannounce&tr=udp%3a%2f%2f178.33.73.26%3a2710%2fannounce&tr=udp%3a%2f%2f182.176.139.129%3a6969%2fannounce&tr=udp%3a%2f%2f185.5.97.139%3a8089%2fannounce&tr=udp%3a%2f%2f188.165.253.109%3a1337%2fannounce&tr=udp%3a%2f%2f194.106.216.222%3a80%2fannounce&tr=udp%3a%2f%2f195.123.209.37%3a1337%2fannounce&tr=http%3a%2f%2f210.244.71.25%3a6969%2fannounce&tr=http%3a%2f%2f210.244.71.26%3a6969%2fannounce&tr=http%3a%2f%2f213.159.215.198%3a6970%2fannounce&tr=udp%3a%2f%2f213.163.67.56%3a1337%2fannounce&tr=http%3a%2f%2f37.19.5.139%3a6969%2fannounce&tr=udp%3a%2f%2f37.19.5.155%3a2710%2fannounce&tr=udp%3a%2f%2f46.4.109.148%3a6969%2fannounce&tr=udp%3a%2f%2f5.79.249.77%3a6969%2fannounce&tr=udp%3a%2f%2f5.79.83.193%3a6969%2fannounce&tr=udp%3a%2f%2f51.254.244.161%3a6969%2fannounce&tr=http%3a%2f%2f59.36.96.77%3a6969%2fannounce&tr=udp%3a%2f%2f74.82.52.209%3a6969%2fannounce&tr=http%3a%2f%2f80.246.243.18%3a6969%2fannounce&tr=http%3a%2f%2f81.200.2.231%2fannounce&tr=udp%3a%2f%2f85.17.19.180%3a80%2fannounce&tr=http%3a%2f%2f87.248.186.252%3a8080%2fannounce&tr=http%3a%2f%2f87.253.152.137%2fannounce&tr=http%3a%2f%2f91.216.110.47%2fannounce&tr=http%3a%2f%2f91.217.91.21%3a3218%2fannounce&tr=udp%3a%2f%2f91.218.230.81%3a6969%2fannounce&tr=http%3a%2f%2f93.92.64.5%2fannounce&tr=http%3a%2f%2fatrack.pow7.com%2fannounce&tr=http%3a%2f%2fbt.henbt.com%3a2710%2fannounce&tr=http%3a%2f%2fbt.pusacg.org%3a8080%2fannounce&tr=http%3a%2f%2fbt2.careland.com.cn%3a6969%2fannounce&tr=udp%3a%2f%2fexplodie.org%3a6969%2fannounce&tr=udp%3a%2f%2fmgtracker.org%3a2710%2fannounce&tr=http%3a%2f%2fmgtracker.org%3a6969%2fannounce&tr=http%3a%2f%2fopen.acgtracker.com%3a1096%2fannounce&tr=http%3a%2f%2fopen.lolicon.eu%3a7777%2fannounce&tr=http%3a%2f%2fopen.touki.ru%2fannounce.php&tr=http%3a%2f%2fp4p.arenabg.ch%3a1337%2fannounce&tr=udp%3a%2f%2fp4p.arenabg.com%3a1337%2fannounce&tr=http%3a%2f%2fpow7.com%3a80%2fannounce&tr=http%3a%2f%2fretracker.gorcomnet.ru%2fannounce&tr=http%3a%2f%2fretracker.krs-ix.ru%2fannounce&tr=http%3a%2f%2fretracker.krs-ix.ru%3a80%2fannounce&tr=http%3a%2f%2fsecure.pow7.com%2fannounce&tr=http%3a%2f%2ft1.pow7.com%2fannounce&tr=http%3a%2f%2ft2.pow7.com%2fannounce&tr=http%3a%2f%2fthetracker.org%3a80%2fannounce&tr=udp%3a%2f%2ftorrent.gresille.org%3a80%2fannounce&tr=http%3a%2f%2ftorrentsmd.com%3a8080%2fannounce&tr=udp%3a%2f%2ftracker.aletorrenty.pl%3a2710%2fannounce&tr=http%3a%2f%2ftracker.baravik.org%3a6970%2fannounce&tr=udp%3a%2f%2ftracker.bittor.pw%3a1337%2fannounce&tr=http%3a%2f%2ftracker.bittorrent.am%2fannounce&tr=http%3a%2f%2ftracker.calculate.ru%3a6969%2fannounce&tr=http%3a%2f%2ftracker.dler.org%3a6969%2fannounce&tr=http%3a%2f%2ftracker.dutchtracking.com%2fannounce&tr=http%3a%2f%2ftracker.dutchtracking.com%3a80%2fannounce&tr=http%3a%2f%2ftracker.
Samsung
Source code, internal and confidential documentation, bootloaders.
Size: 189GB
Samsung
Source code, internal and confidential documentation, bootloaders.
