برنامه جدید CISA برای پایش زیرساختهای IT/OT آمریکا تحت عنوان CyberSentry
CyberSentry is a CISA-managed threat detection and monitoring capability, governed by an agreement between CISA and voluntarily-participating critical infrastructure partners who operate significant systems supporting NCFs.
https://www.cisa.gov/resources-tools/programs/cybersentry-program
@Engineer_Computer
CyberSentry is a CISA-managed threat detection and monitoring capability, governed by an agreement between CISA and voluntarily-participating critical infrastructure partners who operate significant systems supporting NCFs.
https://www.cisa.gov/resources-tools/programs/cybersentry-program
@Engineer_Computer
مقایسه بیانیه رعایت خط مشی حریم شخصی توئیتر با تردز
@Engineer_Computer
https://www.wired.com/story/meta-twitter-threads-bluesky-spill-hive-mastodon-privacy-comparison/
@Engineer_Computer
https://www.wired.com/story/meta-twitter-threads-bluesky-spill-hive-mastodon-privacy-comparison/
WIRED
How Threads’ Privacy Policy Compares to Twitter’s (and Its Rivals’)
Want to try out Meta’s new social media app? Here’s more context on what personal data is collected by Threads and similar social media apps.
محیط اجرایی قابل اعتماد(TEE) در اندروید به چه معناست ؟
@Engineer_Computer
https://www.trustonic.com/technical-articles/what-is-a-trusted-execution-environment-tee/
@Engineer_Computer
https://www.trustonic.com/technical-articles/what-is-a-trusted-execution-environment-tee/
Trustonic
What Is Trusted Execution Environment (TEE) & How Does It Work? |
A TEE Trusted Execution Environment is an environment for executing code in a secure area of a processor. Apps executing code & data loaded inside the TEE can have high levels of trust.
DevSecOps Fundamentals Guidebook-1.pdf
1.2 MB
مبانی DevSecOps
@Engineer_Computer
@Engineer_Computer
CISO Handbook.pdf
1.6 MB
۱۷۰ صفحه هند بوک مخصوص مدیر ارشد امنیت
@Engineer_Computer
@Engineer_Computer
بد افزار RedDriverبا استفاده از HookSignTool اقدام به جعل سرتیفیکیت کرده و لذا خود را به ویندوز قالب میکند.
https://blog.talosintelligence.com/undocumented-reddriver/
@Engineer_Computer
https://blog.talosintelligence.com/undocumented-reddriver/
@Engineer_Computer
Cisco Talos Blog
Undocumented driver-based browser hijacker RedDriver targets Chinese speakers and internet cafes
Cisco Talos has identified multiple versions of an undocumented malicious driver named “RedDriver,” a driver-based browser hijacker that uses the Windows Filtering Platform (WFP) to intercept browser traffic.
Network Security Channel
بد افزار RedDriverبا استفاده از HookSignTool اقدام به جعل سرتیفیکیت کرده و لذا خود را به ویندوز قالب میکند. https://blog.talosintelligence.com/undocumented-reddriver/ @Engineer_Computer
ابزار دیگری که تلاش دارد با استفاده از امضای جعلی ویندوز را دور بزند
FuckCertVerify
https://github.com/hzqst/FuckCertVerifyTimeValidity
@Engineer_Computer
FuckCertVerify
https://github.com/hzqst/FuckCertVerifyTimeValidity
@Engineer_Computer
GitHub
GitHub - hzqst/FuckCertVerifyTimeValidity: This tiny project prevents the signtool from verifing cert time validity and let you…
This tiny project prevents the signtool from verifing cert time validity and let you sign your bin with outdated cert without changing system time manually - hzqst/FuckCertVerifyTimeValidity
⭕️C# obfuscator tool that can bypass Windows Defender antivirus.
https://github.com/0xb11a1/yetAnotherObfuscator
#obfuscator #av #maldev
@Engineer_Computer
https://github.com/0xb11a1/yetAnotherObfuscator
#obfuscator #av #maldev
@Engineer_Computer
GitHub
GitHub - 0xb11a1/yetAnotherObfuscator: C# obfuscator that bypass windows defender
C# obfuscator that bypass windows defender. Contribute to 0xb11a1/yetAnotherObfuscator development by creating an account on GitHub.
⭕️ توی این مقاله از portswigger محقق به نحوه اکسپلویت XSS در تگ meta و hidden input ها با استفاده از فانکشنالیتی popover در مرورگر پرداخته
https://portswigger.net/research/exploiting-xss-in-hidden-inputs-and-meta-tags
#BugBounty #Pentest #web_security
@Engineer_Computer
https://portswigger.net/research/exploiting-xss-in-hidden-inputs-and-meta-tags
#BugBounty #Pentest #web_security
@Engineer_Computer
Protecting Personal Information Hacking_videos_course.pdf
1.2 MB
Protecting Personal Information Hacking_videos_course.pdf
@Engineer_Computer
@Engineer_Computer
Unpacking Method For Android Packer (No Root).pdf
11.4 MB
This For Reverse engineering Moding and cracking learn
@Engineer_Computer
@Engineer_Computer
The art of deception.pdf
1011.8 KB
کوین میتنیک، از بزرگترین متخصصین حوزه مهندسی اجتماعی درگذشت.
@Engineer_Computer
@Engineer_Computer
🕊2
#Writeup
🔸Solutions to ALL reverse engineering challenges in the amateursCTF 2023 event.
رایت آپ تمامی چالش های مهندسی معکوس amateursCTF 2023 وب سایت amateurs.team
@Engineer_Computer
🔸Solutions to ALL reverse engineering challenges in the amateursCTF 2023 event.
رایت آپ تمامی چالش های مهندسی معکوس amateursCTF 2023 وب سایت amateurs.team
@Engineer_Computer