Cyber0жff666 λ
115 subscribers
167 photos
209 files
522 links
Cyber intelligence corporation.

C, C++, Assembly, UNIX, Malwares, Ransomwares, Information Security, Networks and Anonymity

new group link in: @intell666
Download Telegram
📓 Introduction to Forensic and Criminal Psychology.

• Some of the helpful features introduced in the chapters are ‘Key Concepts’, ‘Forensic Psychology in Action’, and ‘Controversies’, which encourage a deeper understanding of the subject. The Overview section at the beginning of each chapter and the comprehensive list of figures and diagrams further support your learning experience on the extensive research data and theory developed.

Download

~ λ Temple of knowledge 0xff666

#Eng #Forensic #Psychology
1
Forwarded from .
all_gitlab_repos.txt
7.7 MB
148k git repo's on exposed gitlab instances

@DataLeak
DiffusionInst: Diffusion Model for Instance Segmentation

* DiffusionInst is the first work of diffusion model for instance segmentation

Github:
https://github.com/chenhaoxing/DiffusionInst

Paper:
https://arxiv.org/abs/2212.02773v2

Getting started:
https://github.com/chenhaoxing/DiffusionInst/blob/main/GETTING_STARTED.md

Dataset:
https://paperswithcode.com/dataset/lvis
​​APT_REPORT

Interesting apt report & sample & malware & technology & intellegence collection

https://github.com/blackorbird/APT_REPORT
Open Secrets
Ukraine and the Next Intelligence Revolution

https://www.foreignaffairs.com/world/open-secrets-ukraine-intelligence-revolution-amy-zegart
Russia’s invasion of Ukraine has been a watershed moment for the world of intelligence. For weeks before the shelling began, Washington publicly released a relentless stream of remarkably detailed findings about everything from Russian troop movements to false-flag attacks the Kremlin would use to justify the invasion.
👍1
Steganography Toolkit.

This project is a Docker image useful for solving Steganography challenges as those you can find at CTF platforms like hackthebox.eu. The image comes pre-installed with many popular tools (see list below) and several screening scripts you can use check simple things (for instance, run check_jpg.sh image.jpg to get a report for a JPG file).

https://github.com/DominicBreuker/stego-toolkit/blob/master/README.md

#infosec #red_team #hack
HENlo-master.zip
19 KB
WebKit+Kernel #exploit chain for all PS Vita firmwares
@PakiGolosoBix_bot - GREAT BOT FOR CATFISHING, HAS FEMALE VOICE MESSAGES, PHOTO PACKS, ETC

https://t.iss.one/+9gjk5NukuIQwZTY5 - (NOT AD) CHANNEL FOR CATFISHING, HAS FEMALE CIRCLES AND VOICE MESSAGES.
China's Navy Intelligence Doc.pdf
3.5 MB
Recognition & ID Guide for China's PLA NAVY, Coast Guard & Maritime Forces
file sharing search engine
It works on the basis of Google and searches for fifteen resources.
It is acceptable to use search operators.

https://cse.google.com/cse?cx=f466f6ea4886845d1