Size: 189GB
❤1
Raidforums
Size: 818.28.GB
magnet:?xt=urn:btih:9bb80eaa0c2d384013784a8e2117d235e2de1073&dn=Database+Leaks&tr=udp://tracker.openbittorrent.com:80&tr=
udp://open.demonii.com:1337&tr=udp://tracker.coppersurfer.tk:6969&tr=udp://tracker.opentrackr.org:1337/announce
Size: 818.28.GB
magnet:?xt=urn:btih:9bb80eaa0c2d384013784a8e2117d235e2de1073&dn=Database+Leaks&tr=udp://tracker.openbittorrent.com:80&tr=
udp://open.demonii.com:1337&tr=udp://tracker.coppersurfer.tk:6969&tr=udp://tracker.opentrackr.org:1337/announce
https://www.linkedin.com/posts/kousha-zanjani_github-kousha1999web-penetration-testing-course-activity-7195771761899032576-R5cj
https://github.com/kousha1999/Web-Penetration-Testing-Course
https://github.com/kousha1999/Web-Penetration-Testing-Course
Linkedin
GitHub - kousha1999/Web-Penetration-Testing-Course: Web Penetration Testing Course Materials | Kousha Zanjani | 14 comments
After four rewarding years, it's time to temporarily conclude the Web Penetration Testing Course. It has been an honor to serve as an instructor, dedicating over 1000 hours to educate more than 500 students. Throughout the years, the course has undergone…
👍2
Forwarded from کانال بایت امن
🖥 دانلود رایگان دوره دوم مهندسی معکوس نرم افزار | آکادمی DWORD
⭕️ در حال حاضر آخرین نگارش دوره مهندسی معکوس نرم افزار ، نگارش پنجم میباشد که بیش از 70 ساعت تدریس شده و سرفصلها تماما بروزرسانی گردیده.
سال برگزاری دوره دوم : 2021
مدت زمان : 41 ساعت
حجم : 8G
برگزار کننده : آکادمی DWORD - یاشار محمودنیا
🔽 دانلود سرفصل ها | دانلود لینک های دوره
🦅 کانال بایت امن | گروه بایت امن
_
⭕️ در حال حاضر آخرین نگارش دوره مهندسی معکوس نرم افزار ، نگارش پنجم میباشد که بیش از 70 ساعت تدریس شده و سرفصلها تماما بروزرسانی گردیده.
سال برگزاری دوره دوم : 2021
مدت زمان : 41 ساعت
حجم : 8G
برگزار کننده : آکادمی DWORD - یاشار محمودنیا
_
Please open Telegram to view this post
VIEW IN TELEGRAM
👍4👎1
• NTFS Files Attributes;
• FuncIn;
• Code Cave;
• Stolen Certificate;
• Redirect Antivirus Website Evading Techniques;
• Shortcut Hiding;
• Disabling Antivirus;
• Adding Antivirus Exception;
• Fake Signature;
• Mark-Of-The-Web (MOTW) Bypass;
• Return Address Spoofing;
• Runtime Function Decryption;
• DLL Unhooking;
- How DLL Unhooking Works;
- Unhooking Strategies;
• Evasion Using Direct Syscalls;
- Key Aspects of This Technique;
- Operational Mechanism;
- Featured Windows APIs;
• Unloading Module With FreeLibrary;
- Operational Overview;
- Key Aspects of This Technique;
- Featured Windows APIs;
• References.
• FuncIn;
• Code Cave;
• Stolen Certificate;
• Redirect Antivirus Website Evading Techniques;
• Shortcut Hiding;
• Disabling Antivirus;
• Adding Antivirus Exception;
• Fake Signature;
• Mark-Of-The-Web (MOTW) Bypass;
• Return Address Spoofing;
• Runtime Function Decryption;
• DLL Unhooking;
- How DLL Unhooking Works;
- Unhooking Strategies;
• Evasion Using Direct Syscalls;
- Key Aspects of This Technique;
- Operational Mechanism;
- Featured Windows APIs;
• Unloading Module With FreeLibrary;
- Operational Overview;
- Key Aspects of This Technique;
- Featured Windows APIs;
• References.
ExpiredDomains.com
redteamrecipe.com is for sale! Check it out on ExpiredDomains.com
Buy redteamrecipe.com for 195 on GoDaddy via ExpiredDomains.com. This premium expired .com domain is ideal for establishing a strong online identity.
👍1
Reverse Engineering with Ghidra
https://voidstarsec.com/ghidra.html#:~:text=Introduction%20to%20Reverse%20Engineering%20with%20Ghidra
https://voidstarsec.com/ghidra.html#:~:text=Introduction%20to%20Reverse%20Engineering%20with%20Ghidra
Keylogging in the Windows kernel with undocumented data structures
https://eversinc33.com/posts/kernel-mode-keylogging/
#malware
https://eversinc33.com/posts/kernel-mode-keylogging/
#malware
ByteShield pinned «https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md?s=35 https://t.iss.one/BinaryWorldd»
Creating a Rootkit to Learn C
https://h0mbre.github.io/Learn-C-By-Creating-A-Rootkit/
https://h0mbre.github.io/Learn-C-By-Creating-A-Rootkit/
The Human Machine Interface
Creating a Rootkit to Learn C
Background Information This post is my solution for the last assignment in my Learning-C repository. I thought a good way to cap off a repo designed to introduce people to very basic C programming would be to take those very basic techinques and make a simple…
👍3